Jul 2 07:42:24.795469 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:42:24.795490 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:42:24.795500 kernel: BIOS-provided physical RAM map: Jul 2 07:42:24.795506 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 07:42:24.795511 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 07:42:24.795517 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 07:42:24.795523 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Jul 2 07:42:24.795529 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Jul 2 07:42:24.795536 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 2 07:42:24.795541 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 07:42:24.795547 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jul 2 07:42:24.795552 kernel: NX (Execute Disable) protection: active Jul 2 07:42:24.795557 kernel: SMBIOS 2.8 present. Jul 2 07:42:24.795563 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jul 2 07:42:24.795571 kernel: Hypervisor detected: KVM Jul 2 07:42:24.795577 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:42:24.795582 kernel: kvm-clock: cpu 0, msr 30192001, primary cpu clock Jul 2 07:42:24.795588 kernel: kvm-clock: using sched offset of 2409463755 cycles Jul 2 07:42:24.795595 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:42:24.795601 kernel: tsc: Detected 2794.748 MHz processor Jul 2 07:42:24.795607 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:42:24.795613 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:42:24.795619 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Jul 2 07:42:24.795626 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:42:24.795632 kernel: Using GB pages for direct mapping Jul 2 07:42:24.795638 kernel: ACPI: Early table checksum verification disabled Jul 2 07:42:24.795644 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Jul 2 07:42:24.795650 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:42:24.795656 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:42:24.795662 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:42:24.795668 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jul 2 07:42:24.795674 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:42:24.795682 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:42:24.795688 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:42:24.795694 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Jul 2 07:42:24.795700 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Jul 2 07:42:24.795705 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jul 2 07:42:24.795711 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Jul 2 07:42:24.795717 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Jul 2 07:42:24.795723 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Jul 2 07:42:24.795733 kernel: No NUMA configuration found Jul 2 07:42:24.795739 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Jul 2 07:42:24.795746 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Jul 2 07:42:24.795752 kernel: Zone ranges: Jul 2 07:42:24.795759 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:42:24.795765 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Jul 2 07:42:24.795773 kernel: Normal empty Jul 2 07:42:24.795779 kernel: Movable zone start for each node Jul 2 07:42:24.795785 kernel: Early memory node ranges Jul 2 07:42:24.795792 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 07:42:24.795798 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Jul 2 07:42:24.795813 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Jul 2 07:42:24.795819 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:42:24.795826 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 07:42:24.795832 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Jul 2 07:42:24.795840 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 2 07:42:24.795846 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:42:24.795853 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:42:24.795859 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 07:42:24.795865 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:42:24.795872 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:42:24.795878 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:42:24.795884 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:42:24.795891 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:42:24.795898 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:42:24.795904 kernel: TSC deadline timer available Jul 2 07:42:24.795911 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 2 07:42:24.795917 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 2 07:42:24.795923 kernel: kvm-guest: setup PV sched yield Jul 2 07:42:24.795930 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Jul 2 07:42:24.795936 kernel: Booting paravirtualized kernel on KVM Jul 2 07:42:24.795943 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:42:24.795949 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 2 07:42:24.795956 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 2 07:42:24.795963 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 2 07:42:24.795970 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 2 07:42:24.795976 kernel: kvm-guest: setup async PF for cpu 0 Jul 2 07:42:24.795982 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Jul 2 07:42:24.795988 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:42:24.795995 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:42:24.796001 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Jul 2 07:42:24.796007 kernel: Policy zone: DMA32 Jul 2 07:42:24.796015 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:42:24.796023 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:42:24.796030 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:42:24.796037 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:42:24.796043 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:42:24.796050 kernel: Memory: 2436704K/2571756K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 134792K reserved, 0K cma-reserved) Jul 2 07:42:24.796056 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 2 07:42:24.796063 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:42:24.796069 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:42:24.796076 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:42:24.796083 kernel: rcu: RCU event tracing is enabled. Jul 2 07:42:24.796090 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 2 07:42:24.796096 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:42:24.796103 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:42:24.796109 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:42:24.796115 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 2 07:42:24.796122 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 2 07:42:24.796128 kernel: random: crng init done Jul 2 07:42:24.796136 kernel: Console: colour VGA+ 80x25 Jul 2 07:42:24.796142 kernel: printk: console [ttyS0] enabled Jul 2 07:42:24.796149 kernel: ACPI: Core revision 20210730 Jul 2 07:42:24.796155 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 2 07:42:24.796162 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:42:24.796168 kernel: x2apic enabled Jul 2 07:42:24.796174 kernel: Switched APIC routing to physical x2apic. Jul 2 07:42:24.796180 kernel: kvm-guest: setup PV IPIs Jul 2 07:42:24.796187 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 07:42:24.796195 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 2 07:42:24.796201 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Jul 2 07:42:24.796207 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 2 07:42:24.796214 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 2 07:42:24.796220 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 2 07:42:24.796227 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:42:24.796233 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:42:24.796240 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:42:24.796256 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:42:24.796269 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 2 07:42:24.796276 kernel: RETBleed: Mitigation: untrained return thunk Jul 2 07:42:24.796283 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:42:24.796291 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:42:24.796298 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:42:24.796304 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:42:24.796311 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:42:24.796318 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:42:24.796325 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:42:24.796332 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:42:24.796339 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:42:24.796346 kernel: LSM: Security Framework initializing Jul 2 07:42:24.796352 kernel: SELinux: Initializing. Jul 2 07:42:24.796359 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 07:42:24.796366 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 07:42:24.796373 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 2 07:42:24.796381 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 2 07:42:24.796387 kernel: ... version: 0 Jul 2 07:42:24.796394 kernel: ... bit width: 48 Jul 2 07:42:24.796401 kernel: ... generic registers: 6 Jul 2 07:42:24.796407 kernel: ... value mask: 0000ffffffffffff Jul 2 07:42:24.796414 kernel: ... max period: 00007fffffffffff Jul 2 07:42:24.796421 kernel: ... fixed-purpose events: 0 Jul 2 07:42:24.796427 kernel: ... event mask: 000000000000003f Jul 2 07:42:24.796434 kernel: signal: max sigframe size: 1776 Jul 2 07:42:24.796440 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:42:24.796448 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:42:24.796455 kernel: x86: Booting SMP configuration: Jul 2 07:42:24.796461 kernel: .... node #0, CPUs: #1 Jul 2 07:42:24.796468 kernel: kvm-clock: cpu 1, msr 30192041, secondary cpu clock Jul 2 07:42:24.796475 kernel: kvm-guest: setup async PF for cpu 1 Jul 2 07:42:24.796482 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Jul 2 07:42:24.796488 kernel: #2 Jul 2 07:42:24.796495 kernel: kvm-clock: cpu 2, msr 30192081, secondary cpu clock Jul 2 07:42:24.796502 kernel: kvm-guest: setup async PF for cpu 2 Jul 2 07:42:24.796509 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Jul 2 07:42:24.796516 kernel: #3 Jul 2 07:42:24.796523 kernel: kvm-clock: cpu 3, msr 301920c1, secondary cpu clock Jul 2 07:42:24.796529 kernel: kvm-guest: setup async PF for cpu 3 Jul 2 07:42:24.796536 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Jul 2 07:42:24.796544 kernel: smp: Brought up 1 node, 4 CPUs Jul 2 07:42:24.796552 kernel: smpboot: Max logical packages: 1 Jul 2 07:42:24.796559 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Jul 2 07:42:24.796567 kernel: devtmpfs: initialized Jul 2 07:42:24.796575 kernel: x86/mm: Memory block size: 128MB Jul 2 07:42:24.796582 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:42:24.796589 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 2 07:42:24.796596 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:42:24.796602 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:42:24.796609 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:42:24.796616 kernel: audit: type=2000 audit(1719906144.876:1): state=initialized audit_enabled=0 res=1 Jul 2 07:42:24.796622 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:42:24.796629 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:42:24.796637 kernel: cpuidle: using governor menu Jul 2 07:42:24.796644 kernel: ACPI: bus type PCI registered Jul 2 07:42:24.796650 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:42:24.796657 kernel: dca service started, version 1.12.1 Jul 2 07:42:24.796664 kernel: PCI: Using configuration type 1 for base access Jul 2 07:42:24.796670 kernel: PCI: Using configuration type 1 for extended access Jul 2 07:42:24.796677 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:42:24.796684 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:42:24.796691 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:42:24.796699 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:42:24.796706 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:42:24.796712 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:42:24.796719 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:42:24.796726 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:42:24.796732 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:42:24.796739 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:42:24.796746 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:42:24.796752 kernel: ACPI: Interpreter enabled Jul 2 07:42:24.796759 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 07:42:24.796767 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:42:24.796774 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:42:24.796780 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jul 2 07:42:24.796787 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:42:24.796905 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:42:24.796916 kernel: acpiphp: Slot [3] registered Jul 2 07:42:24.796924 kernel: acpiphp: Slot [4] registered Jul 2 07:42:24.796931 kernel: acpiphp: Slot [5] registered Jul 2 07:42:24.796940 kernel: acpiphp: Slot [6] registered Jul 2 07:42:24.796946 kernel: acpiphp: Slot [7] registered Jul 2 07:42:24.796953 kernel: acpiphp: Slot [8] registered Jul 2 07:42:24.796959 kernel: acpiphp: Slot [9] registered Jul 2 07:42:24.796966 kernel: acpiphp: Slot [10] registered Jul 2 07:42:24.796973 kernel: acpiphp: Slot [11] registered Jul 2 07:42:24.796979 kernel: acpiphp: Slot [12] registered Jul 2 07:42:24.796986 kernel: acpiphp: Slot [13] registered Jul 2 07:42:24.796992 kernel: acpiphp: Slot [14] registered Jul 2 07:42:24.797000 kernel: acpiphp: Slot [15] registered Jul 2 07:42:24.797007 kernel: acpiphp: Slot [16] registered Jul 2 07:42:24.797014 kernel: acpiphp: Slot [17] registered Jul 2 07:42:24.797020 kernel: acpiphp: Slot [18] registered Jul 2 07:42:24.797027 kernel: acpiphp: Slot [19] registered Jul 2 07:42:24.797033 kernel: acpiphp: Slot [20] registered Jul 2 07:42:24.797040 kernel: acpiphp: Slot [21] registered Jul 2 07:42:24.797047 kernel: acpiphp: Slot [22] registered Jul 2 07:42:24.797053 kernel: acpiphp: Slot [23] registered Jul 2 07:42:24.797060 kernel: acpiphp: Slot [24] registered Jul 2 07:42:24.797067 kernel: acpiphp: Slot [25] registered Jul 2 07:42:24.797074 kernel: acpiphp: Slot [26] registered Jul 2 07:42:24.797081 kernel: acpiphp: Slot [27] registered Jul 2 07:42:24.797087 kernel: acpiphp: Slot [28] registered Jul 2 07:42:24.797094 kernel: acpiphp: Slot [29] registered Jul 2 07:42:24.797100 kernel: acpiphp: Slot [30] registered Jul 2 07:42:24.797107 kernel: acpiphp: Slot [31] registered Jul 2 07:42:24.797113 kernel: PCI host bridge to bus 0000:00 Jul 2 07:42:24.797193 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:42:24.797270 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:42:24.797334 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:42:24.797395 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Jul 2 07:42:24.797455 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Jul 2 07:42:24.797514 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:42:24.797596 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:42:24.797677 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 07:42:24.797758 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jul 2 07:42:24.797838 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Jul 2 07:42:24.797909 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 2 07:42:24.797978 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 2 07:42:24.798045 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 2 07:42:24.798114 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 2 07:42:24.798194 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:42:24.798277 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jul 2 07:42:24.798348 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jul 2 07:42:24.798423 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Jul 2 07:42:24.798493 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jul 2 07:42:24.798559 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jul 2 07:42:24.798630 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jul 2 07:42:24.798697 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:42:24.798780 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 07:42:24.798894 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Jul 2 07:42:24.799080 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jul 2 07:42:24.799164 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jul 2 07:42:24.799242 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 2 07:42:24.799329 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 07:42:24.799398 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jul 2 07:42:24.799467 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jul 2 07:42:24.799543 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:42:24.799612 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Jul 2 07:42:24.799680 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jul 2 07:42:24.799747 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jul 2 07:42:24.799829 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jul 2 07:42:24.799839 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:42:24.799846 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:42:24.799853 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:42:24.799860 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:42:24.799867 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:42:24.799873 kernel: iommu: Default domain type: Translated Jul 2 07:42:24.799880 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:42:24.799947 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jul 2 07:42:24.800018 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:42:24.800085 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jul 2 07:42:24.800095 kernel: vgaarb: loaded Jul 2 07:42:24.800102 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:42:24.800109 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:42:24.800116 kernel: PTP clock support registered Jul 2 07:42:24.800123 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:42:24.800129 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:42:24.800138 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 07:42:24.800145 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Jul 2 07:42:24.800151 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 2 07:42:24.800158 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 2 07:42:24.800165 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:42:24.800172 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:42:24.800179 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:42:24.800185 kernel: pnp: PnP ACPI init Jul 2 07:42:24.800276 kernel: pnp 00:02: [dma 2] Jul 2 07:42:24.800288 kernel: pnp: PnP ACPI: found 6 devices Jul 2 07:42:24.800295 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:42:24.800302 kernel: NET: Registered PF_INET protocol family Jul 2 07:42:24.800309 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:42:24.800316 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 07:42:24.800323 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:42:24.800330 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 07:42:24.800336 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 07:42:24.800345 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 07:42:24.800352 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 07:42:24.800358 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 07:42:24.800365 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:42:24.800372 kernel: NET: Registered PF_XDP protocol family Jul 2 07:42:24.800435 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:42:24.800496 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:42:24.800558 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:42:24.800618 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Jul 2 07:42:24.800681 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Jul 2 07:42:24.800750 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jul 2 07:42:24.800829 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:42:24.800899 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 07:42:24.800907 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:42:24.800914 kernel: Initialise system trusted keyrings Jul 2 07:42:24.800921 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 07:42:24.800928 kernel: Key type asymmetric registered Jul 2 07:42:24.800937 kernel: Asymmetric key parser 'x509' registered Jul 2 07:42:24.800944 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:42:24.800950 kernel: io scheduler mq-deadline registered Jul 2 07:42:24.800957 kernel: io scheduler kyber registered Jul 2 07:42:24.800964 kernel: io scheduler bfq registered Jul 2 07:42:24.800971 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:42:24.800978 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:42:24.800985 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Jul 2 07:42:24.800991 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:42:24.801000 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:42:24.801007 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:42:24.801014 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:42:24.801020 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:42:24.801027 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:42:24.801034 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:42:24.801106 kernel: rtc_cmos 00:05: RTC can wake from S4 Jul 2 07:42:24.801170 kernel: rtc_cmos 00:05: registered as rtc0 Jul 2 07:42:24.801281 kernel: rtc_cmos 00:05: setting system clock to 2024-07-02T07:42:24 UTC (1719906144) Jul 2 07:42:24.801346 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 2 07:42:24.801356 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:42:24.801363 kernel: Segment Routing with IPv6 Jul 2 07:42:24.801369 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:42:24.801376 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:42:24.801383 kernel: Key type dns_resolver registered Jul 2 07:42:24.801390 kernel: IPI shorthand broadcast: enabled Jul 2 07:42:24.801397 kernel: sched_clock: Marking stable (430038248, 98411438)->(542012907, -13563221) Jul 2 07:42:24.801406 kernel: registered taskstats version 1 Jul 2 07:42:24.801412 kernel: Loading compiled-in X.509 certificates Jul 2 07:42:24.801420 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:42:24.801431 kernel: Key type .fscrypt registered Jul 2 07:42:24.801438 kernel: Key type fscrypt-provisioning registered Jul 2 07:42:24.801467 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:42:24.801474 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:42:24.801481 kernel: ima: No architecture policies found Jul 2 07:42:24.801490 kernel: clk: Disabling unused clocks Jul 2 07:42:24.801499 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:42:24.801508 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:42:24.801515 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:42:24.801522 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:42:24.801529 kernel: Run /init as init process Jul 2 07:42:24.801535 kernel: with arguments: Jul 2 07:42:24.801542 kernel: /init Jul 2 07:42:24.801558 kernel: with environment: Jul 2 07:42:24.801566 kernel: HOME=/ Jul 2 07:42:24.801574 kernel: TERM=linux Jul 2 07:42:24.801581 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:42:24.801591 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:42:24.801600 systemd[1]: Detected virtualization kvm. Jul 2 07:42:24.801608 systemd[1]: Detected architecture x86-64. Jul 2 07:42:24.801615 systemd[1]: Running in initrd. Jul 2 07:42:24.801622 systemd[1]: No hostname configured, using default hostname. Jul 2 07:42:24.801631 systemd[1]: Hostname set to . Jul 2 07:42:24.801639 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:42:24.801646 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:42:24.801653 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:42:24.801661 systemd[1]: Reached target cryptsetup.target. Jul 2 07:42:24.801668 systemd[1]: Reached target paths.target. Jul 2 07:42:24.801675 systemd[1]: Reached target slices.target. Jul 2 07:42:24.801682 systemd[1]: Reached target swap.target. Jul 2 07:42:24.801691 systemd[1]: Reached target timers.target. Jul 2 07:42:24.801699 systemd[1]: Listening on iscsid.socket. Jul 2 07:42:24.801706 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:42:24.801714 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:42:24.801721 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:42:24.801729 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:42:24.801736 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:42:24.801743 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:42:24.801752 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:42:24.801760 systemd[1]: Reached target sockets.target. Jul 2 07:42:24.801767 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:42:24.801775 systemd[1]: Finished network-cleanup.service. Jul 2 07:42:24.801782 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:42:24.801790 systemd[1]: Starting systemd-journald.service... Jul 2 07:42:24.801807 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:42:24.801815 systemd[1]: Starting systemd-resolved.service... Jul 2 07:42:24.801823 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:42:24.801831 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:42:24.801838 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:42:24.801848 systemd-journald[198]: Journal started Jul 2 07:42:24.801887 systemd-journald[198]: Runtime Journal (/run/log/journal/2e66b24688a244dfb3d6202fae2a209f) is 6.0M, max 48.5M, 42.5M free. Jul 2 07:42:24.799105 systemd-modules-load[199]: Inserted module 'overlay' Jul 2 07:42:24.836525 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:42:24.836541 systemd[1]: Started systemd-journald.service. Jul 2 07:42:24.836556 kernel: audit: type=1130 audit(1719906144.831:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.818419 systemd-resolved[200]: Positive Trust Anchors: Jul 2 07:42:24.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.818428 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:42:24.845710 kernel: audit: type=1130 audit(1719906144.836:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.845724 kernel: audit: type=1130 audit(1719906144.840:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.818457 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:42:24.849531 kernel: audit: type=1130 audit(1719906144.845:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.820631 systemd-resolved[200]: Defaulting to hostname 'linux'. Jul 2 07:42:24.837016 systemd[1]: Started systemd-resolved.service. Jul 2 07:42:24.840560 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:42:24.846194 systemd[1]: Reached target nss-lookup.target. Jul 2 07:42:24.855847 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:42:24.857029 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:42:24.861833 systemd-modules-load[199]: Inserted module 'br_netfilter' Jul 2 07:42:24.862706 kernel: Bridge firewalling registered Jul 2 07:42:24.864830 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:42:24.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.869268 kernel: audit: type=1130 audit(1719906144.865:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.869668 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:42:24.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.872083 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:42:24.875641 kernel: audit: type=1130 audit(1719906144.871:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.879849 dracut-cmdline[216]: dracut-dracut-053 Jul 2 07:42:24.881667 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:42:24.892270 kernel: SCSI subsystem initialized Jul 2 07:42:24.902270 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:42:24.902291 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:42:24.904222 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:42:24.906850 systemd-modules-load[199]: Inserted module 'dm_multipath' Jul 2 07:42:24.908330 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:42:24.912836 kernel: audit: type=1130 audit(1719906144.908:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.909171 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:42:24.919102 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:42:24.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.924273 kernel: audit: type=1130 audit(1719906144.920:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:24.940271 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:42:24.956277 kernel: iscsi: registered transport (tcp) Jul 2 07:42:24.977277 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:42:24.977294 kernel: QLogic iSCSI HBA Driver Jul 2 07:42:25.003932 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:42:25.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:25.006319 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:42:25.009741 kernel: audit: type=1130 audit(1719906145.005:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:25.051274 kernel: raid6: avx2x4 gen() 30333 MB/s Jul 2 07:42:25.068268 kernel: raid6: avx2x4 xor() 7466 MB/s Jul 2 07:42:25.085275 kernel: raid6: avx2x2 gen() 32460 MB/s Jul 2 07:42:25.102270 kernel: raid6: avx2x2 xor() 19244 MB/s Jul 2 07:42:25.119267 kernel: raid6: avx2x1 gen() 26518 MB/s Jul 2 07:42:25.136267 kernel: raid6: avx2x1 xor() 15342 MB/s Jul 2 07:42:25.153266 kernel: raid6: sse2x4 gen() 14808 MB/s Jul 2 07:42:25.170266 kernel: raid6: sse2x4 xor() 7060 MB/s Jul 2 07:42:25.187267 kernel: raid6: sse2x2 gen() 16429 MB/s Jul 2 07:42:25.204266 kernel: raid6: sse2x2 xor() 9842 MB/s Jul 2 07:42:25.221271 kernel: raid6: sse2x1 gen() 12241 MB/s Jul 2 07:42:25.238670 kernel: raid6: sse2x1 xor() 7798 MB/s Jul 2 07:42:25.238683 kernel: raid6: using algorithm avx2x2 gen() 32460 MB/s Jul 2 07:42:25.238692 kernel: raid6: .... xor() 19244 MB/s, rmw enabled Jul 2 07:42:25.239398 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:42:25.251268 kernel: xor: automatically using best checksumming function avx Jul 2 07:42:25.340280 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:42:25.347748 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:42:25.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:25.349000 audit: BPF prog-id=7 op=LOAD Jul 2 07:42:25.349000 audit: BPF prog-id=8 op=LOAD Jul 2 07:42:25.349697 systemd[1]: Starting systemd-udevd.service... Jul 2 07:42:25.361215 systemd-udevd[400]: Using default interface naming scheme 'v252'. Jul 2 07:42:25.364568 systemd[1]: Started systemd-udevd.service. Jul 2 07:42:25.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:25.366376 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:42:25.375002 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Jul 2 07:42:25.399073 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:42:25.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:25.401346 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:42:25.435630 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:42:25.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:25.466556 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jul 2 07:42:25.469284 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:42:25.473270 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:42:25.489943 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:42:25.489985 kernel: AES CTR mode by8 optimization enabled Jul 2 07:42:25.506329 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (449) Jul 2 07:42:25.508273 kernel: libata version 3.00 loaded. Jul 2 07:42:25.510406 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:42:25.534048 kernel: ata_piix 0000:00:01.1: version 2.13 Jul 2 07:42:25.534167 kernel: scsi host0: ata_piix Jul 2 07:42:25.534279 kernel: scsi host1: ata_piix Jul 2 07:42:25.534374 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Jul 2 07:42:25.534385 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Jul 2 07:42:25.539964 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:42:25.541167 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:42:25.544664 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:42:25.547808 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:42:25.549766 systemd[1]: Starting disk-uuid.service... Jul 2 07:42:25.675280 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 2 07:42:25.677315 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 2 07:42:25.695273 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:42:25.706273 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:42:25.710821 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 2 07:42:25.711027 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 07:42:25.731274 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Jul 2 07:42:26.709291 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:42:26.709838 disk-uuid[529]: The operation has completed successfully. Jul 2 07:42:26.734155 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:42:26.734237 systemd[1]: Finished disk-uuid.service. Jul 2 07:42:26.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.740081 systemd[1]: Starting verity-setup.service... Jul 2 07:42:26.753284 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 2 07:42:26.769801 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:42:26.772481 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:42:26.774833 systemd[1]: Finished verity-setup.service. Jul 2 07:42:26.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.830273 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:26.830620 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:42:26.832122 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:42:26.833654 systemd[1]: Starting ignition-setup.service... Jul 2 07:42:26.835741 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:42:26.841518 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:42:26.841548 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:42:26.841557 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:42:26.849677 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:42:26.897683 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:42:26.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.902000 audit: BPF prog-id=9 op=LOAD Jul 2 07:42:26.903431 systemd[1]: Starting systemd-networkd.service... Jul 2 07:42:26.921985 systemd-networkd[700]: lo: Link UP Jul 2 07:42:26.921994 systemd-networkd[700]: lo: Gained carrier Jul 2 07:42:26.922381 systemd-networkd[700]: Enumeration completed Jul 2 07:42:26.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.922488 systemd[1]: Started systemd-networkd.service. Jul 2 07:42:26.922566 systemd-networkd[700]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:42:26.940389 systemd-networkd[700]: eth0: Link UP Jul 2 07:42:26.940391 systemd-networkd[700]: eth0: Gained carrier Jul 2 07:42:26.942483 systemd[1]: Reached target network.target. Jul 2 07:42:26.945214 systemd[1]: Starting iscsiuio.service... Jul 2 07:42:26.948962 systemd[1]: Started iscsiuio.service. Jul 2 07:42:26.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.952897 systemd[1]: Starting iscsid.service... Jul 2 07:42:26.954320 systemd-networkd[700]: eth0: DHCPv4 address 10.0.0.20/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 07:42:26.955722 iscsid[705]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:42:26.955722 iscsid[705]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:42:26.955722 iscsid[705]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:42:26.955722 iscsid[705]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:42:26.955722 iscsid[705]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:42:26.955722 iscsid[705]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:42:26.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.956628 systemd[1]: Started iscsid.service. Jul 2 07:42:26.958472 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:42:26.970056 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:42:26.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:26.970597 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:42:26.970657 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:42:26.970833 systemd[1]: Reached target remote-fs.target. Jul 2 07:42:26.971604 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:42:26.978575 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:42:26.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.091419 systemd[1]: Finished ignition-setup.service. Jul 2 07:42:27.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.093816 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:42:27.128733 ignition[720]: Ignition 2.14.0 Jul 2 07:42:27.128757 ignition[720]: Stage: fetch-offline Jul 2 07:42:27.128813 ignition[720]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:42:27.128821 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:42:27.128915 ignition[720]: parsed url from cmdline: "" Jul 2 07:42:27.128918 ignition[720]: no config URL provided Jul 2 07:42:27.128922 ignition[720]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:42:27.128929 ignition[720]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:42:27.128944 ignition[720]: op(1): [started] loading QEMU firmware config module Jul 2 07:42:27.128948 ignition[720]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 2 07:42:27.131858 ignition[720]: op(1): [finished] loading QEMU firmware config module Jul 2 07:42:27.132999 ignition[720]: parsing config with SHA512: c3c80abaffbbd6b0ff19368db46d0407a180095bd29b70ad951c627d8b304de7aa24d05fbb8310d024215c2a55a754c53ef42ea0c289c227a8d334dd3e3a6c99 Jul 2 07:42:27.141193 unknown[720]: fetched base config from "system" Jul 2 07:42:27.141208 unknown[720]: fetched user config from "qemu" Jul 2 07:42:27.141520 ignition[720]: fetch-offline: fetch-offline passed Jul 2 07:42:27.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.142624 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:42:27.141597 ignition[720]: Ignition finished successfully Jul 2 07:42:27.143996 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 07:42:27.144756 systemd[1]: Starting ignition-kargs.service... Jul 2 07:42:27.153110 ignition[728]: Ignition 2.14.0 Jul 2 07:42:27.153118 ignition[728]: Stage: kargs Jul 2 07:42:27.153198 ignition[728]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:42:27.153206 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:42:27.155591 systemd[1]: Finished ignition-kargs.service. Jul 2 07:42:27.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.153873 ignition[728]: kargs: kargs passed Jul 2 07:42:27.153904 ignition[728]: Ignition finished successfully Jul 2 07:42:27.158429 systemd[1]: Starting ignition-disks.service... Jul 2 07:42:27.165240 ignition[734]: Ignition 2.14.0 Jul 2 07:42:27.165265 ignition[734]: Stage: disks Jul 2 07:42:27.165338 ignition[734]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:42:27.166747 systemd[1]: Finished ignition-disks.service. Jul 2 07:42:27.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.165345 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:42:27.168385 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:42:27.165983 ignition[734]: disks: disks passed Jul 2 07:42:27.169882 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:42:27.166012 ignition[734]: Ignition finished successfully Jul 2 07:42:27.171817 systemd[1]: Reached target local-fs.target. Jul 2 07:42:27.173464 systemd[1]: Reached target sysinit.target. Jul 2 07:42:27.174922 systemd[1]: Reached target basic.target. Jul 2 07:42:27.177436 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:42:27.187565 systemd-fsck[742]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 07:42:27.192306 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:42:27.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.195109 systemd[1]: Mounting sysroot.mount... Jul 2 07:42:27.201273 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:42:27.201960 systemd[1]: Mounted sysroot.mount. Jul 2 07:42:27.202707 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:42:27.204923 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:42:27.205820 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:42:27.205851 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:42:27.205870 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:42:27.207665 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:42:27.209659 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:42:27.214156 initrd-setup-root[752]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:42:27.216718 initrd-setup-root[760]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:42:27.219265 initrd-setup-root[768]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:42:27.222315 initrd-setup-root[776]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:42:27.245368 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:42:27.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.247153 systemd[1]: Starting ignition-mount.service... Jul 2 07:42:27.248061 systemd[1]: Starting sysroot-boot.service... Jul 2 07:42:27.255222 bash[794]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 07:42:27.263463 ignition[795]: INFO : Ignition 2.14.0 Jul 2 07:42:27.263787 systemd[1]: Finished sysroot-boot.service. Jul 2 07:42:27.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.266122 ignition[795]: INFO : Stage: mount Jul 2 07:42:27.266122 ignition[795]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:42:27.266122 ignition[795]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:42:27.266122 ignition[795]: INFO : mount: mount passed Jul 2 07:42:27.266122 ignition[795]: INFO : Ignition finished successfully Jul 2 07:42:27.270759 systemd[1]: Finished ignition-mount.service. Jul 2 07:42:27.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.780998 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:42:27.786278 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (803) Jul 2 07:42:27.786304 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:42:27.788325 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:42:27.788343 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:42:27.791754 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:42:27.793238 systemd[1]: Starting ignition-files.service... Jul 2 07:42:27.805544 ignition[823]: INFO : Ignition 2.14.0 Jul 2 07:42:27.805544 ignition[823]: INFO : Stage: files Jul 2 07:42:27.807351 ignition[823]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:42:27.807351 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:42:27.810293 ignition[823]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:42:27.811879 ignition[823]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:42:27.811879 ignition[823]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:42:27.814860 ignition[823]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:42:27.816401 ignition[823]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:42:27.818225 unknown[823]: wrote ssh authorized keys file for user: core Jul 2 07:42:27.819391 ignition[823]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:42:27.821373 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:42:27.823322 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:42:27.825243 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 2 07:42:27.827482 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 2 07:42:27.829666 ignition[823]: INFO : files: op(5): [started] processing unit "coreos-metadata.service" Jul 2 07:42:27.831098 ignition[823]: INFO : files: op(5): op(6): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 07:42:27.833301 ignition[823]: INFO : files: op(5): op(6): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 07:42:27.833301 ignition[823]: INFO : files: op(5): [finished] processing unit "coreos-metadata.service" Jul 2 07:42:27.836836 ignition[823]: INFO : files: op(7): [started] setting preset to disabled for "coreos-metadata.service" Jul 2 07:42:27.836836 ignition[823]: INFO : files: op(7): op(8): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 07:42:27.854462 ignition[823]: INFO : files: op(7): op(8): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 07:42:27.856103 ignition[823]: INFO : files: op(7): [finished] setting preset to disabled for "coreos-metadata.service" Jul 2 07:42:27.857523 ignition[823]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:42:27.859235 ignition[823]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:42:27.860879 ignition[823]: INFO : files: files passed Jul 2 07:42:27.861590 ignition[823]: INFO : Ignition finished successfully Jul 2 07:42:27.863052 systemd[1]: Finished ignition-files.service. Jul 2 07:42:27.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.865369 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:42:27.865650 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:42:27.867180 systemd[1]: Starting ignition-quench.service... Jul 2 07:42:27.870774 initrd-setup-root-after-ignition[846]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 2 07:42:27.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.873379 initrd-setup-root-after-ignition[848]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:42:27.871799 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:42:27.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.873455 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:42:27.873519 systemd[1]: Finished ignition-quench.service. Jul 2 07:42:27.875791 systemd[1]: Reached target ignition-complete.target. Jul 2 07:42:27.877932 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:42:27.889436 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:42:27.889509 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:42:27.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.891332 systemd[1]: Reached target initrd-fs.target. Jul 2 07:42:27.892752 systemd[1]: Reached target initrd.target. Jul 2 07:42:27.893548 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:42:27.894145 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:42:27.903981 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:42:27.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.905418 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:42:27.912477 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:42:27.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.912975 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:42:27.913145 systemd[1]: Stopped target timers.target. Jul 2 07:42:27.913304 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:42:27.913388 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:42:27.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.913705 systemd[1]: Stopped target initrd.target. Jul 2 07:42:27.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.913806 systemd[1]: Stopped target basic.target. Jul 2 07:42:27.913971 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:42:27.914137 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:42:27.914318 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:42:27.914472 systemd[1]: Stopped target remote-fs.target. Jul 2 07:42:27.914634 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:42:27.914814 systemd[1]: Stopped target sysinit.target. Jul 2 07:42:27.914977 systemd[1]: Stopped target local-fs.target. Jul 2 07:42:27.915138 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:42:27.915333 systemd[1]: Stopped target swap.target. Jul 2 07:42:27.915453 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:42:27.915533 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:42:27.915697 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:42:27.915794 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:42:27.942694 ignition[862]: INFO : Ignition 2.14.0 Jul 2 07:42:27.942694 ignition[862]: INFO : Stage: umount Jul 2 07:42:27.942694 ignition[862]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:42:27.942694 ignition[862]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:42:27.915871 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:42:27.944199 ignition[862]: INFO : umount: umount passed Jul 2 07:42:27.944199 ignition[862]: INFO : Ignition finished successfully Jul 2 07:42:27.916009 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:42:27.916089 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:42:27.916380 systemd[1]: Stopped target paths.target. Jul 2 07:42:27.916453 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:42:27.927291 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:42:27.928510 systemd[1]: Stopped target slices.target. Jul 2 07:42:27.929341 systemd[1]: Stopped target sockets.target. Jul 2 07:42:27.930895 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:42:27.930958 systemd[1]: Closed iscsid.socket. Jul 2 07:42:27.932338 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:42:27.932423 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:42:27.934200 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:42:27.934291 systemd[1]: Stopped ignition-files.service. Jul 2 07:42:27.936328 systemd[1]: Stopping ignition-mount.service... Jul 2 07:42:27.937194 systemd[1]: Stopping iscsiuio.service... Jul 2 07:42:27.939338 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:42:27.940269 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:42:27.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.966753 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:42:27.967189 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:42:27.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.967298 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:42:27.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.968585 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:42:27.968681 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:42:27.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.971663 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:42:27.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.971748 systemd[1]: Stopped iscsiuio.service. Jul 2 07:42:27.972997 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:42:27.973058 systemd[1]: Stopped ignition-mount.service. Jul 2 07:42:27.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.974370 systemd[1]: Stopped target network.target. Jul 2 07:42:27.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.975621 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:42:27.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.975649 systemd[1]: Closed iscsiuio.socket. Jul 2 07:42:27.975914 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:42:27.975943 systemd[1]: Stopped ignition-disks.service. Jul 2 07:42:27.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.978494 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:42:27.978523 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:42:27.979690 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:42:27.979728 systemd[1]: Stopped ignition-setup.service. Jul 2 07:42:27.981142 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:42:27.982739 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:42:27.984094 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:42:27.984156 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:42:27.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.989310 systemd-networkd[700]: eth0: DHCPv6 lease lost Jul 2 07:42:27.991567 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:42:27.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.991637 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:42:27.993847 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:42:27.993953 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:42:27.996424 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:42:28.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.996477 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:42:28.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.997509 systemd[1]: Stopping network-cleanup.service... Jul 2 07:42:27.999357 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:42:28.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:27.999406 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:42:28.004000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:42:28.001082 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:42:28.001116 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:42:28.008000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:42:28.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.003368 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:42:28.003402 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:42:28.004970 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:42:28.006576 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:42:28.009371 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:42:28.009464 systemd[1]: Stopped network-cleanup.service. Jul 2 07:42:28.017667 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:42:28.017786 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:42:28.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.020428 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:42:28.020472 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:42:28.022328 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:42:28.022352 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:42:28.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.024382 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:42:28.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.024414 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:42:28.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.026296 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:42:28.026326 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:42:28.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.027828 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:42:28.027858 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:42:28.029326 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:42:28.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.030384 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:42:28.030418 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:42:28.032184 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:42:28.032569 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:42:28.032640 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:42:28.033942 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:42:28.034001 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:42:28.035631 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:42:28.037342 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:42:28.037385 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:42:28.039436 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:42:28.055279 systemd[1]: Switching root. Jul 2 07:42:28.072820 iscsid[705]: iscsid shutting down. Jul 2 07:42:28.073527 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Jul 2 07:42:28.073567 systemd-journald[198]: Journal stopped Jul 2 07:42:28.589186 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:42:28.589237 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:42:28.589270 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:42:28.589280 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:42:28.589296 kernel: SELinux: policy capability open_perms=1 Jul 2 07:42:28.589305 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:42:28.589319 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:42:28.589328 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:42:28.589338 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:42:28.589350 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:42:28.589360 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:42:28.589371 systemd[1]: Successfully loaded SELinux policy in 37.711ms. Jul 2 07:42:28.589392 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.833ms. Jul 2 07:42:28.589403 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:42:28.589414 systemd[1]: Detected virtualization kvm. Jul 2 07:42:28.589425 systemd[1]: Detected architecture x86-64. Jul 2 07:42:28.589435 systemd[1]: Detected first boot. Jul 2 07:42:28.589445 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:42:28.589457 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:42:28.589468 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:42:28.589478 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:42:28.589488 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:42:28.589497 systemd[1]: Stopped iscsid.service. Jul 2 07:42:28.589508 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:42:28.589517 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:42:28.589528 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:42:28.589540 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:42:28.589550 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:42:28.589560 systemd[1]: Created slice system-getty.slice. Jul 2 07:42:28.589570 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:42:28.589579 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:42:28.589591 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:42:28.589601 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:42:28.589612 systemd[1]: Created slice user.slice. Jul 2 07:42:28.589622 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:42:28.589633 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:42:28.589643 systemd[1]: Set up automount boot.automount. Jul 2 07:42:28.589653 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:42:28.589663 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:42:28.589673 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:42:28.589683 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:42:28.589694 systemd[1]: Reached target integritysetup.target. Jul 2 07:42:28.589710 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:42:28.589722 systemd[1]: Reached target remote-fs.target. Jul 2 07:42:28.589732 systemd[1]: Reached target slices.target. Jul 2 07:42:28.589742 systemd[1]: Reached target swap.target. Jul 2 07:42:28.589752 systemd[1]: Reached target veritysetup.target. Jul 2 07:42:28.589762 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:42:28.589772 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:42:28.589782 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:42:28.589792 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:42:28.589803 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:42:28.589813 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:42:28.589824 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:42:28.589834 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:42:28.589844 systemd[1]: Mounting media.mount... Jul 2 07:42:28.589854 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:28.589864 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:42:28.589875 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:42:28.589885 systemd[1]: Mounting tmp.mount... Jul 2 07:42:28.589895 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:42:28.589905 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:42:28.589915 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:42:28.589925 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:42:28.589936 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:42:28.589945 systemd[1]: Starting modprobe@drm.service... Jul 2 07:42:28.589955 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:42:28.589966 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:42:28.589976 systemd[1]: Starting modprobe@loop.service... Jul 2 07:42:28.589987 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:42:28.589997 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:42:28.590007 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:42:28.590017 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:42:28.590027 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:42:28.590037 systemd[1]: Stopped systemd-journald.service. Jul 2 07:42:28.590047 kernel: loop: module loaded Jul 2 07:42:28.590058 kernel: fuse: init (API version 7.34) Jul 2 07:42:28.590068 systemd[1]: Starting systemd-journald.service... Jul 2 07:42:28.590078 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:42:28.590088 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:42:28.590098 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:42:28.590108 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:42:28.590118 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:42:28.590128 systemd[1]: Stopped verity-setup.service. Jul 2 07:42:28.590139 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:28.590152 systemd-journald[970]: Journal started Jul 2 07:42:28.590189 systemd-journald[970]: Runtime Journal (/run/log/journal/2e66b24688a244dfb3d6202fae2a209f) is 6.0M, max 48.5M, 42.5M free. Jul 2 07:42:28.129000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:42:28.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:42:28.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:42:28.163000 audit: BPF prog-id=10 op=LOAD Jul 2 07:42:28.163000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:42:28.163000 audit: BPF prog-id=11 op=LOAD Jul 2 07:42:28.163000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:42:28.463000 audit: BPF prog-id=12 op=LOAD Jul 2 07:42:28.463000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:42:28.463000 audit: BPF prog-id=13 op=LOAD Jul 2 07:42:28.463000 audit: BPF prog-id=14 op=LOAD Jul 2 07:42:28.463000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:42:28.463000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:42:28.464000 audit: BPF prog-id=15 op=LOAD Jul 2 07:42:28.464000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:42:28.464000 audit: BPF prog-id=16 op=LOAD Jul 2 07:42:28.464000 audit: BPF prog-id=17 op=LOAD Jul 2 07:42:28.464000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:42:28.464000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:42:28.465000 audit: BPF prog-id=18 op=LOAD Jul 2 07:42:28.465000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:42:28.465000 audit: BPF prog-id=19 op=LOAD Jul 2 07:42:28.465000 audit: BPF prog-id=20 op=LOAD Jul 2 07:42:28.465000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:42:28.465000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:42:28.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.475000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:42:28.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.570000 audit: BPF prog-id=21 op=LOAD Jul 2 07:42:28.570000 audit: BPF prog-id=22 op=LOAD Jul 2 07:42:28.571000 audit: BPF prog-id=23 op=LOAD Jul 2 07:42:28.571000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:42:28.571000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:42:28.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.587000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:42:28.587000 audit[970]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe91d1c010 a2=4000 a3=7ffe91d1c0ac items=0 ppid=1 pid=970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:28.587000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:42:28.462751 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:42:28.462762 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 07:42:28.466348 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:42:28.592271 systemd[1]: Started systemd-journald.service. Jul 2 07:42:28.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.592706 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:42:28.593552 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:42:28.594371 systemd[1]: Mounted media.mount. Jul 2 07:42:28.595124 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:42:28.595991 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:42:28.596888 systemd[1]: Mounted tmp.mount. Jul 2 07:42:28.597855 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:42:28.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.598999 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:42:28.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.600032 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:42:28.600208 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:42:28.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.601298 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:42:28.601399 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:42:28.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.602420 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:42:28.602578 systemd[1]: Finished modprobe@drm.service. Jul 2 07:42:28.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.603627 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:42:28.603775 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:42:28.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.604934 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:42:28.605099 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:42:28.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.606099 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:42:28.606268 systemd[1]: Finished modprobe@loop.service. Jul 2 07:42:28.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.607372 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:42:28.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.608510 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:42:28.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.609781 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:42:28.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.611049 systemd[1]: Reached target network-pre.target. Jul 2 07:42:28.612989 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:42:28.614652 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:42:28.615540 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:42:28.616606 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:42:28.618360 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:42:28.619273 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:42:28.624944 systemd-journald[970]: Time spent on flushing to /var/log/journal/2e66b24688a244dfb3d6202fae2a209f is 13.378ms for 1019 entries. Jul 2 07:42:28.624944 systemd-journald[970]: System Journal (/var/log/journal/2e66b24688a244dfb3d6202fae2a209f) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:42:28.655038 systemd-journald[970]: Received client request to flush runtime journal. Jul 2 07:42:28.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:28.619985 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:42:28.621047 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:42:28.621838 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:42:28.623480 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:42:28.626710 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:42:28.657936 udevadm[993]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:42:28.627757 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:42:28.630777 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:42:28.632599 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:42:28.635462 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:42:28.636759 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:42:28.640556 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:42:28.644406 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:42:28.655891 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:42:29.034296 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:42:29.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.035000 audit: BPF prog-id=24 op=LOAD Jul 2 07:42:29.035000 audit: BPF prog-id=25 op=LOAD Jul 2 07:42:29.035000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:42:29.035000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:42:29.036522 systemd[1]: Starting systemd-udevd.service... Jul 2 07:42:29.051304 systemd-udevd[995]: Using default interface naming scheme 'v252'. Jul 2 07:42:29.063001 systemd[1]: Started systemd-udevd.service. Jul 2 07:42:29.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.064000 audit: BPF prog-id=26 op=LOAD Jul 2 07:42:29.065423 systemd[1]: Starting systemd-networkd.service... Jul 2 07:42:29.072000 audit: BPF prog-id=27 op=LOAD Jul 2 07:42:29.072000 audit: BPF prog-id=28 op=LOAD Jul 2 07:42:29.072000 audit: BPF prog-id=29 op=LOAD Jul 2 07:42:29.073326 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:42:29.089392 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:42:29.098899 systemd[1]: Started systemd-userdbd.service. Jul 2 07:42:29.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.121503 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:42:29.123000 audit[1003]: AVC avc: denied { confidentiality } for pid=1003 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:42:29.129273 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:42:29.123000 audit[1003]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ee72c69710 a1=3207c a2=7f2234c16bc5 a3=5 items=108 ppid=995 pid=1003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:29.123000 audit: CWD cwd="/" Jul 2 07:42:29.123000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=1 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=2 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=3 name=(null) inode=15029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=4 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=5 name=(null) inode=15030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=6 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=7 name=(null) inode=15031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=8 name=(null) inode=15031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=9 name=(null) inode=15032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=10 name=(null) inode=15031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=11 name=(null) inode=15033 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=12 name=(null) inode=15031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=13 name=(null) inode=15034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=14 name=(null) inode=15031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=15 name=(null) inode=15035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=16 name=(null) inode=15031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=17 name=(null) inode=15036 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=18 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=19 name=(null) inode=15037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=20 name=(null) inode=15037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=21 name=(null) inode=15038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=22 name=(null) inode=15037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=23 name=(null) inode=15039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=24 name=(null) inode=15037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=25 name=(null) inode=15040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=26 name=(null) inode=15037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=27 name=(null) inode=15041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=28 name=(null) inode=15037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=29 name=(null) inode=15042 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=30 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=31 name=(null) inode=15043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=32 name=(null) inode=15043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=33 name=(null) inode=15044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=34 name=(null) inode=15043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=35 name=(null) inode=15045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=36 name=(null) inode=15043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=37 name=(null) inode=15046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=38 name=(null) inode=15043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=39 name=(null) inode=15047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=40 name=(null) inode=15043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=41 name=(null) inode=15048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=42 name=(null) inode=15028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=43 name=(null) inode=15049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=44 name=(null) inode=15049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=45 name=(null) inode=15050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=46 name=(null) inode=15049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=47 name=(null) inode=15051 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=48 name=(null) inode=15049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=49 name=(null) inode=15052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=50 name=(null) inode=15049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=51 name=(null) inode=15053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=52 name=(null) inode=15049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=53 name=(null) inode=15054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=55 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=56 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=57 name=(null) inode=15056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=58 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=59 name=(null) inode=15057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=60 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=61 name=(null) inode=15058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=62 name=(null) inode=15058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=63 name=(null) inode=15059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=64 name=(null) inode=15058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=65 name=(null) inode=15060 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=66 name=(null) inode=15058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=67 name=(null) inode=15061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=68 name=(null) inode=15058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=69 name=(null) inode=15062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=70 name=(null) inode=15058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=71 name=(null) inode=15063 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=72 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=73 name=(null) inode=15064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=74 name=(null) inode=15064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=75 name=(null) inode=15065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=76 name=(null) inode=15064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=77 name=(null) inode=15066 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=78 name=(null) inode=15064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=79 name=(null) inode=15067 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=80 name=(null) inode=15064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=81 name=(null) inode=15068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=82 name=(null) inode=15064 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=83 name=(null) inode=15069 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=84 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=85 name=(null) inode=15070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=86 name=(null) inode=15070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=87 name=(null) inode=15071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=88 name=(null) inode=15070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=89 name=(null) inode=15072 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=90 name=(null) inode=15070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=91 name=(null) inode=15073 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=92 name=(null) inode=15070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=93 name=(null) inode=15074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=94 name=(null) inode=15070 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=95 name=(null) inode=15075 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=96 name=(null) inode=15055 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=97 name=(null) inode=15076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=98 name=(null) inode=15076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=99 name=(null) inode=15077 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=100 name=(null) inode=15076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=101 name=(null) inode=15078 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=102 name=(null) inode=15076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=103 name=(null) inode=15079 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.137312 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:42:29.123000 audit: PATH item=104 name=(null) inode=15076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=105 name=(null) inode=15080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=106 name=(null) inode=15076 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PATH item=107 name=(null) inode=15081 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:42:29.123000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:42:29.141768 systemd-networkd[1005]: lo: Link UP Jul 2 07:42:29.141781 systemd-networkd[1005]: lo: Gained carrier Jul 2 07:42:29.142127 systemd-networkd[1005]: Enumeration completed Jul 2 07:42:29.142266 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jul 2 07:42:29.142229 systemd[1]: Started systemd-networkd.service. Jul 2 07:42:29.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.143363 systemd-networkd[1005]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:42:29.144277 systemd-networkd[1005]: eth0: Link UP Jul 2 07:42:29.144284 systemd-networkd[1005]: eth0: Gained carrier Jul 2 07:42:29.180273 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 07:42:29.190369 systemd-networkd[1005]: eth0: DHCPv4 address 10.0.0.20/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 07:42:29.193270 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:42:29.242383 kernel: kvm: Nested Virtualization enabled Jul 2 07:42:29.242495 kernel: SVM: kvm: Nested Paging enabled Jul 2 07:42:29.242511 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 2 07:42:29.243634 kernel: SVM: Virtual GIF supported Jul 2 07:42:29.261287 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:42:29.279847 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:42:29.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.283105 kernel: kauditd_printk_skb: 254 callbacks suppressed Jul 2 07:42:29.283161 kernel: audit: type=1130 audit(1719906149.280:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.282700 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:42:29.294566 lvm[1031]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:42:29.322722 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:42:29.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.324057 systemd[1]: Reached target cryptsetup.target. Jul 2 07:42:29.329301 kernel: audit: type=1130 audit(1719906149.323:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.330471 systemd[1]: Starting lvm2-activation.service... Jul 2 07:42:29.334511 lvm[1032]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:42:29.358198 systemd[1]: Finished lvm2-activation.service. Jul 2 07:42:29.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.359304 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:42:29.363264 kernel: audit: type=1130 audit(1719906149.358:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.363237 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:42:29.363280 systemd[1]: Reached target local-fs.target. Jul 2 07:42:29.364102 systemd[1]: Reached target machines.target. Jul 2 07:42:29.366151 systemd[1]: Starting ldconfig.service... Jul 2 07:42:29.367164 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.367212 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:29.367875 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:42:29.369451 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:42:29.371235 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:42:29.372973 systemd[1]: Starting systemd-sysext.service... Jul 2 07:42:29.375339 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1034 (bootctl) Jul 2 07:42:29.376116 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:42:29.382937 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:42:29.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.389280 kernel: audit: type=1130 audit(1719906149.383:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.389412 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:42:29.393411 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:42:29.393571 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:42:29.397819 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:42:29.398392 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:42:29.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.403126 (sd-sysext)[1044]: No suitable extensions found (2 ignored due to incompatible version). Jul 2 07:42:29.404275 kernel: audit: type=1130 audit(1719906149.399:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.413156 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.414303 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:42:29.415276 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.416301 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:42:29.418141 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:42:29.420900 systemd[1]: Starting modprobe@loop.service... Jul 2 07:42:29.422072 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.422203 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:29.422455 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.425100 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:42:29.426978 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:42:29.427132 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:42:29.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.428809 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:42:29.428927 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:42:29.436451 kernel: audit: type=1130 audit(1719906149.428:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.436546 kernel: audit: type=1131 audit(1719906149.428:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.436637 systemd-fsck[1042]: fsck.fat 4.2 (2021-01-31) Jul 2 07:42:29.436637 systemd-fsck[1042]: /dev/vda1: 789 files, 119238/258078 clusters Jul 2 07:42:29.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.438867 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:42:29.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.442334 kernel: audit: type=1130 audit(1719906149.438:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.442390 kernel: audit: type=1131 audit(1719906149.438:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.449020 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:42:29.449134 systemd[1]: Finished modprobe@loop.service. Jul 2 07:42:29.453268 kernel: audit: type=1130 audit(1719906149.448:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.454607 systemd[1]: Finished systemd-sysext.service. Jul 2 07:42:29.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.458511 systemd[1]: Mounting boot.mount... Jul 2 07:42:29.460198 systemd[1]: Starting ensure-sysext.service... Jul 2 07:42:29.461115 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:42:29.461152 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.461949 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:42:29.465467 systemd[1]: Reloading. Jul 2 07:42:29.473210 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:42:29.475098 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:42:29.477490 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:42:29.496835 ldconfig[1033]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:42:29.569907 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:42:29.569923 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:42:29.635000 audit: BPF prog-id=30 op=LOAD Jul 2 07:42:29.635000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:42:29.635000 audit: BPF prog-id=31 op=LOAD Jul 2 07:42:29.635000 audit: BPF prog-id=32 op=LOAD Jul 2 07:42:29.635000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:42:29.635000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:42:29.636000 audit: BPF prog-id=33 op=LOAD Jul 2 07:42:29.636000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:42:29.637000 audit: BPF prog-id=34 op=LOAD Jul 2 07:42:29.637000 audit: BPF prog-id=35 op=LOAD Jul 2 07:42:29.637000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:42:29.637000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:42:29.638000 audit: BPF prog-id=36 op=LOAD Jul 2 07:42:29.638000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:42:29.638000 audit: BPF prog-id=37 op=LOAD Jul 2 07:42:29.638000 audit: BPF prog-id=38 op=LOAD Jul 2 07:42:29.638000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:42:29.638000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:42:29.641717 systemd[1]: Finished ldconfig.service. Jul 2 07:42:29.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.666392 systemd[1]: Mounted boot.mount. Jul 2 07:42:29.673990 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.674168 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.675186 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:42:29.676889 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:42:29.678911 systemd[1]: Starting modprobe@loop.service... Jul 2 07:42:29.679763 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.679856 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:29.679949 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.680699 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:42:29.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.682000 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:42:29.682100 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:42:29.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.683316 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:42:29.683413 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:42:29.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.684584 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:42:29.684686 systemd[1]: Finished modprobe@loop.service. Jul 2 07:42:29.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.685874 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:42:29.685961 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.687221 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.687435 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.688640 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:42:29.690303 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:42:29.691939 systemd[1]: Starting modprobe@loop.service... Jul 2 07:42:29.692709 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.692805 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:29.692896 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.693604 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:42:29.693736 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:42:29.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.694916 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:42:29.695008 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:42:29.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.696193 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:42:29.696357 systemd[1]: Finished modprobe@loop.service. Jul 2 07:42:29.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.699131 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.699459 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.700400 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:42:29.702040 systemd[1]: Starting modprobe@drm.service... Jul 2 07:42:29.703723 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:42:29.705363 systemd[1]: Starting modprobe@loop.service... Jul 2 07:42:29.706170 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.706351 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:29.706476 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:42:29.707348 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:42:29.707449 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:42:29.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.708615 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:42:29.708714 systemd[1]: Finished modprobe@drm.service. Jul 2 07:42:29.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.709821 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:42:29.709912 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:42:29.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.711076 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:42:29.711170 systemd[1]: Finished modprobe@loop.service. Jul 2 07:42:29.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.712422 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:42:29.712498 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:42:29.713302 systemd[1]: Finished ensure-sysext.service. Jul 2 07:42:29.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.722929 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:42:29.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.724951 systemd[1]: Starting audit-rules.service... Jul 2 07:42:29.726524 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:42:29.728308 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:42:29.729000 audit: BPF prog-id=39 op=LOAD Jul 2 07:42:29.730798 systemd[1]: Starting systemd-resolved.service... Jul 2 07:42:29.731000 audit: BPF prog-id=40 op=LOAD Jul 2 07:42:29.732801 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:42:29.734462 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:42:29.735817 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:42:29.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.737131 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:42:29.737000 audit[1133]: SYSTEM_BOOT pid=1133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.742371 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:42:29.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.744819 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:42:29.747178 systemd[1]: Starting systemd-update-done.service... Jul 2 07:42:29.752520 systemd[1]: Finished systemd-update-done.service. Jul 2 07:42:29.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:29.754000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:42:29.754000 audit[1141]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff252e8ba0 a2=420 a3=0 items=0 ppid=1120 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:29.754000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:42:29.755096 augenrules[1141]: No rules Jul 2 07:42:29.755561 systemd[1]: Finished audit-rules.service. Jul 2 07:42:29.777464 systemd-resolved[1129]: Positive Trust Anchors: Jul 2 07:42:29.777476 systemd-resolved[1129]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:42:29.777501 systemd-resolved[1129]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:42:29.779127 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:42:30.615203 systemd-timesyncd[1130]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 2 07:42:30.615240 systemd-timesyncd[1130]: Initial clock synchronization to Tue 2024-07-02 07:42:30.615129 UTC. Jul 2 07:42:30.616558 systemd[1]: Reached target time-set.target. Jul 2 07:42:30.619656 systemd-resolved[1129]: Defaulting to hostname 'linux'. Jul 2 07:42:30.620885 systemd[1]: Started systemd-resolved.service. Jul 2 07:42:30.621783 systemd[1]: Reached target network.target. Jul 2 07:42:30.622606 systemd[1]: Reached target nss-lookup.target. Jul 2 07:42:30.623447 systemd[1]: Reached target sysinit.target. Jul 2 07:42:30.624329 systemd[1]: Started motdgen.path. Jul 2 07:42:30.625164 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:42:30.626501 systemd[1]: Started logrotate.timer. Jul 2 07:42:30.627329 systemd[1]: Started mdadm.timer. Jul 2 07:42:30.628042 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:42:30.628916 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:42:30.628942 systemd[1]: Reached target paths.target. Jul 2 07:42:30.629721 systemd[1]: Reached target timers.target. Jul 2 07:42:30.630794 systemd[1]: Listening on dbus.socket. Jul 2 07:42:30.633722 systemd[1]: Listening on sshd.socket. Jul 2 07:42:30.634514 systemd[1]: Reached target sockets.target. Jul 2 07:42:30.635380 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:30.635405 systemd[1]: Reached target basic.target. Jul 2 07:42:30.636214 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:30.636239 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:30.637096 systemd[1]: Starting dbus.service... Jul 2 07:42:30.638550 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:42:30.640252 systemd[1]: Starting extend-filesystems.service... Jul 2 07:42:30.641257 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:42:30.642176 jq[1149]: false Jul 2 07:42:30.642302 systemd[1]: Starting motdgen.service... Jul 2 07:42:30.644403 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:42:30.646172 systemd[1]: Starting sshd-keygen.service... Jul 2 07:42:30.649207 systemd[1]: Starting systemd-logind.service... Jul 2 07:42:30.650082 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:42:30.650126 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:42:30.650380 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:42:30.651309 systemd[1]: Starting update-engine.service... Jul 2 07:42:30.653502 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:42:30.658064 jq[1167]: true Jul 2 07:42:30.657726 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:42:30.657846 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:42:30.658056 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:42:30.658167 systemd[1]: Finished motdgen.service. Jul 2 07:42:30.659024 extend-filesystems[1150]: Found sr0 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda1 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda2 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda3 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found usr Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda4 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda6 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda7 Jul 2 07:42:30.659024 extend-filesystems[1150]: Found vda9 Jul 2 07:42:30.659024 extend-filesystems[1150]: Checking size of /dev/vda9 Jul 2 07:42:30.659149 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:42:30.661535 dbus-daemon[1148]: [system] SELinux support is enabled Jul 2 07:42:30.659872 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:42:30.664938 systemd[1]: Started dbus.service. Jul 2 07:42:30.670769 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:42:30.670794 systemd[1]: Reached target system-config.target. Jul 2 07:42:30.671797 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:42:30.671809 systemd[1]: Reached target user-config.target. Jul 2 07:42:30.676939 jq[1170]: true Jul 2 07:42:30.685961 update_engine[1162]: I0702 07:42:30.680874 1162 main.cc:92] Flatcar Update Engine starting Jul 2 07:42:30.685961 update_engine[1162]: I0702 07:42:30.685173 1162 update_check_scheduler.cc:74] Next update check in 3m10s Jul 2 07:42:30.685145 systemd[1]: Started update-engine.service. Jul 2 07:42:30.687669 systemd[1]: Started locksmithd.service. Jul 2 07:42:30.690811 systemd-logind[1159]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:42:30.690835 systemd-logind[1159]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:42:30.691060 systemd-logind[1159]: New seat seat0. Jul 2 07:42:30.691769 extend-filesystems[1150]: Old size kept for /dev/vda9 Jul 2 07:42:30.691965 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:42:30.692124 systemd[1]: Finished extend-filesystems.service. Jul 2 07:42:30.695464 systemd[1]: Started systemd-logind.service. Jul 2 07:42:30.773201 locksmithd[1182]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:42:30.960533 bash[1189]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:42:30.961378 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:42:31.309025 sshd_keygen[1164]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:42:31.325726 systemd[1]: Finished sshd-keygen.service. Jul 2 07:42:31.327755 systemd[1]: Starting issuegen.service... Jul 2 07:42:31.331626 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:42:31.331731 systemd[1]: Finished issuegen.service. Jul 2 07:42:31.333393 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:42:31.337725 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:42:31.339586 systemd[1]: Started getty@tty1.service. Jul 2 07:42:31.341199 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:42:31.342213 systemd[1]: Reached target getty.target. Jul 2 07:42:31.343056 systemd[1]: Reached target multi-user.target. Jul 2 07:42:31.344714 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:42:31.352175 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:42:31.352283 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:42:31.353351 systemd[1]: Startup finished in 585ms (kernel) + 3.428s (initrd) + 2.442s (userspace) = 6.456s. Jul 2 07:42:31.878204 systemd-networkd[1005]: eth0: Gained IPv6LL Jul 2 07:42:32.343546 systemd[1]: Created slice system-sshd.slice. Jul 2 07:42:32.344315 systemd[1]: Started sshd@0-10.0.0.20:22-10.0.0.1:54924.service. Jul 2 07:42:32.374243 sshd[1210]: Accepted publickey for core from 10.0.0.1 port 54924 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:32.375449 sshd[1210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.382362 systemd[1]: Created slice user-500.slice. Jul 2 07:42:32.383449 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:42:32.385070 systemd-logind[1159]: New session 1 of user core. Jul 2 07:42:32.390061 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:42:32.391159 systemd[1]: Starting user@500.service... Jul 2 07:42:32.393915 (systemd)[1213]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.462188 systemd[1213]: Queued start job for default target default.target. Jul 2 07:42:32.462563 systemd[1213]: Reached target paths.target. Jul 2 07:42:32.462580 systemd[1213]: Reached target sockets.target. Jul 2 07:42:32.462591 systemd[1213]: Reached target timers.target. Jul 2 07:42:32.462601 systemd[1213]: Reached target basic.target. Jul 2 07:42:32.462634 systemd[1213]: Reached target default.target. Jul 2 07:42:32.462654 systemd[1213]: Startup finished in 63ms. Jul 2 07:42:32.462807 systemd[1]: Started user@500.service. Jul 2 07:42:32.464054 systemd[1]: Started session-1.scope. Jul 2 07:42:32.513507 systemd[1]: Started sshd@1-10.0.0.20:22-10.0.0.1:44958.service. Jul 2 07:42:32.543836 sshd[1222]: Accepted publickey for core from 10.0.0.1 port 44958 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:32.544916 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.548883 systemd-logind[1159]: New session 2 of user core. Jul 2 07:42:32.549852 systemd[1]: Started session-2.scope. Jul 2 07:42:32.602367 sshd[1222]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:32.605315 systemd[1]: sshd@1-10.0.0.20:22-10.0.0.1:44958.service: Deactivated successfully. Jul 2 07:42:32.605969 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:42:32.606569 systemd-logind[1159]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:42:32.607597 systemd[1]: Started sshd@2-10.0.0.20:22-10.0.0.1:44962.service. Jul 2 07:42:32.608404 systemd-logind[1159]: Removed session 2. Jul 2 07:42:32.635297 sshd[1228]: Accepted publickey for core from 10.0.0.1 port 44962 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:32.636228 sshd[1228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.639570 systemd-logind[1159]: New session 3 of user core. Jul 2 07:42:32.640318 systemd[1]: Started session-3.scope. Jul 2 07:42:32.690907 sshd[1228]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:32.693865 systemd[1]: sshd@2-10.0.0.20:22-10.0.0.1:44962.service: Deactivated successfully. Jul 2 07:42:32.694336 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:42:32.694793 systemd-logind[1159]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:42:32.695788 systemd[1]: Started sshd@3-10.0.0.20:22-10.0.0.1:44964.service. Jul 2 07:42:32.696551 systemd-logind[1159]: Removed session 3. Jul 2 07:42:32.724104 sshd[1234]: Accepted publickey for core from 10.0.0.1 port 44964 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:32.725279 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.728662 systemd-logind[1159]: New session 4 of user core. Jul 2 07:42:32.729356 systemd[1]: Started session-4.scope. Jul 2 07:42:32.781108 sshd[1234]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:32.784159 systemd[1]: sshd@3-10.0.0.20:22-10.0.0.1:44964.service: Deactivated successfully. Jul 2 07:42:32.784799 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:42:32.785321 systemd-logind[1159]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:42:32.786471 systemd[1]: Started sshd@4-10.0.0.20:22-10.0.0.1:44980.service. Jul 2 07:42:32.787197 systemd-logind[1159]: Removed session 4. Jul 2 07:42:32.815712 sshd[1240]: Accepted publickey for core from 10.0.0.1 port 44980 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:32.816639 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.819782 systemd-logind[1159]: New session 5 of user core. Jul 2 07:42:32.820518 systemd[1]: Started session-5.scope. Jul 2 07:42:32.875293 sudo[1243]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:42:32.875555 sudo[1243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:32.883273 dbus-daemon[1148]: \xd0\xcdF\xb6yU: received setenforce notice (enforcing=180147568) Jul 2 07:42:32.886185 sudo[1243]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:32.887955 sshd[1240]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:32.891081 systemd[1]: sshd@4-10.0.0.20:22-10.0.0.1:44980.service: Deactivated successfully. Jul 2 07:42:32.891589 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:42:32.892119 systemd-logind[1159]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:42:32.893112 systemd[1]: Started sshd@5-10.0.0.20:22-10.0.0.1:44988.service. Jul 2 07:42:32.893897 systemd-logind[1159]: Removed session 5. Jul 2 07:42:32.923453 sshd[1247]: Accepted publickey for core from 10.0.0.1 port 44988 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:32.924532 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:32.927720 systemd-logind[1159]: New session 6 of user core. Jul 2 07:42:32.928415 systemd[1]: Started session-6.scope. Jul 2 07:42:32.980800 sudo[1251]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:42:32.981032 sudo[1251]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:32.983717 sudo[1251]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:32.988193 sudo[1250]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:42:32.988362 sudo[1250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:32.996192 systemd[1]: Stopping audit-rules.service... Jul 2 07:42:32.996000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:42:32.996000 audit[1254]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2c919610 a2=420 a3=0 items=0 ppid=1 pid=1254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:32.996000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:42:32.997808 auditctl[1254]: No rules Jul 2 07:42:32.998153 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:42:32.998342 systemd[1]: Stopped audit-rules.service. Jul 2 07:42:32.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.000063 systemd[1]: Starting audit-rules.service... Jul 2 07:42:33.014673 augenrules[1271]: No rules Jul 2 07:42:33.015310 systemd[1]: Finished audit-rules.service. Jul 2 07:42:33.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.016139 sudo[1250]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:33.015000 audit[1250]: USER_END pid=1250 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.015000 audit[1250]: CRED_DISP pid=1250 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.017237 sshd[1247]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:33.017000 audit[1247]: USER_END pid=1247 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.017000 audit[1247]: CRED_DISP pid=1247 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.019720 systemd[1]: sshd@5-10.0.0.20:22-10.0.0.1:44988.service: Deactivated successfully. Jul 2 07:42:33.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.20:22-10.0.0.1:44988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.020167 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:42:33.020721 systemd-logind[1159]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:42:33.021718 systemd[1]: Started sshd@6-10.0.0.20:22-10.0.0.1:44996.service. Jul 2 07:42:33.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.20:22-10.0.0.1:44996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.022474 systemd-logind[1159]: Removed session 6. Jul 2 07:42:33.049000 audit[1277]: USER_ACCT pid=1277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.050781 sshd[1277]: Accepted publickey for core from 10.0.0.1 port 44996 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:33.050000 audit[1277]: CRED_ACQ pid=1277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.050000 audit[1277]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee75cffe0 a2=3 a3=0 items=0 ppid=1 pid=1277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:33.050000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:33.052239 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:33.055502 systemd-logind[1159]: New session 7 of user core. Jul 2 07:42:33.056266 systemd[1]: Started session-7.scope. Jul 2 07:42:33.059000 audit[1277]: USER_START pid=1277 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.060000 audit[1279]: CRED_ACQ pid=1279 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.107103 sshd[1277]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:33.107000 audit[1277]: USER_END pid=1277 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.107000 audit[1277]: CRED_DISP pid=1277 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.109928 systemd[1]: sshd@6-10.0.0.20:22-10.0.0.1:44996.service: Deactivated successfully. Jul 2 07:42:33.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.20:22-10.0.0.1:44996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.110454 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:42:33.110923 systemd-logind[1159]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:42:33.111846 systemd[1]: Started sshd@7-10.0.0.20:22-10.0.0.1:45002.service. Jul 2 07:42:33.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.20:22-10.0.0.1:45002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.112630 systemd-logind[1159]: Removed session 7. Jul 2 07:42:33.139000 audit[1284]: USER_ACCT pid=1284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.140716 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 45002 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:33.140000 audit[1284]: CRED_ACQ pid=1284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.140000 audit[1284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8e2712c0 a2=3 a3=0 items=0 ppid=1 pid=1284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:33.140000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:33.141822 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:33.145106 systemd-logind[1159]: New session 8 of user core. Jul 2 07:42:33.145807 systemd[1]: Started session-8.scope. Jul 2 07:42:33.148000 audit[1284]: USER_START pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.149000 audit[1286]: CRED_ACQ pid=1286 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.740299 sshd[1284]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:33.740000 audit[1284]: USER_END pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.740000 audit[1284]: CRED_DISP pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.743275 systemd[1]: sshd@7-10.0.0.20:22-10.0.0.1:45002.service: Deactivated successfully. Jul 2 07:42:33.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.20:22-10.0.0.1:45002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.743847 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:42:33.744401 systemd-logind[1159]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:42:33.745462 systemd[1]: Started sshd@8-10.0.0.20:22-10.0.0.1:45016.service. Jul 2 07:42:33.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.20:22-10.0.0.1:45016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:33.746433 systemd-logind[1159]: Removed session 8. Jul 2 07:42:33.773000 audit[1299]: USER_ACCT pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.774726 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 45016 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:33.774000 audit[1299]: CRED_ACQ pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.774000 audit[1299]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdea987a0 a2=3 a3=0 items=0 ppid=1 pid=1299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:33.774000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:33.775526 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:33.778476 systemd-logind[1159]: New session 9 of user core. Jul 2 07:42:33.779107 systemd[1]: Started session-9.scope. Jul 2 07:42:33.781000 audit[1299]: USER_START pid=1299 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:33.782000 audit[1302]: CRED_ACQ pid=1302 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.376000 audit[1303]: USER_ACCT pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.377627 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 2 07:42:40.377777 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:40.378572 kernel: kauditd_printk_skb: 95 callbacks suppressed Jul 2 07:42:40.378657 kernel: audit: type=1101 audit(1719906160.376:247): pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.380349 sudo[1303]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:40.376000 audit[1303]: CRED_REFR pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.383599 sshd[1299]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:40.384712 systemd[1]: Started sshd@9-10.0.0.20:22-10.0.0.1:45028.service. Jul 2 07:42:40.386482 kernel: audit: type=1110 audit(1719906160.376:248): pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.386519 kernel: audit: type=1105 audit(1719906160.378:249): pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.378000 audit[1303]: USER_START pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.388288 systemd[1]: sshd@8-10.0.0.20:22-10.0.0.1:45016.service: Deactivated successfully. Jul 2 07:42:40.388803 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:42:40.388918 systemd[1]: session-9.scope: Consumed 3.893s CPU time. Jul 2 07:42:40.389310 systemd-logind[1159]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:42:40.389936 systemd-logind[1159]: Removed session 9. Jul 2 07:42:40.390746 kernel: audit: type=1106 audit(1719906160.379:250): pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.379000 audit[1303]: USER_END pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.394964 kernel: audit: type=1104 audit(1719906160.379:251): pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.379000 audit[1303]: CRED_DISP pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.20:22-10.0.0.1:45028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.402695 kernel: audit: type=1130 audit(1719906160.383:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.20:22-10.0.0.1:45028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.402718 kernel: audit: type=1106 audit(1719906160.384:253): pid=1299 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.384000 audit[1299]: USER_END pid=1299 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.384000 audit[1299]: CRED_DISP pid=1299 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.411798 kernel: audit: type=1104 audit(1719906160.384:254): pid=1299 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.411831 kernel: audit: type=1131 audit(1719906160.387:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.20:22-10.0.0.1:45016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.20:22-10.0.0.1:45016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.417000 audit[1359]: USER_ACCT pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.418956 sshd[1359]: Accepted publickey for core from 10.0.0.1 port 45028 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:40.420484 sshd[1359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:40.419000 audit[1359]: CRED_ACQ pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.419000 audit[1359]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff30196390 a2=3 a3=0 items=0 ppid=1 pid=1359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:40.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:40.423036 kernel: audit: type=1101 audit(1719906160.417:256): pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.423578 systemd-logind[1159]: New session 10 of user core. Jul 2 07:42:40.424297 systemd[1]: Started session-10.scope. Jul 2 07:42:40.426000 audit[1359]: USER_START pid=1359 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.427000 audit[1362]: CRED_ACQ pid=1362 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.473000 audit[1363]: USER_ACCT pid=1363 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.473000 audit[1363]: CRED_REFR pid=1363 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.474477 sudo[1363]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 2 07:42:40.474637 sudo[1363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:40.474000 audit[1363]: USER_START pid=1363 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.480601 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 2 07:42:40.480744 systemd[1]: Stopped ensure-sysext.service. Jul 2 07:42:40.480792 systemd[1]: Stopping ensure-sysext.service... Jul 2 07:42:40.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.481762 systemd[1]: Stopping systemd-sysext.service... Jul 2 07:42:40.491722 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:40.491897 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:40.493136 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 2 07:42:40.493263 systemd[1]: Stopped systemd-sysext.service. Jul 2 07:42:40.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.494488 systemd[1]: Starting systemd-sysext.service... Jul 2 07:42:40.499559 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:42:40.502266 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:42:40.502410 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:42:40.510031 kernel: loop0: detected capacity change from 0 to 322896 Jul 2 07:42:40.515041 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:40.533045 kernel: loop1: detected capacity change from 0 to 301320 Jul 2 07:42:40.537046 kernel: EXT4-fs (loop1): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:40.552042 kernel: loop2: detected capacity change from 0 to 322896 Jul 2 07:42:40.556035 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:40.558067 kernel: loop3: detected capacity change from 0 to 301320 Jul 2 07:42:40.561418 (sd-sysext)[1376]: Using extensions 'containerd', 'docker'. Jul 2 07:42:40.561772 (sd-sysext)[1376]: Merged extensions into '/usr'. Jul 2 07:42:40.562045 kernel: EXT4-fs (loop3): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:40.578506 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:42:40.583049 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:42:40.583956 systemd[1]: Finished systemd-sysext.service. Jul 2 07:42:40.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.584601 sudo[1363]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:40.583000 audit[1363]: USER_END pid=1363 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.583000 audit[1363]: CRED_DISP pid=1363 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.584838 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:40.584924 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:40.585906 sshd[1359]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:40.585959 systemd[1]: Starting ensure-sysext.service... Jul 2 07:42:40.586000 audit[1359]: USER_END pid=1359 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.586000 audit[1359]: CRED_DISP pid=1359 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.20:22-10.0.0.1:45044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.589221 systemd[1]: Started sshd@10-10.0.0.20:22-10.0.0.1:45044.service. Jul 2 07:42:40.589609 systemd[1]: sshd@9-10.0.0.20:22-10.0.0.1:45028.service: Deactivated successfully. Jul 2 07:42:40.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.20:22-10.0.0.1:45028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.590181 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:42:40.590663 systemd-logind[1159]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:42:40.591978 systemd[1]: Reloading. Jul 2 07:42:40.707252 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:42:40.707267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:42:40.722914 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.779000 audit: BPF prog-id=46 op=LOAD Jul 2 07:42:40.779000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit: BPF prog-id=47 op=LOAD Jul 2 07:42:40.780000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit: BPF prog-id=48 op=LOAD Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.780000 audit: BPF prog-id=49 op=LOAD Jul 2 07:42:40.780000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:42:40.780000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit: BPF prog-id=50 op=LOAD Jul 2 07:42:40.784000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit: BPF prog-id=51 op=LOAD Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit: BPF prog-id=52 op=LOAD Jul 2 07:42:40.784000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:42:40.784000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.784000 audit: BPF prog-id=53 op=LOAD Jul 2 07:42:40.784000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit: BPF prog-id=54 op=LOAD Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.785000 audit: BPF prog-id=55 op=LOAD Jul 2 07:42:40.785000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:42:40.785000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.786000 audit: BPF prog-id=56 op=LOAD Jul 2 07:42:40.786000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit: BPF prog-id=57 op=LOAD Jul 2 07:42:40.788000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.788000 audit: BPF prog-id=58 op=LOAD Jul 2 07:42:40.788000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit: BPF prog-id=59 op=LOAD Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:40.789000 audit: BPF prog-id=60 op=LOAD Jul 2 07:42:40.789000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:42:40.789000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:42:40.798948 systemd-logind[1159]: Removed session 10. Jul 2 07:42:40.801469 systemd[1]: Starting docker.socket... Jul 2 07:42:40.802749 systemd[1]: Starting containerd.service... Jul 2 07:42:40.803151 systemd[1]: Listening on docker.socket. Jul 2 07:42:40.806791 systemd[1]: Stopped target sockets.target. Jul 2 07:42:40.806813 systemd[1]: Stopping sockets.target... Jul 2 07:42:40.806914 systemd[1]: Reached target sockets.target. Jul 2 07:42:40.807690 systemd[1]: Started containerd.service. Jul 2 07:42:40.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.809148 systemd[1]: Stopped target timers.target. Jul 2 07:42:40.809180 systemd[1]: Stopping timers.target... Jul 2 07:42:40.809253 systemd[1]: Reached target timers.target. Jul 2 07:42:40.811083 systemd[1]: Stopped target multi-user.target. Jul 2 07:42:40.811105 systemd[1]: Stopping multi-user.target... Jul 2 07:42:40.811123 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:42:40.812458 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:42:40.813635 systemd[1]: Starting extend-filesystems.service... Jul 2 07:42:40.814748 systemd[1]: Starting issuegen.service... Jul 2 07:42:40.815849 systemd[1]: Starting motdgen.service... Jul 2 07:42:40.817215 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:42:40.819397 jq[1446]: false Jul 2 07:42:40.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.817272 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:42:40.819331 systemd[1]: Finished ensure-sysext.service. Jul 2 07:42:40.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.819765 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:42:40.819880 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:42:40.820266 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:42:40.820371 systemd[1]: Finished issuegen.service. Jul 2 07:42:40.822224 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:42:40.822330 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:42:40.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.826188 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:42:40.826306 systemd[1]: Finished motdgen.service. Jul 2 07:42:40.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.827950 extend-filesystems[1447]: Found loop2 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found loop3 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found sr0 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda1 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda2 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda3 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found usr Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda4 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda6 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda7 Jul 2 07:42:40.828875 extend-filesystems[1447]: Found vda9 Jul 2 07:42:40.828875 extend-filesystems[1447]: Checking size of /dev/vda9 Jul 2 07:42:40.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.837516 extend-filesystems[1447]: Old size kept for /dev/vda9 Jul 2 07:42:40.836195 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:42:40.836320 systemd[1]: Finished extend-filesystems.service. Jul 2 07:42:40.836565 systemd[1]: Reached target multi-user.target. Jul 2 07:42:40.837633 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:42:40.846761 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:42:40.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:40.847171 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:42:40.879943 containerd[1445]: time="2024-07-02T07:42:40.879881351Z" level=info msg="starting containerd" revision=1c90a442489720eec95342e1789ee8a5e1b9536f version=v1.6.9 Jul 2 07:42:40.895987 containerd[1445]: time="2024-07-02T07:42:40.895952390Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:42:40.896097 containerd[1445]: time="2024-07-02T07:42:40.896069389Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:40.897199 containerd[1445]: time="2024-07-02T07:42:40.897160415Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:42:40.897199 containerd[1445]: time="2024-07-02T07:42:40.897187206Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:40.897368 containerd[1445]: time="2024-07-02T07:42:40.897340193Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:42:40.897368 containerd[1445]: time="2024-07-02T07:42:40.897358918Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:40.897422 containerd[1445]: time="2024-07-02T07:42:40.897370990Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:42:40.897422 containerd[1445]: time="2024-07-02T07:42:40.897380428Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:40.897461 containerd[1445]: time="2024-07-02T07:42:40.897440751Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:40.898040 containerd[1445]: time="2024-07-02T07:42:40.898003647Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:40.898150 containerd[1445]: time="2024-07-02T07:42:40.898124764Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:42:40.898150 containerd[1445]: time="2024-07-02T07:42:40.898144140Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:42:40.898202 containerd[1445]: time="2024-07-02T07:42:40.898192321Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:42:40.898230 containerd[1445]: time="2024-07-02T07:42:40.898205355Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:42:40.903728 containerd[1445]: time="2024-07-02T07:42:40.903700030Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:42:40.903728 containerd[1445]: time="2024-07-02T07:42:40.903726690Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:42:40.903789 containerd[1445]: time="2024-07-02T07:42:40.903739744Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:42:40.903789 containerd[1445]: time="2024-07-02T07:42:40.903768608Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.903789 containerd[1445]: time="2024-07-02T07:42:40.903787584Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.903856 containerd[1445]: time="2024-07-02T07:42:40.903802432Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.903856 containerd[1445]: time="2024-07-02T07:42:40.903815456Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.904216 containerd[1445]: time="2024-07-02T07:42:40.904193234Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.904216 containerd[1445]: time="2024-07-02T07:42:40.904212982Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.904261 containerd[1445]: time="2024-07-02T07:42:40.904225806Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.904261 containerd[1445]: time="2024-07-02T07:42:40.904238129Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.904261 containerd[1445]: time="2024-07-02T07:42:40.904250241Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:42:40.904339 containerd[1445]: time="2024-07-02T07:42:40.904324230Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:42:40.904408 containerd[1445]: time="2024-07-02T07:42:40.904387238Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:42:40.904845 containerd[1445]: time="2024-07-02T07:42:40.904822434Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:42:40.904868 containerd[1445]: time="2024-07-02T07:42:40.904848944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.904868 containerd[1445]: time="2024-07-02T07:42:40.904861227Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:42:40.904912 containerd[1445]: time="2024-07-02T07:42:40.904902074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.904934 containerd[1445]: time="2024-07-02T07:42:40.904913365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.904934 containerd[1445]: time="2024-07-02T07:42:40.904924977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.904972 containerd[1445]: time="2024-07-02T07:42:40.904935376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.904972 containerd[1445]: time="2024-07-02T07:42:40.904946397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.904972 containerd[1445]: time="2024-07-02T07:42:40.904957317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905063 containerd[1445]: time="2024-07-02T07:42:40.904975542Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905063 containerd[1445]: time="2024-07-02T07:42:40.904987053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905063 containerd[1445]: time="2024-07-02T07:42:40.904999897Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:42:40.905167 containerd[1445]: time="2024-07-02T07:42:40.905137044Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905167 containerd[1445]: time="2024-07-02T07:42:40.905165638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905216 containerd[1445]: time="2024-07-02T07:42:40.905177500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905216 containerd[1445]: time="2024-07-02T07:42:40.905188361Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:42:40.905216 containerd[1445]: time="2024-07-02T07:42:40.905201245Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:42:40.905216 containerd[1445]: time="2024-07-02T07:42:40.905209801Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:42:40.905291 containerd[1445]: time="2024-07-02T07:42:40.905233596Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:42:40.905291 containerd[1445]: time="2024-07-02T07:42:40.905265636Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:42:40.905484 containerd[1445]: time="2024-07-02T07:42:40.905438189Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:42:40.906090 containerd[1445]: time="2024-07-02T07:42:40.905489315Z" level=info msg="Connect containerd service" Jul 2 07:42:40.906090 containerd[1445]: time="2024-07-02T07:42:40.905521946Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:42:40.906150 containerd[1445]: time="2024-07-02T07:42:40.906135968Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:42:40.906613 containerd[1445]: time="2024-07-02T07:42:40.906593275Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:42:40.906681 containerd[1445]: time="2024-07-02T07:42:40.906633531Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:42:40.906681 containerd[1445]: time="2024-07-02T07:42:40.906648008Z" level=info msg="containerd successfully booted in 0.028085s" Jul 2 07:42:40.906724 containerd[1445]: time="2024-07-02T07:42:40.906683424Z" level=info msg="Start subscribing containerd event" Jul 2 07:42:40.906746 containerd[1445]: time="2024-07-02T07:42:40.906738047Z" level=info msg="Start recovering state" Jul 2 07:42:40.906910 containerd[1445]: time="2024-07-02T07:42:40.906893368Z" level=info msg="Start event monitor" Jul 2 07:42:40.906939 containerd[1445]: time="2024-07-02T07:42:40.906910851Z" level=info msg="Start snapshots syncer" Jul 2 07:42:40.906939 containerd[1445]: time="2024-07-02T07:42:40.906919878Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:42:40.906939 containerd[1445]: time="2024-07-02T07:42:40.906928775Z" level=info msg="Start streaming server" Jul 2 07:42:40.936000 audit[1383]: USER_ACCT pid=1383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.937583 sshd[1383]: Accepted publickey for core from 10.0.0.1 port 45044 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:40.937000 audit[1383]: CRED_ACQ pid=1383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.937000 audit[1383]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4afc0820 a2=3 a3=0 items=0 ppid=1 pid=1383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:40.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:40.938843 sshd[1383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:40.942101 systemd-logind[1159]: New session 11 of user core. Jul 2 07:42:40.942902 systemd[1]: Started session-11.scope. Jul 2 07:42:40.945000 audit[1383]: USER_START pid=1383 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:40.946000 audit[1482]: CRED_ACQ pid=1482 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:41.027869 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:42:41.032741 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:42:41.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:41.033057 systemd[1]: Reached target network-online.target. Jul 2 07:42:41.034311 systemd[1]: Starting docker.service... Jul 2 07:42:41.095819 dockerd[1491]: time="2024-07-02T07:42:41.095758969Z" level=info msg="Starting up" Jul 2 07:42:41.098247 dockerd[1491]: time="2024-07-02T07:42:41.098223020Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:42:41.098247 dockerd[1491]: time="2024-07-02T07:42:41.098242867Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:42:41.098415 dockerd[1491]: time="2024-07-02T07:42:41.098385244Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:42:41.098415 dockerd[1491]: time="2024-07-02T07:42:41.098412585Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:42:41.101323 dockerd[1491]: time="2024-07-02T07:42:41.101292877Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:42:41.101323 dockerd[1491]: time="2024-07-02T07:42:41.101315339Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:42:41.101391 dockerd[1491]: time="2024-07-02T07:42:41.101331960Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:42:41.101391 dockerd[1491]: time="2024-07-02T07:42:41.101351787Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:42:41.133751 dockerd[1491]: time="2024-07-02T07:42:41.133711663Z" level=info msg="Loading containers: start." Jul 2 07:42:41.186000 audit[1524]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.186000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcce1bf4a0 a2=0 a3=7ffcce1bf48c items=0 ppid=1491 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:42:41.187000 audit[1526]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.187000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff30304840 a2=0 a3=7fff3030482c items=0 ppid=1491 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.187000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:42:41.189000 audit[1528]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.189000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe47413a60 a2=0 a3=7ffe47413a4c items=0 ppid=1491 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:41.191000 audit[1530]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.191000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe425cefe0 a2=0 a3=7ffe425cefcc items=0 ppid=1491 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:41.192000 audit[1532]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.192000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff072705a0 a2=0 a3=7fff0727058c items=0 ppid=1491 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.192000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:42:41.214000 audit[1537]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.214000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd012dd1a0 a2=0 a3=7ffd012dd18c items=0 ppid=1491 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:42:41.223000 audit[1539]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.223000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda6737030 a2=0 a3=7ffda673701c items=0 ppid=1491 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.223000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:42:41.224000 audit[1541]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.224000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeeae07620 a2=0 a3=7ffeeae0760c items=0 ppid=1491 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.224000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:42:41.226000 audit[1543]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.226000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffed8f2ca20 a2=0 a3=7ffed8f2ca0c items=0 ppid=1491 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:41.234000 audit[1547]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.234000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdb3c07510 a2=0 a3=7ffdb3c074fc items=0 ppid=1491 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.234000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:41.234000 audit[1548]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.234000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffdeda59e0 a2=0 a3=7fffdeda59cc items=0 ppid=1491 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.234000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:41.244037 kernel: Initializing XFRM netlink socket Jul 2 07:42:41.270814 dockerd[1491]: time="2024-07-02T07:42:41.270765248Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:42:41.283000 audit[1555]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.283000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdc226f420 a2=0 a3=7ffdc226f40c items=0 ppid=1491 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:42:41.296000 audit[1558]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.296000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff378b40e0 a2=0 a3=7fff378b40cc items=0 ppid=1491 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:42:41.299000 audit[1561]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.299000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe2fe91890 a2=0 a3=7ffe2fe9187c items=0 ppid=1491 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.299000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:42:41.300000 audit[1563]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.300000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc3448bdb0 a2=0 a3=7ffc3448bd9c items=0 ppid=1491 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:42:41.302000 audit[1565]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.302000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdc3eee8b0 a2=0 a3=7ffdc3eee89c items=0 ppid=1491 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:42:41.303000 audit[1567]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.303000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffec1cae440 a2=0 a3=7ffec1cae42c items=0 ppid=1491 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:42:41.305000 audit[1569]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.305000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd3da018f0 a2=0 a3=7ffd3da018dc items=0 ppid=1491 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:42:41.311000 audit[1572]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.311000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeb8060bc0 a2=0 a3=7ffeb8060bac items=0 ppid=1491 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:42:41.313000 audit[1574]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.313000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc16dc23a0 a2=0 a3=7ffc16dc238c items=0 ppid=1491 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.313000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:41.314000 audit[1576]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.314000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc9adbef80 a2=0 a3=7ffc9adbef6c items=0 ppid=1491 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:41.316000 audit[1578]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.316000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd42bc9d60 a2=0 a3=7ffd42bc9d4c items=0 ppid=1491 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:42:41.317581 systemd-networkd[1005]: docker0: Link UP Jul 2 07:42:41.324000 audit[1582]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.324000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7bdaaaf0 a2=0 a3=7ffe7bdaaadc items=0 ppid=1491 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:41.324000 audit[1583]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:41.324000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffaa6060e0 a2=0 a3=7fffaa6060cc items=0 ppid=1491 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:41.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:41.325994 dockerd[1491]: time="2024-07-02T07:42:41.325964266Z" level=info msg="Loading containers: done." Jul 2 07:42:41.345996 dockerd[1491]: time="2024-07-02T07:42:41.345941079Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:42:41.346214 dockerd[1491]: time="2024-07-02T07:42:41.346188634Z" level=info msg="Docker daemon" commit=3056208 graphdriver(s)=overlay2 version=20.10.21 Jul 2 07:42:41.346308 dockerd[1491]: time="2024-07-02T07:42:41.346288321Z" level=info msg="Daemon has completed initialization" Jul 2 07:42:41.363960 systemd[1]: Started docker.service. Jul 2 07:42:41.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:41.371138 dockerd[1491]: time="2024-07-02T07:42:41.371089572Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:42:42.602809 systemd[1]: var-lib-docker-overlay2-af23fc943bdd8a77c426c8152b0cb20b75e0584a3dc4cfc1b8c652a6fc8b384a\x2dinit-merged.mount: Deactivated successfully. Jul 2 07:42:42.641141 kernel: docker0: port 1(veth37246c4) entered blocking state Jul 2 07:42:42.641260 kernel: docker0: port 1(veth37246c4) entered disabled state Jul 2 07:42:42.641280 kernel: device veth37246c4 entered promiscuous mode Jul 2 07:42:42.638000 audit: ANOM_PROMISCUOUS dev=veth37246c4 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:42:42.638000 audit[1491]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=f a1=c000b60660 a2=28 a3=0 items=0 ppid=1 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.638000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:42:42.642259 systemd-networkd[1005]: veth37246c4: Link UP Jul 2 07:42:42.683756 containerd[1445]: time="2024-07-02T07:42:42.683666712Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:42:42.683756 containerd[1445]: time="2024-07-02T07:42:42.683709863Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:42:42.683756 containerd[1445]: time="2024-07-02T07:42:42.683735381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:42:42.684213 containerd[1445]: time="2024-07-02T07:42:42.684132546Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9 pid=1625 runtime=io.containerd.runc.v2 Jul 2 07:42:42.695535 systemd[1]: Started docker-cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9.scope. Jul 2 07:42:42.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit: BPF prog-id=61 op=LOAD Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019dc48 a2=10 a3=1c items=0 ppid=1625 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63616534633934653731663862313737663034386233643637 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019d6b0 a2=3c a3=c items=0 ppid=1625 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63616534633934653731663862313737663034386233643637 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit: BPF prog-id=62 op=LOAD Jul 2 07:42:42.704000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019d9d8 a2=78 a3=c000216d30 items=0 ppid=1625 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63616534633934653731663862313737663034386233643637 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.704000 audit: BPF prog-id=63 op=LOAD Jul 2 07:42:42.704000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019d770 a2=78 a3=c000216d78 items=0 ppid=1625 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63616534633934653731663862313737663034386233643637 Jul 2 07:42:42.704000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:42:42.705000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:42.705000 audit: BPF prog-id=64 op=LOAD Jul 2 07:42:42.705000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019dc30 a2=78 a3=c0002171d8 items=0 ppid=1625 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63616534633934653731663862313737663034386233643637 Jul 2 07:42:42.771050 kernel: eth0: renamed from vethb3a5603 Jul 2 07:42:42.779286 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth37246c4: link becomes ready Jul 2 07:42:42.779388 kernel: docker0: port 1(veth37246c4) entered blocking state Jul 2 07:42:42.779423 kernel: docker0: port 1(veth37246c4) entered forwarding state Jul 2 07:42:42.780422 systemd-networkd[1005]: veth37246c4: Gained carrier Jul 2 07:42:42.781497 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready Jul 2 07:42:42.781651 systemd-networkd[1005]: docker0: Gained carrier Jul 2 07:42:42.782823 systemd-resolved[1129]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 07:42:42.803813 systemd[1]: docker-cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9.scope: Deactivated successfully. Jul 2 07:42:42.802000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:42:42.804844 containerd[1445]: time="2024-07-02T07:42:42.804734638Z" level=warning msg="error from *cgroupsv2.Manager.EventChan" error="failed to add inotify watch for \"/sys/fs/cgroup/system.slice/docker-cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9.scope/memory.events\": no such file or directory" Jul 2 07:42:42.822668 containerd[1445]: time="2024-07-02T07:42:42.822617344Z" level=info msg="shim disconnected" id=cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9 Jul 2 07:42:42.822668 containerd[1445]: time="2024-07-02T07:42:42.822666306Z" level=warning msg="cleaning up after shim disconnected" id=cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9 namespace=moby Jul 2 07:42:42.822788 containerd[1445]: time="2024-07-02T07:42:42.822675854Z" level=info msg="cleaning up dead shim" Jul 2 07:42:42.822818 dockerd[1491]: time="2024-07-02T07:42:42.822639195Z" level=info msg="ignoring event" container=cae4c94e71f8b177f048b3d67ec1de6f1315c98a24b2c447131456084d83a5b9 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:42:42.828725 containerd[1445]: time="2024-07-02T07:42:42.828698258Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:42:42Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1679 runtime=io.containerd.runc.v2\n" Jul 2 07:42:42.832853 systemd-networkd[1005]: veth37246c4: Lost carrier Jul 2 07:42:42.833450 kernel: docker0: port 1(veth37246c4) entered disabled state Jul 2 07:42:42.833493 kernel: vethb3a5603: renamed from eth0 Jul 2 07:42:42.845330 systemd-networkd[1005]: veth37246c4: Link DOWN Jul 2 07:42:42.847236 kernel: docker0: port 1(veth37246c4) entered disabled state Jul 2 07:42:42.847289 kernel: device veth37246c4 left promiscuous mode Jul 2 07:42:42.847324 kernel: docker0: port 1(veth37246c4) entered disabled state Jul 2 07:42:42.844000 audit: ANOM_PROMISCUOUS dev=veth37246c4 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:42:42.844000 audit[1491]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=f a1=c000c548a0 a2=20 a3=0 items=0 ppid=1 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.844000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:42:42.894986 sshd[1383]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:42.894000 audit[1383]: USER_END pid=1383 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:42.894000 audit[1383]: CRED_DISP pid=1383 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:42.897993 systemd[1]: sshd@10-10.0.0.20:22-10.0.0.1:45044.service: Deactivated successfully. Jul 2 07:42:42.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.20:22-10.0.0.1:45044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:42.898653 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:42:42.899308 systemd-logind[1159]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:42:42.900428 systemd[1]: Started sshd@11-10.0.0.20:22-10.0.0.1:48578.service. Jul 2 07:42:42.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.20:22-10.0.0.1:48578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:42.901201 systemd-logind[1159]: Removed session 11. Jul 2 07:42:42.914000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:42:42.927000 audit[1695]: USER_ACCT pid=1695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:42.928358 sshd[1695]: Accepted publickey for core from 10.0.0.1 port 48578 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:42.928000 audit[1695]: CRED_ACQ pid=1695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:42.928000 audit[1695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecb5b3940 a2=3 a3=0 items=0 ppid=1 pid=1695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:42.928000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:42.929621 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:42.932784 systemd-logind[1159]: New session 12 of user core. Jul 2 07:42:42.933539 systemd[1]: Started session-12.scope. Jul 2 07:42:42.935000 audit[1695]: USER_START pid=1695 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:42.937000 audit[1697]: CRED_ACQ pid=1697 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.002570 sshd[1695]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:43.002000 audit[1695]: USER_END pid=1695 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.002000 audit[1695]: CRED_DISP pid=1695 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.005324 systemd[1]: sshd@11-10.0.0.20:22-10.0.0.1:48578.service: Deactivated successfully. Jul 2 07:42:43.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.20:22-10.0.0.1:48578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:43.005829 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:42:43.006389 systemd-logind[1159]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:42:43.007445 systemd[1]: Started sshd@12-10.0.0.20:22-10.0.0.1:48584.service. Jul 2 07:42:43.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.20:22-10.0.0.1:48584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:43.008207 systemd-logind[1159]: Removed session 12. Jul 2 07:42:43.034000 audit[1704]: USER_ACCT pid=1704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.035316 sshd[1704]: Accepted publickey for core from 10.0.0.1 port 48584 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:43.034000 audit[1704]: CRED_ACQ pid=1704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.034000 audit[1704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ad7ce80 a2=3 a3=0 items=0 ppid=1 pid=1704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:43.034000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:43.036044 sshd[1704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:43.039139 systemd-logind[1159]: New session 13 of user core. Jul 2 07:42:43.039997 systemd[1]: Started session-13.scope. Jul 2 07:42:43.042000 audit[1704]: USER_START pid=1704 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.043000 audit[1706]: CRED_ACQ pid=1706 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:43.600769 systemd[1]: var-lib-docker-overlay2-af23fc943bdd8a77c426c8152b0cb20b75e0584a3dc4cfc1b8c652a6fc8b384a-merged.mount: Deactivated successfully. Jul 2 07:42:43.654236 systemd-networkd[1005]: docker0: Lost carrier Jul 2 07:42:44.742190 systemd-networkd[1005]: docker0: Gained IPv6LL Jul 2 07:42:49.655000 audit[1707]: USER_ACCT pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.656882 sudo[1707]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 2 07:42:49.657139 sudo[1707]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:49.657747 kernel: kauditd_printk_skb: 372 callbacks suppressed Jul 2 07:42:49.657798 kernel: audit: type=1101 audit(1719906169.655:530): pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.660644 sudo[1707]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:49.655000 audit[1707]: CRED_REFR pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.662170 sshd[1704]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:49.665492 systemd[1]: sshd@12-10.0.0.20:22-10.0.0.1:48584.service: Deactivated successfully. Jul 2 07:42:49.665704 kernel: audit: type=1110 audit(1719906169.655:531): pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.665749 kernel: audit: type=1105 audit(1719906169.658:532): pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.658000 audit[1707]: USER_START pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.666098 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:42:49.666246 systemd[1]: session-13.scope: Consumed 3.868s CPU time. Jul 2 07:42:49.666707 systemd-logind[1159]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:42:49.668357 systemd[1]: Started sshd@13-10.0.0.20:22-10.0.0.1:48600.service. Jul 2 07:42:49.669259 systemd-logind[1159]: Removed session 13. Jul 2 07:42:49.659000 audit[1707]: USER_END pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.674043 kernel: audit: type=1106 audit(1719906169.659:533): pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.674098 kernel: audit: type=1104 audit(1719906169.659:534): pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.659000 audit[1707]: CRED_DISP pid=1707 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.662000 audit[1704]: USER_END pid=1704 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.682339 kernel: audit: type=1106 audit(1719906169.662:535): pid=1704 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.682381 kernel: audit: type=1104 audit(1719906169.662:536): pid=1704 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.662000 audit[1704]: CRED_DISP pid=1704 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.20:22-10.0.0.1:48584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.689573 kernel: audit: type=1131 audit(1719906169.664:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.20:22-10.0.0.1:48584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.689614 kernel: audit: type=1130 audit(1719906169.667:538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.20:22-10.0.0.1:48600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.20:22-10.0.0.1:48600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.697000 audit[1764]: USER_ACCT pid=1764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.698377 sshd[1764]: Accepted publickey for core from 10.0.0.1 port 48600 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:49.701527 sshd[1764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:49.700000 audit[1764]: CRED_ACQ pid=1764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.700000 audit[1764]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff25cf030 a2=3 a3=0 items=0 ppid=1 pid=1764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:49.700000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:49.703040 kernel: audit: type=1101 audit(1719906169.697:539): pid=1764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.704757 systemd-logind[1159]: New session 14 of user core. Jul 2 07:42:49.705451 systemd[1]: Started session-14.scope. Jul 2 07:42:49.707000 audit[1764]: USER_START pid=1764 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.708000 audit[1766]: CRED_ACQ pid=1766 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:49.755000 audit[1768]: USER_ACCT pid=1768 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.755000 audit[1768]: CRED_REFR pid=1768 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.756403 sudo[1768]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 2 07:42:49.756648 sudo[1768]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:49.757000 audit[1768]: USER_START pid=1768 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.763244 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 2 07:42:49.763387 systemd[1]: Stopped ensure-sysext.service. Jul 2 07:42:49.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.763440 systemd[1]: Stopping ensure-sysext.service... Jul 2 07:42:49.764459 systemd[1]: Stopping systemd-sysext.service... Jul 2 07:42:49.769365 systemd-sysext[1770]: Unmerged '/usr'. Jul 2 07:42:49.773181 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:42:49.781762 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:42:49.786096 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:42:49.786406 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:49.786590 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:49.787679 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 2 07:42:49.787814 systemd[1]: Stopped systemd-sysext.service. Jul 2 07:42:49.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.789035 systemd[1]: Starting systemd-sysext.service... Jul 2 07:42:49.794666 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:42:49.797497 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:42:49.797648 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:42:49.805031 kernel: loop4: detected capacity change from 0 to 301320 Jul 2 07:42:49.809039 kernel: EXT4-fs (loop4): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:49.828028 kernel: loop5: detected capacity change from 0 to 322896 Jul 2 07:42:49.832034 kernel: EXT4-fs (loop5): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:49.850058 kernel: loop6: detected capacity change from 0 to 301320 Jul 2 07:42:49.854036 kernel: EXT4-fs (loop6): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:49.856039 kernel: loop7: detected capacity change from 0 to 322896 Jul 2 07:42:49.859031 kernel: EXT4-fs (loop7): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:42:49.859260 (sd-sysext)[1782]: Using extensions 'containerd', 'docker'. Jul 2 07:42:49.859568 (sd-sysext)[1782]: Merged extensions into '/usr'. Jul 2 07:42:49.875731 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:42:49.880437 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:42:49.880857 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:49.881472 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:42:49.882202 systemd[1]: Finished systemd-sysext.service. Jul 2 07:42:49.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.882825 sudo[1768]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:49.881000 audit[1768]: USER_END pid=1768 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.881000 audit[1768]: CRED_DISP pid=1768 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.884860 systemd[1]: Starting ensure-sysext.service... Jul 2 07:42:49.885000 audit[1767]: USER_ACCT pid=1767 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.886991 sudo[1767]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart docker containerd Jul 2 07:42:49.886000 audit[1767]: CRED_REFR pid=1767 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.887200 sudo[1767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:42:49.887000 audit[1767]: USER_START pid=1767 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:49.889701 systemd[1]: Reloading. Jul 2 07:42:49.999859 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:42:49.999873 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:42:50.015540 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit: BPF prog-id=65 op=LOAD Jul 2 07:42:50.072000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit: BPF prog-id=66 op=LOAD Jul 2 07:42:50.073000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit: BPF prog-id=67 op=LOAD Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.073000 audit: BPF prog-id=68 op=LOAD Jul 2 07:42:50.073000 audit: BPF prog-id=48 op=UNLOAD Jul 2 07:42:50.073000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit: BPF prog-id=69 op=LOAD Jul 2 07:42:50.075000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit: BPF prog-id=70 op=LOAD Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit: BPF prog-id=71 op=LOAD Jul 2 07:42:50.076000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:42:50.076000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit: BPF prog-id=72 op=LOAD Jul 2 07:42:50.076000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit: BPF prog-id=73 op=LOAD Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.076000 audit: BPF prog-id=74 op=LOAD Jul 2 07:42:50.076000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:42:50.076000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.077000 audit: BPF prog-id=75 op=LOAD Jul 2 07:42:50.077000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit: BPF prog-id=76 op=LOAD Jul 2 07:42:50.079000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.079000 audit: BPF prog-id=77 op=LOAD Jul 2 07:42:50.079000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit: BPF prog-id=78 op=LOAD Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.080000 audit: BPF prog-id=79 op=LOAD Jul 2 07:42:50.080000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:42:50.080000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:42:50.092468 systemd[1]: Stopped target sockets.target. Jul 2 07:42:50.092489 systemd[1]: Stopping sockets.target... Jul 2 07:42:50.092614 systemd[1]: Stopped target timers.target. Jul 2 07:42:50.092625 systemd[1]: Stopping timers.target... Jul 2 07:42:50.092759 systemd[1]: Reached target timers.target. Jul 2 07:42:50.093155 dockerd[1491]: time="2024-07-02T07:42:50.093087110Z" level=info msg="Processing signal 'terminated'" Jul 2 07:42:50.093206 systemd[1]: Stopping docker.service... Jul 2 07:42:50.093879 dockerd[1491]: time="2024-07-02T07:42:50.093853558Z" level=info msg="Daemon shutdown complete" Jul 2 07:42:50.096635 systemd[1]: docker.service: Deactivated successfully. Jul 2 07:42:50.096803 systemd[1]: Stopped docker.service. Jul 2 07:42:50.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.097342 systemd[1]: Stopped target multi-user.target. Jul 2 07:42:50.097368 systemd[1]: Stopping multi-user.target... Jul 2 07:42:50.097388 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:42:50.097689 systemd[1]: docker.socket: Deactivated successfully. Jul 2 07:42:50.098064 systemd[1]: Closed docker.socket. Jul 2 07:42:50.098102 systemd[1]: Stopping docker.socket... Jul 2 07:42:50.099216 systemd[1]: Starting docker.socket... Jul 2 07:42:50.099510 containerd[1445]: time="2024-07-02T07:42:50.099478286Z" level=info msg="Stop CRI service" Jul 2 07:42:50.099587 systemd[1]: Stopping containerd.service... Jul 2 07:42:50.100659 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:42:50.101573 systemd[1]: Starting extend-filesystems.service... Jul 2 07:42:50.102527 systemd[1]: Starting issuegen.service... Jul 2 07:42:50.106365 jq[1846]: false Jul 2 07:42:50.103690 systemd[1]: Starting motdgen.service... Jul 2 07:42:50.104943 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:42:50.104980 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:42:50.106787 systemd[1]: containerd.service: Deactivated successfully. Jul 2 07:42:50.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.106959 systemd[1]: Stopped containerd.service. Jul 2 07:42:50.107300 systemd[1]: Listening on docker.socket. Jul 2 07:42:50.107711 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:42:50.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.107829 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:42:50.108527 systemd[1]: Reached target sockets.target. Jul 2 07:42:50.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.110206 systemd[1]: Starting containerd.service... Jul 2 07:42:50.110698 systemd[1]: Finished ensure-sysext.service. Jul 2 07:42:50.111145 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:42:50.111265 systemd[1]: Finished issuegen.service. Jul 2 07:42:50.111687 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:42:50.111803 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:42:50.115622 systemd[1]: Started containerd.service. Jul 2 07:42:50.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.117243 systemd[1]: Starting docker.service... Jul 2 07:42:50.117591 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:42:50.117732 systemd[1]: Finished motdgen.service. Jul 2 07:42:50.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.119856 extend-filesystems[1847]: Found loop2 Jul 2 07:42:50.119856 extend-filesystems[1847]: Found loop3 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found loop6 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found loop7 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found sr0 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda1 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda2 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda3 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found usr Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda4 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda6 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda7 Jul 2 07:42:50.120741 extend-filesystems[1847]: Found vda9 Jul 2 07:42:50.120741 extend-filesystems[1847]: Checking size of /dev/vda9 Jul 2 07:42:50.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.139061 extend-filesystems[1847]: Old size kept for /dev/vda9 Jul 2 07:42:50.138301 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:42:50.138464 systemd[1]: Finished extend-filesystems.service. Jul 2 07:42:50.138901 systemd[1]: Reached target multi-user.target. Jul 2 07:42:50.140258 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:42:50.151599 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:42:50.151740 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:42:50.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.192382 containerd[1863]: time="2024-07-02T07:42:50.192324546Z" level=info msg="starting containerd" revision=5b842e528e99d4d4c1686467debf2bd4b88ecd86 version=v1.6.15 Jul 2 07:42:50.210740 containerd[1863]: time="2024-07-02T07:42:50.210685509Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:42:50.210893 containerd[1863]: time="2024-07-02T07:42:50.210755260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212131 containerd[1863]: time="2024-07-02T07:42:50.212090795Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212131 containerd[1863]: time="2024-07-02T07:42:50.212125750Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212334 containerd[1863]: time="2024-07-02T07:42:50.212301600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212334 containerd[1863]: time="2024-07-02T07:42:50.212327849Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212389 containerd[1863]: time="2024-07-02T07:42:50.212341335Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:42:50.212389 containerd[1863]: time="2024-07-02T07:42:50.212353257Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212389 containerd[1863]: time="2024-07-02T07:42:50.212377262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:50.212930 containerd[1863]: time="2024-07-02T07:42:50.212888771Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:42:50.213074 containerd[1863]: time="2024-07-02T07:42:50.213044433Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:42:50.213074 containerd[1863]: time="2024-07-02T07:42:50.213068639Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:42:50.213130 containerd[1863]: time="2024-07-02T07:42:50.213083607Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:42:50.213130 containerd[1863]: time="2024-07-02T07:42:50.213092954Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:42:50.213289 containerd[1863]: time="2024-07-02T07:42:50.213249929Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:42:50.213289 containerd[1863]: time="2024-07-02T07:42:50.213274916Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:42:50.213289 containerd[1863]: time="2024-07-02T07:42:50.213289833Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:42:50.213416 containerd[1863]: time="2024-07-02T07:42:50.213396463Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213469 containerd[1863]: time="2024-07-02T07:42:50.213417333Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213469 containerd[1863]: time="2024-07-02T07:42:50.213429856Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213469 containerd[1863]: time="2024-07-02T07:42:50.213443432Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213784 containerd[1863]: time="2024-07-02T07:42:50.213756188Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213784 containerd[1863]: time="2024-07-02T07:42:50.213777688Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213852 containerd[1863]: time="2024-07-02T07:42:50.213794550Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213852 containerd[1863]: time="2024-07-02T07:42:50.213808656Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.213852 containerd[1863]: time="2024-07-02T07:42:50.213820308Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:42:50.213928 containerd[1863]: time="2024-07-02T07:42:50.213855474Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:42:50.213951 containerd[1863]: time="2024-07-02T07:42:50.213932058Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:42:50.214361 containerd[1863]: time="2024-07-02T07:42:50.214339652Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:42:50.214404 containerd[1863]: time="2024-07-02T07:42:50.214372714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214404 containerd[1863]: time="2024-07-02T07:42:50.214387993Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:42:50.214444 containerd[1863]: time="2024-07-02T07:42:50.214435372Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214465 containerd[1863]: time="2024-07-02T07:42:50.214447194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214465 containerd[1863]: time="2024-07-02T07:42:50.214458235Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214512 containerd[1863]: time="2024-07-02T07:42:50.214468564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214512 containerd[1863]: time="2024-07-02T07:42:50.214481739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214512 containerd[1863]: time="2024-07-02T07:42:50.214496276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214512 containerd[1863]: time="2024-07-02T07:42:50.214509701Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214593 containerd[1863]: time="2024-07-02T07:42:50.214529368Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214593 containerd[1863]: time="2024-07-02T07:42:50.214548354Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:42:50.214649 containerd[1863]: time="2024-07-02T07:42:50.214594580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214649 containerd[1863]: time="2024-07-02T07:42:50.214610691Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214649 containerd[1863]: time="2024-07-02T07:42:50.214623595Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.214649 containerd[1863]: time="2024-07-02T07:42:50.214635597Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:42:50.214730 containerd[1863]: time="2024-07-02T07:42:50.214651647Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:42:50.214730 containerd[1863]: time="2024-07-02T07:42:50.214663550Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:42:50.214730 containerd[1863]: time="2024-07-02T07:42:50.214690801Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:42:50.214730 containerd[1863]: time="2024-07-02T07:42:50.214720416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:42:50.215071 containerd[1863]: time="2024-07-02T07:42:50.214892229Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:42:50.215071 containerd[1863]: time="2024-07-02T07:42:50.214994520Z" level=info msg="Connect containerd service" Jul 2 07:42:50.215071 containerd[1863]: time="2024-07-02T07:42:50.215050626Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:42:50.215705 containerd[1863]: time="2024-07-02T07:42:50.215678172Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:42:50.216025 containerd[1863]: time="2024-07-02T07:42:50.215990488Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:42:50.216068 containerd[1863]: time="2024-07-02T07:42:50.216046774Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:42:50.216068 containerd[1863]: time="2024-07-02T07:42:50.216060800Z" level=info msg="containerd successfully booted in 0.024659s" Jul 2 07:42:50.216195 containerd[1863]: time="2024-07-02T07:42:50.215983746Z" level=info msg="Start subscribing containerd event" Jul 2 07:42:50.216288 containerd[1863]: time="2024-07-02T07:42:50.216270223Z" level=info msg="Start recovering state" Jul 2 07:42:50.216467 containerd[1863]: time="2024-07-02T07:42:50.216453096Z" level=info msg="Start event monitor" Jul 2 07:42:50.216553 containerd[1863]: time="2024-07-02T07:42:50.216531272Z" level=info msg="Start snapshots syncer" Jul 2 07:42:50.216642 containerd[1863]: time="2024-07-02T07:42:50.216626521Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:42:50.216765 dockerd[1864]: time="2024-07-02T07:42:50.216722251Z" level=info msg="Starting up" Jul 2 07:42:50.217398 containerd[1863]: time="2024-07-02T07:42:50.217377579Z" level=info msg="Start streaming server" Jul 2 07:42:50.217942 dockerd[1864]: time="2024-07-02T07:42:50.217896012Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:42:50.217942 dockerd[1864]: time="2024-07-02T07:42:50.217926429Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:42:50.218009 dockerd[1864]: time="2024-07-02T07:42:50.217942799Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:42:50.218009 dockerd[1864]: time="2024-07-02T07:42:50.217956696Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:42:50.223381 dockerd[1864]: time="2024-07-02T07:42:50.223361271Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:42:50.223381 dockerd[1864]: time="2024-07-02T07:42:50.223377361Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:42:50.223457 dockerd[1864]: time="2024-07-02T07:42:50.223388983Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:42:50.223457 dockerd[1864]: time="2024-07-02T07:42:50.223396547Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:42:50.238069 dockerd[1864]: time="2024-07-02T07:42:50.237993071Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jul 2 07:42:50.247885 dockerd[1864]: time="2024-07-02T07:42:50.247859334Z" level=info msg="Loading containers: start." Jul 2 07:42:50.251000 audit[1896]: NETFILTER_CFG table=nat:26 family=2 entries=1 op=nft_unregister_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.251000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=268 a0=3 a1=7ffdc4bb92d0 a2=0 a3=7ffdc4bb92bc items=0 ppid=1864 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.251000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:42:50.252000 audit[1897]: NETFILTER_CFG table=nat:27 family=2 entries=1 op=nft_unregister_rule pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.252000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=360 a0=3 a1=7ffc43b98190 a2=0 a3=7ffc43b9817c items=0 ppid=1864 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.252000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D44004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C0000002D2D647374003132372E302E302E302F38002D6A00444F434B4552 Jul 2 07:42:50.262000 audit[1901]: NETFILTER_CFG table=nat:28 family=2 entries=1 op=nft_unregister_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.262000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7ffca89a8c40 a2=0 a3=7ffca89a8c2c items=0 ppid=1864 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.262000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4600444F434B4552 Jul 2 07:42:50.263000 audit[1902]: NETFILTER_CFG table=nat:29 family=2 entries=1 op=nft_unregister_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.263000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcbdc35820 a2=0 a3=7ffcbdc3580c items=0 ppid=1864 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D5800444F434B4552 Jul 2 07:42:50.283000 audit[1905]: NETFILTER_CFG table=filter:30 family=2 entries=2 op=nft_unregister_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.283000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc0dc5cb50 a2=0 a3=7ffc0dc5cb3c items=0 ppid=1864 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:50.293000 audit[1907]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_unregister_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.293000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc63cd7cf0 a2=0 a3=7ffc63cd7cdc items=0 ppid=1864 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:50.294000 audit[1908]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_unregister_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.294000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=120 a0=3 a1=7fff6c008200 a2=0 a3=7fff6c0081ec items=0 ppid=1864 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D5800444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:50.308000 audit[1912]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.308000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7ffdf3c8fde0 a2=0 a3=7ffdf3c8fdcc items=0 ppid=1864 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:42:50.311000 audit[1916]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.311000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdacbebac0 a2=0 a3=7ffdacbebaac items=0 ppid=1864 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:50.313000 audit[1918]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.313000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcff47140 a2=0 a3=7fffcff4712c items=0 ppid=1864 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.313000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:42:50.314000 audit[1920]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.314000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd192ea370 a2=0 a3=7ffd192ea35c items=0 ppid=1864 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:42:50.319000 audit[1925]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.319000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffca5c5190 a2=0 a3=7fffca5c517c items=0 ppid=1864 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:42:50.323000 audit[1930]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.323000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=276 a0=3 a1=7fffe6c61d40 a2=0 a3=7fffe6c61d2c items=0 ppid=1864 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.323000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:42:50.324000 audit[1932]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.324000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=368 a0=3 a1=7ffeb3887690 a2=0 a3=7ffeb388767c items=0 ppid=1864 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:42:50.329000 audit[1938]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_unregister_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.329000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7ffcba41bac0 a2=0 a3=7ffcba41baac items=0 ppid=1864 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:50.330000 audit[1939]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.330000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd872bf360 a2=0 a3=7ffd872bf34c items=0 ppid=1864 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:50.331000 audit[1941]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.331000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff482b8a90 a2=0 a3=7fff482b8a7c items=0 ppid=1864 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:50.333000 audit[1943]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.333000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe975afed0 a2=0 a3=7ffe975afebc items=0 ppid=1864 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:42:50.338000 audit[1945]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_unregister_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.338000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=404 a0=3 a1=7ffc741a81b0 a2=0 a3=7ffc741a819c items=0 ppid=1864 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:42:50.339000 audit[1947]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_unregister_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.339000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=280 a0=3 a1=7ffd587f7620 a2=0 a3=7ffd587f760c items=0 ppid=1864 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:42:50.354000 audit[1949]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_unregister_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.354000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffd4d1fa7e0 a2=0 a3=7ffd4d1fa7cc items=0 ppid=1864 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:42:50.356000 audit[1951]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_unregister_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.356000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffdcee6b0b0 a2=0 a3=7ffdcee6b09c items=0 ppid=1864 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:42:50.371000 audit[1954]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_unregister_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.371000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcbb98a2e0 a2=0 a3=7ffcbb98a2cc items=0 ppid=1864 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.371000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:42:50.373000 audit[1957]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_unregister_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.373000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=512 a0=3 a1=7ffc1cdb00d0 a2=0 a3=7ffc1cdb00bc items=0 ppid=1864 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:42:50.384000 audit[1959]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_unregister_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.384000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=420 a0=3 a1=7ffc162296f0 a2=0 a3=7ffc162296dc items=0 ppid=1864 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.384000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:50.385000 audit[1961]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_unregister_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.385000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe7cda1970 a2=0 a3=7ffe7cda195c items=0 ppid=1864 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:42:50.402829 dockerd[1864]: time="2024-07-02T07:42:50.402792869Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:42:50.403000 audit[1963]: NETFILTER_CFG table=nat:52 family=2 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.403000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=412 a0=3 a1=7ffdfc4d79e0 a2=0 a3=7ffdfc4d79cc items=0 ppid=1864 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:42:50.404000 audit[1965]: NETFILTER_CFG table=nat:53 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.404000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc54f38e80 a2=0 a3=7ffc54f38e6c items=0 ppid=1864 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.404000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:42:50.407000 audit[1968]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.407000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc0c9a6cb0 a2=0 a3=7ffc0c9a6c9c items=0 ppid=1864 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.407000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:42:50.408000 audit[1970]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.408000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffda800da10 a2=0 a3=7ffda800d9fc items=0 ppid=1864 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.408000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:42:50.412000 audit[1976]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.412000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc1c9721e0 a2=0 a3=7ffc1c9721cc items=0 ppid=1864 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.412000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:42:50.414000 audit[1978]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.414000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffedb3d4ba0 a2=0 a3=7ffedb3d4b8c items=0 ppid=1864 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.414000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:42:50.415000 audit[1980]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_unregister_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.415000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7fff0860ba90 a2=0 a3=7fff0860ba7c items=0 ppid=1864 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.415000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:50.416000 audit[1981]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.416000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdf4a4b330 a2=0 a3=7ffdf4a4b31c items=0 ppid=1864 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:42:50.417000 audit[1983]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.417000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffeb1204360 a2=0 a3=7ffeb120434c items=0 ppid=1864 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.417000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:42:50.419000 audit[1985]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.419000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd18a8250 a2=0 a3=7ffcd18a823c items=0 ppid=1864 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.419000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:42:50.425000 audit[1989]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_unregister_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.425000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff96807f50 a2=0 a3=7fff96807f3c items=0 ppid=1864 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:50.427000 audit[1990]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:42:50.427000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe21f01870 a2=0 a3=7ffe21f0185c items=0 ppid=1864 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:42:50.428393 dockerd[1864]: time="2024-07-02T07:42:50.428361920Z" level=info msg="Loading containers: done." Jul 2 07:42:50.447426 dockerd[1864]: time="2024-07-02T07:42:50.447383543Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:42:50.447577 dockerd[1864]: time="2024-07-02T07:42:50.447551588Z" level=info msg="Docker daemon" commit=6051f14 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:42:50.447641 dockerd[1864]: time="2024-07-02T07:42:50.447587836Z" level=info msg="Daemon has completed initialization" Jul 2 07:42:50.454875 systemd[1]: Started docker.service. Jul 2 07:42:50.455701 sudo[1767]: pam_unix(sudo:session): session closed for user root Jul 2 07:42:50.456819 sshd[1764]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:50.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.454000 audit[1767]: USER_END pid=1767 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.454000 audit[1767]: CRED_DISP pid=1767 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.457000 audit[1764]: USER_END pid=1764 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.457000 audit[1764]: CRED_DISP pid=1764 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.459748 systemd[1]: Started sshd@14-10.0.0.20:22-10.0.0.1:48606.service. Jul 2 07:42:50.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.20:22-10.0.0.1:48606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.462130 systemd-logind[1159]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:42:50.463529 dockerd[1864]: time="2024-07-02T07:42:50.463466945Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:42:50.488000 audit[2010]: USER_ACCT pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.489394 sshd[2010]: Accepted publickey for core from 10.0.0.1 port 48606 ssh2: RSA SHA256:p62DhCk3U7EnSkbc61VMtskngsC7N1IbxGsp88pYwVo Jul 2 07:42:50.489000 audit[2010]: CRED_ACQ pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.489000 audit[2010]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd87017690 a2=3 a3=0 items=0 ppid=1 pid=2010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:42:50.490767 sshd[2010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:42:50.494254 systemd-logind[1159]: New session 15 of user core. Jul 2 07:42:50.494863 systemd[1]: Started session-15.scope. Jul 2 07:42:50.497000 audit[2010]: USER_START pid=2010 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.499000 audit[2012]: CRED_ACQ pid=2012 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.503444 systemd[1]: sshd@13-10.0.0.20:22-10.0.0.1:48600.service: Deactivated successfully. Jul 2 07:42:50.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.20:22-10.0.0.1:48600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.503972 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:42:50.504913 systemd-logind[1159]: Removed session 14. Jul 2 07:42:50.617053 kernel: docker0: port 1(vethcd56a9e) entered blocking state Jul 2 07:42:50.617180 kernel: docker0: port 1(vethcd56a9e) entered disabled state Jul 2 07:42:50.617207 kernel: device vethcd56a9e entered promiscuous mode Jul 2 07:42:50.614000 audit: ANOM_PROMISCUOUS dev=vethcd56a9e prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:42:50.614000 audit[1864]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=e a1=c000a92870 a2=28 a3=0 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.614000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:42:50.618167 systemd-networkd[1005]: vethcd56a9e: Link UP Jul 2 07:42:50.653106 containerd[1863]: time="2024-07-02T07:42:50.653040162Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:42:50.653106 containerd[1863]: time="2024-07-02T07:42:50.653106146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:42:50.653420 containerd[1863]: time="2024-07-02T07:42:50.653127536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:42:50.653420 containerd[1863]: time="2024-07-02T07:42:50.653295712Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1 pid=2034 runtime=io.containerd.runc.v2 Jul 2 07:42:50.663977 systemd[1]: Started docker-d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1.scope. Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit: BPF prog-id=80 op=LOAD Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353762653862336366653537393761366634656339383530 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353762653862336366653537393761366634656339383530 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit: BPF prog-id=81 op=LOAD Jul 2 07:42:50.670000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000216520 items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353762653862336366653537393761366634656339383530 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit: BPF prog-id=82 op=LOAD Jul 2 07:42:50.670000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000216568 items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353762653862336366653537393761366634656339383530 Jul 2 07:42:50.670000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:42:50.670000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:42:50.670000 audit: BPF prog-id=83 op=LOAD Jul 2 07:42:50.670000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002169c8 items=0 ppid=2034 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64353762653862336366653537393761366634656339383530 Jul 2 07:42:50.737042 kernel: eth0: renamed from veth98a4b99 Jul 2 07:42:50.743114 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethcd56a9e: link becomes ready Jul 2 07:42:50.743221 kernel: docker0: port 1(vethcd56a9e) entered blocking state Jul 2 07:42:50.743240 kernel: docker0: port 1(vethcd56a9e) entered forwarding state Jul 2 07:42:50.744056 systemd-networkd[1005]: vethcd56a9e: Gained carrier Jul 2 07:42:50.744233 systemd-networkd[1005]: docker0: Gained carrier Jul 2 07:42:50.747396 systemd-resolved[1129]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 07:42:50.768000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:42:50.769266 systemd[1]: docker-d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1.scope: Deactivated successfully. Jul 2 07:42:50.772656 containerd[1863]: time="2024-07-02T07:42:50.772493971Z" level=warning msg="error from *cgroupsv2.Manager.EventChan" error="failed to add inotify watch for \"/sys/fs/cgroup/system.slice/docker-d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1.scope/memory.events\": no such file or directory" Jul 2 07:42:50.787508 containerd[1863]: time="2024-07-02T07:42:50.787460579Z" level=info msg="shim disconnected" id=d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1 Jul 2 07:42:50.787593 dockerd[1864]: time="2024-07-02T07:42:50.787555567Z" level=info msg="ignoring event" container=d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:42:50.788107 containerd[1863]: time="2024-07-02T07:42:50.788061496Z" level=warning msg="cleaning up after shim disconnected" id=d57be8b3cfe5797a6f4ec98502f350aac96bbd37ae48f87f7db468e7fffbaff1 namespace=moby Jul 2 07:42:50.788107 containerd[1863]: time="2024-07-02T07:42:50.788086172Z" level=info msg="cleaning up dead shim" Jul 2 07:42:50.794339 containerd[1863]: time="2024-07-02T07:42:50.794288764Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:42:50Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2090 runtime=io.containerd.runc.v2\n" Jul 2 07:42:50.799331 systemd-networkd[1005]: vethcd56a9e: Lost carrier Jul 2 07:42:50.800043 kernel: docker0: port 1(vethcd56a9e) entered disabled state Jul 2 07:42:50.800098 kernel: veth98a4b99: renamed from eth0 Jul 2 07:42:50.814554 systemd-networkd[1005]: vethcd56a9e: Link DOWN Jul 2 07:42:50.816754 kernel: docker0: port 1(vethcd56a9e) entered disabled state Jul 2 07:42:50.816794 kernel: device vethcd56a9e left promiscuous mode Jul 2 07:42:50.816823 kernel: docker0: port 1(vethcd56a9e) entered disabled state Jul 2 07:42:50.813000 audit: ANOM_PROMISCUOUS dev=vethcd56a9e prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:42:50.813000 audit[1864]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=e a1=c000712860 a2=20 a3=0 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:42:50.813000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:42:50.842093 systemd[1]: run-docker-netns-d860363d6eb7.mount: Deactivated successfully. Jul 2 07:42:50.843452 systemd[1]: var-lib-docker-overlay2-2098f18f07d7ae32651b053c1b3f337470f2de4d66c0a2f8e81dfcbc40d17444-merged.mount: Deactivated successfully. Jul 2 07:42:50.862064 sshd[2010]: pam_unix(sshd:session): session closed for user core Jul 2 07:42:50.861000 audit[2010]: USER_END pid=2010 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.861000 audit[2010]: CRED_DISP pid=2010 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:42:50.864354 systemd[1]: sshd@14-10.0.0.20:22-10.0.0.1:48606.service: Deactivated successfully. Jul 2 07:42:50.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.20:22-10.0.0.1:48606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:42:50.864862 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:42:50.865312 systemd-logind[1159]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:42:50.865914 systemd-logind[1159]: Removed session 15. Jul 2 07:42:50.869000 audit: BPF prog-id=83 op=UNLOAD Jul 2 07:42:51.654289 systemd-networkd[1005]: docker0: Lost carrier