Jul 2 07:46:09.801557 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:46:09.801575 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:46:09.801584 kernel: BIOS-provided physical RAM map: Jul 2 07:46:09.801590 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 2 07:46:09.801595 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 2 07:46:09.801600 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 2 07:46:09.801607 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Jul 2 07:46:09.801613 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 2 07:46:09.801618 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 2 07:46:09.801624 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 2 07:46:09.801630 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Jul 2 07:46:09.801635 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 2 07:46:09.801641 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 2 07:46:09.801646 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 2 07:46:09.801653 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 2 07:46:09.801660 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 2 07:46:09.801666 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 2 07:46:09.801672 kernel: NX (Execute Disable) protection: active Jul 2 07:46:09.801677 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Jul 2 07:46:09.801683 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Jul 2 07:46:09.801689 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Jul 2 07:46:09.801695 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Jul 2 07:46:09.801700 kernel: extended physical RAM map: Jul 2 07:46:09.801706 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 2 07:46:09.801712 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 2 07:46:09.801720 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 2 07:46:09.801725 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Jul 2 07:46:09.801731 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 2 07:46:09.801737 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 2 07:46:09.801743 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 2 07:46:09.801749 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable Jul 2 07:46:09.801754 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable Jul 2 07:46:09.801760 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable Jul 2 07:46:09.801766 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable Jul 2 07:46:09.801771 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable Jul 2 07:46:09.801777 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 2 07:46:09.801784 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 2 07:46:09.801790 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 2 07:46:09.801796 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 2 07:46:09.801802 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 2 07:46:09.801810 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 2 07:46:09.801816 kernel: efi: EFI v2.70 by EDK II Jul 2 07:46:09.801823 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Jul 2 07:46:09.801830 kernel: random: crng init done Jul 2 07:46:09.801836 kernel: SMBIOS 2.8 present. Jul 2 07:46:09.801843 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Jul 2 07:46:09.801849 kernel: Hypervisor detected: KVM Jul 2 07:46:09.801855 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:46:09.801862 kernel: kvm-clock: cpu 0, msr 1f192001, primary cpu clock Jul 2 07:46:09.801868 kernel: kvm-clock: using sched offset of 4200727826 cycles Jul 2 07:46:09.801875 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:46:09.801882 kernel: tsc: Detected 2794.748 MHz processor Jul 2 07:46:09.801898 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:46:09.801904 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:46:09.801911 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Jul 2 07:46:09.801918 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:46:09.801924 kernel: Using GB pages for direct mapping Jul 2 07:46:09.801931 kernel: Secure boot disabled Jul 2 07:46:09.801937 kernel: ACPI: Early table checksum verification disabled Jul 2 07:46:09.801943 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Jul 2 07:46:09.801950 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Jul 2 07:46:09.801958 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:46:09.801965 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:46:09.801971 kernel: ACPI: FACS 0x000000009CBDD000 000040 Jul 2 07:46:09.801978 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:46:09.801984 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:46:09.801991 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:46:09.801997 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Jul 2 07:46:09.802004 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Jul 2 07:46:09.802010 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Jul 2 07:46:09.802018 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Jul 2 07:46:09.802024 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Jul 2 07:46:09.802030 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Jul 2 07:46:09.802037 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Jul 2 07:46:09.802043 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Jul 2 07:46:09.802050 kernel: No NUMA configuration found Jul 2 07:46:09.802056 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Jul 2 07:46:09.802063 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Jul 2 07:46:09.802069 kernel: Zone ranges: Jul 2 07:46:09.802077 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:46:09.802096 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Jul 2 07:46:09.802102 kernel: Normal empty Jul 2 07:46:09.802109 kernel: Movable zone start for each node Jul 2 07:46:09.802115 kernel: Early memory node ranges Jul 2 07:46:09.802122 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 2 07:46:09.802128 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Jul 2 07:46:09.802135 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Jul 2 07:46:09.802141 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Jul 2 07:46:09.802149 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Jul 2 07:46:09.802155 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Jul 2 07:46:09.802162 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Jul 2 07:46:09.802168 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:46:09.802174 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 2 07:46:09.802181 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Jul 2 07:46:09.802187 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:46:09.802194 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Jul 2 07:46:09.802200 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Jul 2 07:46:09.802208 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Jul 2 07:46:09.802214 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:46:09.802221 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:46:09.802227 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:46:09.802234 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 07:46:09.802240 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:46:09.802246 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:46:09.802253 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:46:09.802259 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:46:09.802267 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:46:09.802273 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:46:09.802279 kernel: TSC deadline timer available Jul 2 07:46:09.802286 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 2 07:46:09.802292 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 2 07:46:09.802299 kernel: kvm-guest: setup PV sched yield Jul 2 07:46:09.802305 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Jul 2 07:46:09.802311 kernel: Booting paravirtualized kernel on KVM Jul 2 07:46:09.802318 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:46:09.802325 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 2 07:46:09.802332 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 2 07:46:09.802339 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 2 07:46:09.802350 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 2 07:46:09.802358 kernel: kvm-guest: setup async PF for cpu 0 Jul 2 07:46:09.802365 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Jul 2 07:46:09.802371 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:46:09.802378 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:46:09.802385 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Jul 2 07:46:09.802392 kernel: Policy zone: DMA32 Jul 2 07:46:09.802399 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:46:09.802407 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:46:09.802414 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:46:09.802421 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:46:09.802428 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:46:09.802435 kernel: Memory: 2398372K/2567000K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 168368K reserved, 0K cma-reserved) Jul 2 07:46:09.802444 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 2 07:46:09.802450 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:46:09.802457 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:46:09.802464 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:46:09.802471 kernel: rcu: RCU event tracing is enabled. Jul 2 07:46:09.802478 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 2 07:46:09.802485 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:46:09.802492 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:46:09.802500 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:46:09.802508 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 2 07:46:09.802516 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 2 07:46:09.802525 kernel: Console: colour dummy device 80x25 Jul 2 07:46:09.802532 kernel: printk: console [ttyS0] enabled Jul 2 07:46:09.802539 kernel: ACPI: Core revision 20210730 Jul 2 07:46:09.802546 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 2 07:46:09.802553 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:46:09.802559 kernel: x2apic enabled Jul 2 07:46:09.802566 kernel: Switched APIC routing to physical x2apic. Jul 2 07:46:09.802573 kernel: kvm-guest: setup PV IPIs Jul 2 07:46:09.802581 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 07:46:09.802588 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 2 07:46:09.802595 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Jul 2 07:46:09.802601 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 2 07:46:09.802608 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 2 07:46:09.802615 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 2 07:46:09.802622 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:46:09.802629 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:46:09.802635 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:46:09.802644 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:46:09.802651 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 2 07:46:09.802658 kernel: RETBleed: Mitigation: untrained return thunk Jul 2 07:46:09.802665 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:46:09.802672 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:46:09.802679 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:46:09.802685 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:46:09.802692 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:46:09.802700 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:46:09.802707 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:46:09.802714 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:46:09.802721 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:46:09.802727 kernel: LSM: Security Framework initializing Jul 2 07:46:09.802734 kernel: SELinux: Initializing. Jul 2 07:46:09.802741 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 07:46:09.802748 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 07:46:09.802755 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 2 07:46:09.802763 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 2 07:46:09.802769 kernel: ... version: 0 Jul 2 07:46:09.802776 kernel: ... bit width: 48 Jul 2 07:46:09.802783 kernel: ... generic registers: 6 Jul 2 07:46:09.802790 kernel: ... value mask: 0000ffffffffffff Jul 2 07:46:09.802796 kernel: ... max period: 00007fffffffffff Jul 2 07:46:09.802803 kernel: ... fixed-purpose events: 0 Jul 2 07:46:09.802810 kernel: ... event mask: 000000000000003f Jul 2 07:46:09.802816 kernel: signal: max sigframe size: 1776 Jul 2 07:46:09.802823 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:46:09.802831 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:46:09.802838 kernel: x86: Booting SMP configuration: Jul 2 07:46:09.802844 kernel: .... node #0, CPUs: #1 Jul 2 07:46:09.802851 kernel: kvm-clock: cpu 1, msr 1f192041, secondary cpu clock Jul 2 07:46:09.802858 kernel: kvm-guest: setup async PF for cpu 1 Jul 2 07:46:09.802865 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Jul 2 07:46:09.802871 kernel: #2 Jul 2 07:46:09.802878 kernel: kvm-clock: cpu 2, msr 1f192081, secondary cpu clock Jul 2 07:46:09.802885 kernel: kvm-guest: setup async PF for cpu 2 Jul 2 07:46:09.802901 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Jul 2 07:46:09.802908 kernel: #3 Jul 2 07:46:09.802914 kernel: kvm-clock: cpu 3, msr 1f1920c1, secondary cpu clock Jul 2 07:46:09.802921 kernel: kvm-guest: setup async PF for cpu 3 Jul 2 07:46:09.802928 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Jul 2 07:46:09.802934 kernel: smp: Brought up 1 node, 4 CPUs Jul 2 07:46:09.802941 kernel: smpboot: Max logical packages: 1 Jul 2 07:46:09.802948 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Jul 2 07:46:09.802955 kernel: devtmpfs: initialized Jul 2 07:46:09.802963 kernel: x86/mm: Memory block size: 128MB Jul 2 07:46:09.802969 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Jul 2 07:46:09.802976 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Jul 2 07:46:09.802983 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Jul 2 07:46:09.802990 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Jul 2 07:46:09.802997 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Jul 2 07:46:09.803004 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:46:09.803011 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 2 07:46:09.803018 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:46:09.803026 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:46:09.803032 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:46:09.803039 kernel: audit: type=2000 audit(1719906369.763:1): state=initialized audit_enabled=0 res=1 Jul 2 07:46:09.803046 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:46:09.803053 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:46:09.803059 kernel: cpuidle: using governor menu Jul 2 07:46:09.803066 kernel: ACPI: bus type PCI registered Jul 2 07:46:09.803073 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:46:09.803079 kernel: dca service started, version 1.12.1 Jul 2 07:46:09.803096 kernel: PCI: Using configuration type 1 for base access Jul 2 07:46:09.803103 kernel: PCI: Using configuration type 1 for extended access Jul 2 07:46:09.803110 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:46:09.803117 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:46:09.803124 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:46:09.803131 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:46:09.803137 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:46:09.803144 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:46:09.803151 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:46:09.803159 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:46:09.803166 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:46:09.803172 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:46:09.803179 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:46:09.803186 kernel: ACPI: Interpreter enabled Jul 2 07:46:09.803193 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 07:46:09.803199 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:46:09.803206 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:46:09.803213 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jul 2 07:46:09.803222 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:46:09.803326 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:46:09.803338 kernel: acpiphp: Slot [3] registered Jul 2 07:46:09.803345 kernel: acpiphp: Slot [4] registered Jul 2 07:46:09.803352 kernel: acpiphp: Slot [5] registered Jul 2 07:46:09.803358 kernel: acpiphp: Slot [6] registered Jul 2 07:46:09.803365 kernel: acpiphp: Slot [7] registered Jul 2 07:46:09.803372 kernel: acpiphp: Slot [8] registered Jul 2 07:46:09.803381 kernel: acpiphp: Slot [9] registered Jul 2 07:46:09.803388 kernel: acpiphp: Slot [10] registered Jul 2 07:46:09.803394 kernel: acpiphp: Slot [11] registered Jul 2 07:46:09.803401 kernel: acpiphp: Slot [12] registered Jul 2 07:46:09.803408 kernel: acpiphp: Slot [13] registered Jul 2 07:46:09.803415 kernel: acpiphp: Slot [14] registered Jul 2 07:46:09.803421 kernel: acpiphp: Slot [15] registered Jul 2 07:46:09.803428 kernel: acpiphp: Slot [16] registered Jul 2 07:46:09.803435 kernel: acpiphp: Slot [17] registered Jul 2 07:46:09.803441 kernel: acpiphp: Slot [18] registered Jul 2 07:46:09.803449 kernel: acpiphp: Slot [19] registered Jul 2 07:46:09.803455 kernel: acpiphp: Slot [20] registered Jul 2 07:46:09.803462 kernel: acpiphp: Slot [21] registered Jul 2 07:46:09.803469 kernel: acpiphp: Slot [22] registered Jul 2 07:46:09.803475 kernel: acpiphp: Slot [23] registered Jul 2 07:46:09.803482 kernel: acpiphp: Slot [24] registered Jul 2 07:46:09.803489 kernel: acpiphp: Slot [25] registered Jul 2 07:46:09.803495 kernel: acpiphp: Slot [26] registered Jul 2 07:46:09.803502 kernel: acpiphp: Slot [27] registered Jul 2 07:46:09.803510 kernel: acpiphp: Slot [28] registered Jul 2 07:46:09.803517 kernel: acpiphp: Slot [29] registered Jul 2 07:46:09.803523 kernel: acpiphp: Slot [30] registered Jul 2 07:46:09.803530 kernel: acpiphp: Slot [31] registered Jul 2 07:46:09.803536 kernel: PCI host bridge to bus 0000:00 Jul 2 07:46:09.803614 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:46:09.803677 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:46:09.803738 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:46:09.803802 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Jul 2 07:46:09.803861 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Jul 2 07:46:09.803929 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:46:09.804010 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:46:09.804098 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 07:46:09.804180 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jul 2 07:46:09.804252 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Jul 2 07:46:09.804319 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 2 07:46:09.804386 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 2 07:46:09.804452 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 2 07:46:09.804518 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 2 07:46:09.804591 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:46:09.804659 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:46:09.804730 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Jul 2 07:46:09.804803 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Jul 2 07:46:09.804871 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Jul 2 07:46:09.804949 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Jul 2 07:46:09.805016 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Jul 2 07:46:09.805093 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Jul 2 07:46:09.805164 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:46:09.805243 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 07:46:09.805807 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Jul 2 07:46:09.805887 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Jul 2 07:46:09.805965 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Jul 2 07:46:09.806038 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 2 07:46:09.806119 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 07:46:09.806187 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Jul 2 07:46:09.806257 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Jul 2 07:46:09.806330 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:46:09.806398 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Jul 2 07:46:09.806464 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Jul 2 07:46:09.806530 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Jul 2 07:46:09.806597 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Jul 2 07:46:09.806606 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:46:09.806616 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:46:09.806623 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:46:09.806629 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:46:09.806636 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:46:09.806643 kernel: iommu: Default domain type: Translated Jul 2 07:46:09.806650 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:46:09.806718 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jul 2 07:46:09.806786 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:46:09.806852 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jul 2 07:46:09.806864 kernel: vgaarb: loaded Jul 2 07:46:09.806871 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:46:09.806878 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:46:09.806885 kernel: PTP clock support registered Jul 2 07:46:09.806901 kernel: Registered efivars operations Jul 2 07:46:09.806908 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:46:09.806915 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:46:09.806922 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Jul 2 07:46:09.806929 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Jul 2 07:46:09.806937 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff] Jul 2 07:46:09.806944 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff] Jul 2 07:46:09.806951 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Jul 2 07:46:09.806958 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Jul 2 07:46:09.806964 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 2 07:46:09.806971 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 2 07:46:09.806978 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:46:09.806985 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:46:09.806992 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:46:09.807000 kernel: pnp: PnP ACPI init Jul 2 07:46:09.807077 kernel: pnp 00:02: [dma 2] Jul 2 07:46:09.807097 kernel: pnp: PnP ACPI: found 6 devices Jul 2 07:46:09.807105 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:46:09.807111 kernel: NET: Registered PF_INET protocol family Jul 2 07:46:09.807118 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:46:09.807125 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 07:46:09.807132 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:46:09.807142 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 07:46:09.807149 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 07:46:09.807156 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 07:46:09.807162 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 07:46:09.807169 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 07:46:09.807176 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:46:09.807183 kernel: NET: Registered PF_XDP protocol family Jul 2 07:46:09.807255 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Jul 2 07:46:09.807335 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Jul 2 07:46:09.807397 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:46:09.807458 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:46:09.807520 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:46:09.807581 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Jul 2 07:46:09.807640 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Jul 2 07:46:09.807706 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jul 2 07:46:09.807773 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:46:09.807844 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 07:46:09.807853 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:46:09.807860 kernel: Initialise system trusted keyrings Jul 2 07:46:09.807867 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 07:46:09.807874 kernel: Key type asymmetric registered Jul 2 07:46:09.807881 kernel: Asymmetric key parser 'x509' registered Jul 2 07:46:09.807898 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:46:09.807906 kernel: io scheduler mq-deadline registered Jul 2 07:46:09.807915 kernel: io scheduler kyber registered Jul 2 07:46:09.807922 kernel: io scheduler bfq registered Jul 2 07:46:09.807930 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:46:09.807937 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:46:09.807944 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Jul 2 07:46:09.807951 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:46:09.807959 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:46:09.807966 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:46:09.807973 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:46:09.807980 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:46:09.807989 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:46:09.808060 kernel: rtc_cmos 00:05: RTC can wake from S4 Jul 2 07:46:09.808073 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:46:09.808147 kernel: rtc_cmos 00:05: registered as rtc0 Jul 2 07:46:09.808212 kernel: rtc_cmos 00:05: setting system clock to 2024-07-02T07:46:09 UTC (1719906369) Jul 2 07:46:09.808273 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 2 07:46:09.808282 kernel: efifb: probing for efifb Jul 2 07:46:09.808290 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Jul 2 07:46:09.808297 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Jul 2 07:46:09.808305 kernel: efifb: scrolling: redraw Jul 2 07:46:09.808312 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 07:46:09.808319 kernel: Console: switching to colour frame buffer device 160x50 Jul 2 07:46:09.808326 kernel: fb0: EFI VGA frame buffer device Jul 2 07:46:09.808335 kernel: pstore: Registered efi as persistent store backend Jul 2 07:46:09.808342 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:46:09.808349 kernel: Segment Routing with IPv6 Jul 2 07:46:09.808357 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:46:09.808364 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:46:09.808371 kernel: Key type dns_resolver registered Jul 2 07:46:09.808378 kernel: IPI shorthand broadcast: enabled Jul 2 07:46:09.808386 kernel: sched_clock: Marking stable (418319600, 125811633)->(587283997, -43152764) Jul 2 07:46:09.808393 kernel: registered taskstats version 1 Jul 2 07:46:09.808401 kernel: Loading compiled-in X.509 certificates Jul 2 07:46:09.808410 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:46:09.808417 kernel: Key type .fscrypt registered Jul 2 07:46:09.808424 kernel: Key type fscrypt-provisioning registered Jul 2 07:46:09.808432 kernel: pstore: Using crash dump compression: deflate Jul 2 07:46:09.808439 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:46:09.808446 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:46:09.808453 kernel: ima: No architecture policies found Jul 2 07:46:09.808460 kernel: clk: Disabling unused clocks Jul 2 07:46:09.808468 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:46:09.808477 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:46:09.808484 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:46:09.808491 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:46:09.808498 kernel: Run /init as init process Jul 2 07:46:09.808506 kernel: with arguments: Jul 2 07:46:09.808513 kernel: /init Jul 2 07:46:09.808520 kernel: with environment: Jul 2 07:46:09.808527 kernel: HOME=/ Jul 2 07:46:09.808535 kernel: TERM=linux Jul 2 07:46:09.808542 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:46:09.808551 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:46:09.808561 systemd[1]: Detected virtualization kvm. Jul 2 07:46:09.808568 systemd[1]: Detected architecture x86-64. Jul 2 07:46:09.808576 systemd[1]: Running in initrd. Jul 2 07:46:09.808583 systemd[1]: No hostname configured, using default hostname. Jul 2 07:46:09.808591 systemd[1]: Hostname set to . Jul 2 07:46:09.808600 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:46:09.808607 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:46:09.808615 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:46:09.808622 systemd[1]: Reached target cryptsetup.target. Jul 2 07:46:09.808630 systemd[1]: Reached target paths.target. Jul 2 07:46:09.808638 systemd[1]: Reached target slices.target. Jul 2 07:46:09.808645 systemd[1]: Reached target swap.target. Jul 2 07:46:09.808653 systemd[1]: Reached target timers.target. Jul 2 07:46:09.808662 systemd[1]: Listening on iscsid.socket. Jul 2 07:46:09.808669 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:46:09.808677 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:46:09.808685 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:46:09.808692 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:46:09.808700 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:46:09.808708 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:46:09.808715 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:46:09.808724 systemd[1]: Reached target sockets.target. Jul 2 07:46:09.808732 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:46:09.808740 systemd[1]: Finished network-cleanup.service. Jul 2 07:46:09.808747 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:46:09.808755 systemd[1]: Starting systemd-journald.service... Jul 2 07:46:09.808762 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:46:09.808770 systemd[1]: Starting systemd-resolved.service... Jul 2 07:46:09.808777 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:46:09.808785 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:46:09.808793 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:46:09.808801 kernel: audit: type=1130 audit(1719906369.801:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.808809 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:46:09.808820 systemd-journald[197]: Journal started Jul 2 07:46:09.808858 systemd-journald[197]: Runtime Journal (/run/log/journal/e636841f74eb4f579e6c77eb1de5ceeb) is 6.0M, max 48.4M, 42.4M free. Jul 2 07:46:09.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.810415 systemd[1]: Started systemd-journald.service. Jul 2 07:46:09.810964 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:46:09.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.812451 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:46:09.815922 systemd-modules-load[198]: Inserted module 'overlay' Jul 2 07:46:09.818179 kernel: audit: type=1130 audit(1719906369.810:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.819155 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:46:09.823190 kernel: audit: type=1130 audit(1719906369.811:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.827102 kernel: audit: type=1130 audit(1719906369.823:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.830303 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:46:09.833060 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:46:09.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.836905 systemd-resolved[199]: Positive Trust Anchors: Jul 2 07:46:09.839657 kernel: audit: type=1130 audit(1719906369.832:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.836914 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:46:09.836940 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:46:09.852167 kernel: audit: type=1130 audit(1719906369.842:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.852225 dracut-cmdline[216]: dracut-dracut-053 Jul 2 07:46:09.852225 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:46:09.860038 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:46:09.839375 systemd-resolved[199]: Defaulting to hostname 'linux'. Jul 2 07:46:09.840112 systemd[1]: Started systemd-resolved.service. Jul 2 07:46:09.842388 systemd[1]: Reached target nss-lookup.target. Jul 2 07:46:09.864842 systemd-modules-load[198]: Inserted module 'br_netfilter' Jul 2 07:46:09.865906 kernel: Bridge firewalling registered Jul 2 07:46:09.881107 kernel: SCSI subsystem initialized Jul 2 07:46:09.892394 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:46:09.892427 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:46:09.893674 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:46:09.896603 systemd-modules-load[198]: Inserted module 'dm_multipath' Jul 2 07:46:09.897557 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:46:09.898138 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:46:09.902551 kernel: audit: type=1130 audit(1719906369.898:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.902596 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:46:09.909668 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:46:09.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.914102 kernel: audit: type=1130 audit(1719906369.911:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.920105 kernel: iscsi: registered transport (tcp) Jul 2 07:46:09.940428 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:46:09.940460 kernel: QLogic iSCSI HBA Driver Jul 2 07:46:09.966815 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:46:09.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:09.969138 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:46:09.972719 kernel: audit: type=1130 audit(1719906369.968:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:10.014116 kernel: raid6: avx2x4 gen() 29705 MB/s Jul 2 07:46:10.031108 kernel: raid6: avx2x4 xor() 7313 MB/s Jul 2 07:46:10.048105 kernel: raid6: avx2x2 gen() 32378 MB/s Jul 2 07:46:10.065104 kernel: raid6: avx2x2 xor() 18651 MB/s Jul 2 07:46:10.082105 kernel: raid6: avx2x1 gen() 26532 MB/s Jul 2 07:46:10.099105 kernel: raid6: avx2x1 xor() 15356 MB/s Jul 2 07:46:10.116109 kernel: raid6: sse2x4 gen() 14699 MB/s Jul 2 07:46:10.133110 kernel: raid6: sse2x4 xor() 5614 MB/s Jul 2 07:46:10.150106 kernel: raid6: sse2x2 gen() 14562 MB/s Jul 2 07:46:10.167105 kernel: raid6: sse2x2 xor() 9844 MB/s Jul 2 07:46:10.184106 kernel: raid6: sse2x1 gen() 12071 MB/s Jul 2 07:46:10.201487 kernel: raid6: sse2x1 xor() 7829 MB/s Jul 2 07:46:10.201497 kernel: raid6: using algorithm avx2x2 gen() 32378 MB/s Jul 2 07:46:10.201509 kernel: raid6: .... xor() 18651 MB/s, rmw enabled Jul 2 07:46:10.202203 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:46:10.214103 kernel: xor: automatically using best checksumming function avx Jul 2 07:46:10.302110 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:46:10.307811 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:46:10.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:10.309000 audit: BPF prog-id=7 op=LOAD Jul 2 07:46:10.309000 audit: BPF prog-id=8 op=LOAD Jul 2 07:46:10.310299 systemd[1]: Starting systemd-udevd.service... Jul 2 07:46:10.321458 systemd-udevd[400]: Using default interface naming scheme 'v252'. Jul 2 07:46:10.325150 systemd[1]: Started systemd-udevd.service. Jul 2 07:46:10.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:10.326766 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:46:10.335698 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Jul 2 07:46:10.355179 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:46:10.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:10.357426 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:46:10.390176 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:46:10.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:10.422226 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jul 2 07:46:10.424100 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:46:10.426112 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:46:10.435655 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:46:10.435677 kernel: AES CTR mode by8 optimization enabled Jul 2 07:46:10.452098 kernel: libata version 3.00 loaded. Jul 2 07:46:10.452135 kernel: ata_piix 0000:00:01.1: version 2.13 Jul 2 07:46:10.454105 kernel: scsi host0: ata_piix Jul 2 07:46:10.457107 kernel: scsi host1: ata_piix Jul 2 07:46:10.457229 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Jul 2 07:46:10.457239 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Jul 2 07:46:10.460774 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:46:10.464212 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (462) Jul 2 07:46:10.468948 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:46:10.470959 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:46:10.481664 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:46:10.486543 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:46:10.488933 systemd[1]: Starting disk-uuid.service... Jul 2 07:46:10.495112 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:46:10.500110 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:46:10.617206 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 2 07:46:10.619132 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 2 07:46:10.649401 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 2 07:46:10.649632 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 07:46:10.667119 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Jul 2 07:46:11.503526 disk-uuid[522]: The operation has completed successfully. Jul 2 07:46:11.504895 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:46:11.524418 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:46:11.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.524511 systemd[1]: Finished disk-uuid.service. Jul 2 07:46:11.534047 systemd[1]: Starting verity-setup.service... Jul 2 07:46:11.545118 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 2 07:46:11.564265 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:46:11.565850 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:46:11.567332 systemd[1]: Finished verity-setup.service. Jul 2 07:46:11.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.636059 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:46:11.637466 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:11.636248 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:46:11.636911 systemd[1]: Starting ignition-setup.service... Jul 2 07:46:11.640898 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:46:11.646970 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:46:11.646993 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:46:11.647002 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:46:11.655023 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:46:11.663843 systemd[1]: Finished ignition-setup.service. Jul 2 07:46:11.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.665508 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:46:11.701887 ignition[643]: Ignition 2.14.0 Jul 2 07:46:11.701899 ignition[643]: Stage: fetch-offline Jul 2 07:46:11.701967 ignition[643]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:46:11.701975 ignition[643]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:46:11.702057 ignition[643]: parsed url from cmdline: "" Jul 2 07:46:11.702061 ignition[643]: no config URL provided Jul 2 07:46:11.702065 ignition[643]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:46:11.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.708000 audit: BPF prog-id=9 op=LOAD Jul 2 07:46:11.706476 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:46:11.702071 ignition[643]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:46:11.709352 systemd[1]: Starting systemd-networkd.service... Jul 2 07:46:11.702100 ignition[643]: op(1): [started] loading QEMU firmware config module Jul 2 07:46:11.702105 ignition[643]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 2 07:46:11.705809 ignition[643]: op(1): [finished] loading QEMU firmware config module Jul 2 07:46:11.705825 ignition[643]: QEMU firmware config was not found. Ignoring... Jul 2 07:46:11.707804 ignition[643]: parsing config with SHA512: 82861f333b48aeaa4bc3e50f8c1ad8d78be75316b509a56289594b6fbfdeead060a97389a83fa28776a25d725382cc4f9fa04a94c9b97b8b7c8a9e74e14cc3d8 Jul 2 07:46:11.722183 unknown[643]: fetched base config from "system" Jul 2 07:46:11.722505 ignition[643]: fetch-offline: fetch-offline passed Jul 2 07:46:11.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.722200 unknown[643]: fetched user config from "qemu" Jul 2 07:46:11.722575 ignition[643]: Ignition finished successfully Jul 2 07:46:11.723560 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:46:11.730875 systemd-networkd[717]: lo: Link UP Jul 2 07:46:11.730885 systemd-networkd[717]: lo: Gained carrier Jul 2 07:46:11.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.731293 systemd-networkd[717]: Enumeration completed Jul 2 07:46:11.731358 systemd[1]: Started systemd-networkd.service. Jul 2 07:46:11.731930 systemd-networkd[717]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:46:11.732817 systemd-networkd[717]: eth0: Link UP Jul 2 07:46:11.732821 systemd-networkd[717]: eth0: Gained carrier Jul 2 07:46:11.732873 systemd[1]: Reached target network.target. Jul 2 07:46:11.734435 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 07:46:11.735202 systemd[1]: Starting ignition-kargs.service... Jul 2 07:46:11.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.736686 systemd[1]: Starting iscsiuio.service... Jul 2 07:46:11.742184 systemd[1]: Started iscsiuio.service. Jul 2 07:46:11.745660 ignition[719]: Ignition 2.14.0 Jul 2 07:46:11.744494 systemd[1]: Starting iscsid.service... Jul 2 07:46:11.745666 ignition[719]: Stage: kargs Jul 2 07:46:11.748742 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:46:11.748742 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:46:11.748742 iscsid[727]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:46:11.748742 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:46:11.748742 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:46:11.748742 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:46:11.748742 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:46:11.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.745219 systemd-networkd[717]: eth0: DHCPv4 address 10.0.0.75/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 07:46:11.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.745765 ignition[719]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:46:11.748271 systemd[1]: Finished ignition-kargs.service. Jul 2 07:46:11.745776 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:46:11.749763 systemd[1]: Started iscsid.service. Jul 2 07:46:11.746662 ignition[719]: kargs: kargs passed Jul 2 07:46:11.750685 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:46:11.746704 ignition[719]: Ignition finished successfully Jul 2 07:46:11.753283 systemd[1]: Starting ignition-disks.service... Jul 2 07:46:11.759904 ignition[729]: Ignition 2.14.0 Jul 2 07:46:11.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.761284 systemd[1]: Finished ignition-disks.service. Jul 2 07:46:11.759911 ignition[729]: Stage: disks Jul 2 07:46:11.762549 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:46:11.759992 ignition[729]: no configs at "/usr/lib/ignition/base.d" Jul 2 07:46:11.764611 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:46:11.759999 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:46:11.766696 systemd[1]: Reached target local-fs.target. Jul 2 07:46:11.760588 ignition[729]: disks: disks passed Jul 2 07:46:11.767491 systemd[1]: Reached target sysinit.target. Jul 2 07:46:11.760619 ignition[729]: Ignition finished successfully Jul 2 07:46:11.768256 systemd[1]: Reached target basic.target. Jul 2 07:46:11.769248 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:46:11.771177 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:46:11.772008 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:46:11.796140 systemd-fsck[749]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 07:46:11.773718 systemd[1]: Reached target remote-fs.target. Jul 2 07:46:11.775161 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:46:11.781722 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:46:11.783221 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:46:11.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.800035 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:46:11.802672 systemd[1]: Mounting sysroot.mount... Jul 2 07:46:11.809055 systemd[1]: Mounted sysroot.mount. Jul 2 07:46:11.810437 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:46:11.810471 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:46:11.812031 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:46:11.813069 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:46:11.813111 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:46:11.813128 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:46:11.815013 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:46:11.821099 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:46:11.816980 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:46:11.823401 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:46:11.825307 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:46:11.827469 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:46:11.848790 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:46:11.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.850294 systemd[1]: Starting ignition-mount.service... Jul 2 07:46:11.851963 systemd[1]: Starting sysroot-boot.service... Jul 2 07:46:11.853985 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 07:46:11.860038 ignition[801]: INFO : Ignition 2.14.0 Jul 2 07:46:11.861009 ignition[801]: INFO : Stage: mount Jul 2 07:46:11.861009 ignition[801]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:46:11.861009 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:46:11.863785 ignition[801]: INFO : mount: mount passed Jul 2 07:46:11.863785 ignition[801]: INFO : Ignition finished successfully Jul 2 07:46:11.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.862825 systemd[1]: Finished ignition-mount.service. Jul 2 07:46:11.872298 systemd[1]: Finished sysroot-boot.service. Jul 2 07:46:11.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:11.989505 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.75 Jul 2 07:46:11.989518 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux8'. Jul 2 07:46:12.575671 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:46:12.583104 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (810) Jul 2 07:46:12.583129 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:46:12.584689 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:46:12.584701 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:46:12.588201 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:46:12.588771 systemd[1]: Starting ignition-files.service... Jul 2 07:46:12.601206 ignition[830]: INFO : Ignition 2.14.0 Jul 2 07:46:12.601206 ignition[830]: INFO : Stage: files Jul 2 07:46:12.602763 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:46:12.602763 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:46:12.605606 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:46:12.606927 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:46:12.606927 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:46:12.609767 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:46:12.611213 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:46:12.612934 unknown[830]: wrote ssh authorized keys file for user: core Jul 2 07:46:12.613953 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:46:12.615735 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:46:12.617534 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:46:12.619226 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 2 07:46:12.621178 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 2 07:46:12.623098 ignition[830]: INFO : files: op(5): [started] processing unit "coreos-metadata.service" Jul 2 07:46:12.624324 ignition[830]: INFO : files: op(5): op(6): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 07:46:12.626319 ignition[830]: INFO : files: op(5): op(6): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 07:46:12.626319 ignition[830]: INFO : files: op(5): [finished] processing unit "coreos-metadata.service" Jul 2 07:46:12.629414 ignition[830]: INFO : files: op(7): [started] setting preset to disabled for "coreos-metadata.service" Jul 2 07:46:12.629414 ignition[830]: INFO : files: op(7): op(8): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 07:46:12.649374 ignition[830]: INFO : files: op(7): op(8): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 07:46:12.651052 ignition[830]: INFO : files: op(7): [finished] setting preset to disabled for "coreos-metadata.service" Jul 2 07:46:12.652592 ignition[830]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:46:12.654322 ignition[830]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:46:12.654322 ignition[830]: INFO : files: files passed Jul 2 07:46:12.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.657711 ignition[830]: INFO : Ignition finished successfully Jul 2 07:46:12.656301 systemd[1]: Finished ignition-files.service. Jul 2 07:46:12.658280 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:46:12.659542 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:46:12.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.665226 initrd-setup-root-after-ignition[853]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 2 07:46:12.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.660000 systemd[1]: Starting ignition-quench.service... Jul 2 07:46:12.669973 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:46:12.662870 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:46:12.662938 systemd[1]: Finished ignition-quench.service. Jul 2 07:46:12.665277 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:46:12.665416 systemd[1]: Reached target ignition-complete.target. Jul 2 07:46:12.666017 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:46:12.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.675868 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:46:12.675933 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:46:12.677033 systemd[1]: Reached target initrd-fs.target. Jul 2 07:46:12.677102 systemd[1]: Reached target initrd.target. Jul 2 07:46:12.677294 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:46:12.677798 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:46:12.686517 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:46:12.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.687857 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:46:12.696157 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:46:12.697066 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:46:12.698704 systemd[1]: Stopped target timers.target. Jul 2 07:46:12.700307 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:46:12.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.700396 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:46:12.701906 systemd[1]: Stopped target initrd.target. Jul 2 07:46:12.703544 systemd[1]: Stopped target basic.target. Jul 2 07:46:12.705079 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:46:12.706660 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:46:12.708260 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:46:12.709980 systemd[1]: Stopped target remote-fs.target. Jul 2 07:46:12.711610 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:46:12.713317 systemd[1]: Stopped target sysinit.target. Jul 2 07:46:12.714842 systemd[1]: Stopped target local-fs.target. Jul 2 07:46:12.716410 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:46:12.717983 systemd[1]: Stopped target swap.target. Jul 2 07:46:12.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.719440 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:46:12.719522 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:46:12.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.721130 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:46:12.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.722540 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:46:12.722622 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:46:12.724396 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:46:12.724477 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:46:12.726051 systemd[1]: Stopped target paths.target. Jul 2 07:46:12.727507 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:46:12.733149 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:46:12.735075 systemd[1]: Stopped target slices.target. Jul 2 07:46:12.735916 systemd[1]: Stopped target sockets.target. Jul 2 07:46:12.737420 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:46:12.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.737529 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:46:12.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.739162 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:46:12.743672 iscsid[727]: iscsid shutting down. Jul 2 07:46:12.739245 systemd[1]: Stopped ignition-files.service. Jul 2 07:46:12.741734 systemd[1]: Stopping ignition-mount.service... Jul 2 07:46:12.744146 systemd[1]: Stopping iscsid.service... Jul 2 07:46:12.747069 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:46:12.749713 ignition[869]: INFO : Ignition 2.14.0 Jul 2 07:46:12.749713 ignition[869]: INFO : Stage: umount Jul 2 07:46:12.749713 ignition[869]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 07:46:12.749713 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 07:46:12.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.747984 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:46:12.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.757372 ignition[869]: INFO : umount: umount passed Jul 2 07:46:12.757372 ignition[869]: INFO : Ignition finished successfully Jul 2 07:46:12.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.748173 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:46:12.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.749922 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:46:12.750102 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:46:12.753438 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:46:12.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.753514 systemd[1]: Stopped iscsid.service. Jul 2 07:46:12.755765 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:46:12.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.755842 systemd[1]: Stopped ignition-mount.service. Jul 2 07:46:12.758343 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:46:12.758412 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:46:12.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.760976 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:46:12.761836 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:46:12.761861 systemd[1]: Closed iscsid.socket. Jul 2 07:46:12.762656 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:46:12.762687 systemd[1]: Stopped ignition-disks.service. Jul 2 07:46:12.764257 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:46:12.764286 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:46:12.781957 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:46:12.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.781987 systemd[1]: Stopped ignition-setup.service. Jul 2 07:46:12.783512 systemd[1]: Stopping iscsiuio.service... Jul 2 07:46:12.786462 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:46:12.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.786528 systemd[1]: Stopped iscsiuio.service. Jul 2 07:46:12.787528 systemd[1]: Stopped target network.target. Jul 2 07:46:12.789028 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:46:12.818000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:46:12.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.789053 systemd[1]: Closed iscsiuio.socket. Jul 2 07:46:12.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.789211 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:46:12.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.789619 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:46:12.795124 systemd-networkd[717]: eth0: DHCPv6 lease lost Jul 2 07:46:12.825000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:46:12.796578 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:46:12.796651 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:46:12.800229 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:46:12.800296 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:46:12.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.815787 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:46:12.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.815820 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:46:12.817434 systemd[1]: Stopping network-cleanup.service... Jul 2 07:46:12.818176 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:46:12.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.818220 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:46:12.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.819973 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:46:12.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.820010 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:46:12.821517 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:46:12.821551 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:46:12.823314 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:46:12.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.827332 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:46:12.829860 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:46:12.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.829955 systemd[1]: Stopped network-cleanup.service. Jul 2 07:46:12.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.831410 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:46:12.831529 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:46:12.832832 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:46:12.832859 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:46:12.834671 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:46:12.834707 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:46:12.836153 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:46:12.836193 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:46:12.836961 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:46:12.836995 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:46:12.839372 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:46:12.839407 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:46:12.841916 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:46:12.844308 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 07:46:12.844352 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 07:46:12.846683 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:46:12.846727 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:46:12.847929 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:46:12.847961 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:46:12.851324 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 07:46:12.872979 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:46:12.873078 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:46:12.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.874499 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:46:12.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.874578 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:46:12.876575 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:46:12.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:12.878214 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:46:12.878258 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:46:12.880382 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:46:12.897240 systemd[1]: Switching root. Jul 2 07:46:12.914866 systemd-journald[197]: Journal stopped Jul 2 07:46:13.495461 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Jul 2 07:46:13.495525 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:46:13.495541 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:46:13.495551 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:46:13.495561 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:46:13.495570 kernel: SELinux: policy capability open_perms=1 Jul 2 07:46:13.495581 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:46:13.495591 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:46:13.495600 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:46:13.495609 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:46:13.495618 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:46:13.495627 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:46:13.495640 systemd[1]: Successfully loaded SELinux policy in 36.965ms. Jul 2 07:46:13.495661 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.610ms. Jul 2 07:46:13.495672 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:46:13.495684 systemd[1]: Detected virtualization kvm. Jul 2 07:46:13.495694 systemd[1]: Detected architecture x86-64. Jul 2 07:46:13.495704 systemd[1]: Detected first boot. Jul 2 07:46:13.495718 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:46:13.495728 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:46:13.495739 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:46:13.495749 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:46:13.495761 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:46:13.495771 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:46:13.495781 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:46:13.495800 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:46:13.495810 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:46:13.495820 systemd[1]: Created slice system-getty.slice. Jul 2 07:46:13.495830 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:46:13.495840 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:46:13.495851 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:46:13.495862 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:46:13.495872 systemd[1]: Created slice user.slice. Jul 2 07:46:13.495882 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:46:13.495892 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:46:13.495902 systemd[1]: Set up automount boot.automount. Jul 2 07:46:13.495912 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:46:13.495922 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:46:13.495932 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:46:13.495943 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:46:13.495954 systemd[1]: Reached target integritysetup.target. Jul 2 07:46:13.495965 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:46:13.495975 systemd[1]: Reached target remote-fs.target. Jul 2 07:46:13.495986 systemd[1]: Reached target slices.target. Jul 2 07:46:13.495996 systemd[1]: Reached target swap.target. Jul 2 07:46:13.496007 systemd[1]: Reached target veritysetup.target. Jul 2 07:46:13.496017 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:46:13.496027 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:46:13.496037 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:46:13.496047 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:46:13.496058 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:46:13.496068 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:46:13.496078 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:46:13.496100 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:46:13.496111 systemd[1]: Mounting media.mount... Jul 2 07:46:13.496121 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:13.496131 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:46:13.496141 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:46:13.496152 systemd[1]: Mounting tmp.mount... Jul 2 07:46:13.496162 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:46:13.496172 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:46:13.496182 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:46:13.496192 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:46:13.496203 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:46:13.496213 systemd[1]: Starting modprobe@drm.service... Jul 2 07:46:13.496223 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:46:13.496233 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:46:13.496243 systemd[1]: Starting modprobe@loop.service... Jul 2 07:46:13.496254 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:46:13.496264 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:46:13.496274 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:46:13.496284 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:46:13.496296 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:46:13.496306 kernel: loop: module loaded Jul 2 07:46:13.496316 kernel: fuse: init (API version 7.34) Jul 2 07:46:13.496325 systemd[1]: Stopped systemd-journald.service. Jul 2 07:46:13.496335 systemd[1]: Starting systemd-journald.service... Jul 2 07:46:13.496345 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:46:13.496355 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:46:13.496365 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:46:13.496375 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:46:13.496386 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:46:13.496396 systemd[1]: Stopped verity-setup.service. Jul 2 07:46:13.496407 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:13.496416 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:46:13.496427 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:46:13.496439 systemd-journald[977]: Journal started Jul 2 07:46:13.496477 systemd-journald[977]: Runtime Journal (/run/log/journal/e636841f74eb4f579e6c77eb1de5ceeb) is 6.0M, max 48.4M, 42.4M free. Jul 2 07:46:12.971000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:46:13.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:46:13.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:46:13.071000 audit: BPF prog-id=10 op=LOAD Jul 2 07:46:13.071000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:46:13.071000 audit: BPF prog-id=11 op=LOAD Jul 2 07:46:13.071000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:46:13.367000 audit: BPF prog-id=12 op=LOAD Jul 2 07:46:13.367000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:46:13.367000 audit: BPF prog-id=13 op=LOAD Jul 2 07:46:13.367000 audit: BPF prog-id=14 op=LOAD Jul 2 07:46:13.367000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:46:13.367000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:46:13.368000 audit: BPF prog-id=15 op=LOAD Jul 2 07:46:13.368000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:46:13.368000 audit: BPF prog-id=16 op=LOAD Jul 2 07:46:13.368000 audit: BPF prog-id=17 op=LOAD Jul 2 07:46:13.368000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:46:13.368000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:46:13.369000 audit: BPF prog-id=18 op=LOAD Jul 2 07:46:13.369000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:46:13.369000 audit: BPF prog-id=19 op=LOAD Jul 2 07:46:13.369000 audit: BPF prog-id=20 op=LOAD Jul 2 07:46:13.369000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:46:13.369000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:46:13.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.383000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:46:13.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.474000 audit: BPF prog-id=21 op=LOAD Jul 2 07:46:13.474000 audit: BPF prog-id=22 op=LOAD Jul 2 07:46:13.474000 audit: BPF prog-id=23 op=LOAD Jul 2 07:46:13.474000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:46:13.474000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:46:13.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.494000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:46:13.494000 audit[977]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc862175d0 a2=4000 a3=7ffc8621766c items=0 ppid=1 pid=977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:13.494000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:46:13.366755 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:46:13.366765 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 07:46:13.370012 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:46:13.498364 systemd[1]: Started systemd-journald.service. Jul 2 07:46:13.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.498885 systemd[1]: Mounted media.mount. Jul 2 07:46:13.499685 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:46:13.500620 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:46:13.501559 systemd[1]: Mounted tmp.mount. Jul 2 07:46:13.502511 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:46:13.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.503633 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:46:13.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.504693 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:46:13.504847 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:46:13.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.505916 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:46:13.506178 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:46:13.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.507232 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:46:13.507399 systemd[1]: Finished modprobe@drm.service. Jul 2 07:46:13.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.508448 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:46:13.508606 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:46:13.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.509693 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:46:13.509841 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:46:13.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.510869 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:46:13.511020 systemd[1]: Finished modprobe@loop.service. Jul 2 07:46:13.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.512143 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:46:13.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.513280 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:46:13.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.514542 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:46:13.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.515809 systemd[1]: Reached target network-pre.target. Jul 2 07:46:13.517593 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:46:13.519411 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:46:13.520294 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:46:13.521307 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:46:13.523049 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:46:13.523982 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:46:13.524841 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:46:13.525796 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:46:13.529359 systemd-journald[977]: Time spent on flushing to /var/log/journal/e636841f74eb4f579e6c77eb1de5ceeb is 12.670ms for 1094 entries. Jul 2 07:46:13.529359 systemd-journald[977]: System Journal (/var/log/journal/e636841f74eb4f579e6c77eb1de5ceeb) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:46:13.746400 systemd-journald[977]: Received client request to flush runtime journal. Jul 2 07:46:13.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:13.526640 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:46:13.550327 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:46:13.553303 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:46:13.554331 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:46:13.747034 udevadm[1001]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:46:13.555470 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:46:13.557223 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:46:13.596651 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:46:13.599079 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:46:13.600832 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:46:13.615439 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:46:13.627492 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:46:13.628491 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:46:13.747459 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:46:13.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.255538 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:46:14.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.257455 kernel: kauditd_printk_skb: 132 callbacks suppressed Jul 2 07:46:14.257496 kernel: audit: type=1130 audit(1719906374.256:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.260000 audit: BPF prog-id=24 op=LOAD Jul 2 07:46:14.261554 kernel: audit: type=1334 audit(1719906374.260:142): prog-id=24 op=LOAD Jul 2 07:46:14.261580 kernel: audit: type=1334 audit(1719906374.261:143): prog-id=25 op=LOAD Jul 2 07:46:14.261000 audit: BPF prog-id=25 op=LOAD Jul 2 07:46:14.262177 systemd[1]: Starting systemd-udevd.service... Jul 2 07:46:14.261000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:46:14.261000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:46:14.263105 kernel: audit: type=1334 audit(1719906374.261:144): prog-id=7 op=UNLOAD Jul 2 07:46:14.263127 kernel: audit: type=1334 audit(1719906374.261:145): prog-id=8 op=UNLOAD Jul 2 07:46:14.278618 systemd-udevd[1005]: Using default interface naming scheme 'v252'. Jul 2 07:46:14.290872 systemd[1]: Started systemd-udevd.service. Jul 2 07:46:14.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.340322 kernel: audit: type=1130 audit(1719906374.334:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.340405 kernel: audit: type=1334 audit(1719906374.337:147): prog-id=26 op=LOAD Jul 2 07:46:14.337000 audit: BPF prog-id=26 op=LOAD Jul 2 07:46:14.338443 systemd[1]: Starting systemd-networkd.service... Jul 2 07:46:14.343000 audit: BPF prog-id=27 op=LOAD Jul 2 07:46:14.346467 kernel: audit: type=1334 audit(1719906374.343:148): prog-id=27 op=LOAD Jul 2 07:46:14.346487 kernel: audit: type=1334 audit(1719906374.344:149): prog-id=28 op=LOAD Jul 2 07:46:14.346500 kernel: audit: type=1334 audit(1719906374.345:150): prog-id=29 op=LOAD Jul 2 07:46:14.344000 audit: BPF prog-id=28 op=LOAD Jul 2 07:46:14.345000 audit: BPF prog-id=29 op=LOAD Jul 2 07:46:14.345969 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:46:14.362925 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:46:14.370220 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:46:14.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.376754 systemd[1]: Started systemd-userdbd.service. Jul 2 07:46:14.398110 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:46:14.410100 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:46:14.414753 systemd-networkd[1015]: lo: Link UP Jul 2 07:46:14.415008 systemd-networkd[1015]: lo: Gained carrier Jul 2 07:46:14.415423 systemd-networkd[1015]: Enumeration completed Jul 2 07:46:14.415577 systemd-networkd[1015]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:46:14.415601 systemd[1]: Started systemd-networkd.service. Jul 2 07:46:14.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.417193 systemd-networkd[1015]: eth0: Link UP Jul 2 07:46:14.417259 systemd-networkd[1015]: eth0: Gained carrier Jul 2 07:46:14.414000 audit[1034]: AVC avc: denied { confidentiality } for pid=1034 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:46:14.414000 audit[1034]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a67edf35b0 a1=3207c a2=7f1b7403fbc5 a3=5 items=108 ppid=1005 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:14.414000 audit: CWD cwd="/" Jul 2 07:46:14.414000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=1 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=2 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=3 name=(null) inode=12027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=4 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=5 name=(null) inode=12028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=6 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=7 name=(null) inode=12029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=8 name=(null) inode=12029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=9 name=(null) inode=12030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=10 name=(null) inode=12029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=11 name=(null) inode=12031 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=12 name=(null) inode=12029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=13 name=(null) inode=12032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=14 name=(null) inode=12029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=15 name=(null) inode=12033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=16 name=(null) inode=12029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=17 name=(null) inode=12034 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=18 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=19 name=(null) inode=12035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=20 name=(null) inode=12035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=21 name=(null) inode=12036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=22 name=(null) inode=12035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=23 name=(null) inode=12037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=24 name=(null) inode=12035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=25 name=(null) inode=12038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=26 name=(null) inode=12035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=27 name=(null) inode=12039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=28 name=(null) inode=12035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=29 name=(null) inode=12040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=30 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=31 name=(null) inode=12041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=32 name=(null) inode=12041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=33 name=(null) inode=12042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=34 name=(null) inode=12041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=35 name=(null) inode=12043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=36 name=(null) inode=12041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=37 name=(null) inode=12044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=38 name=(null) inode=12041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=39 name=(null) inode=12045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=40 name=(null) inode=12041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=41 name=(null) inode=12046 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=42 name=(null) inode=12026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=43 name=(null) inode=12047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=44 name=(null) inode=12047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=45 name=(null) inode=12048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=46 name=(null) inode=12047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=47 name=(null) inode=12049 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=48 name=(null) inode=12047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=49 name=(null) inode=12050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=50 name=(null) inode=12047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=51 name=(null) inode=12051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=52 name=(null) inode=12047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=53 name=(null) inode=12052 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=55 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=56 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=57 name=(null) inode=12054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=58 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=59 name=(null) inode=12055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=60 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=61 name=(null) inode=12056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=62 name=(null) inode=12056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=63 name=(null) inode=12057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=64 name=(null) inode=12056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=65 name=(null) inode=12058 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=66 name=(null) inode=12056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=67 name=(null) inode=12059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=68 name=(null) inode=12056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=69 name=(null) inode=12060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=70 name=(null) inode=12056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=71 name=(null) inode=12061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=72 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=73 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=74 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=75 name=(null) inode=12063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=76 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=77 name=(null) inode=12064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=78 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=79 name=(null) inode=12065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=80 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=81 name=(null) inode=12066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=82 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=83 name=(null) inode=12067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=84 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=85 name=(null) inode=12068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=86 name=(null) inode=12068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=87 name=(null) inode=12069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=88 name=(null) inode=12068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=89 name=(null) inode=12070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=90 name=(null) inode=12068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=91 name=(null) inode=12071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=92 name=(null) inode=12068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=93 name=(null) inode=12072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=94 name=(null) inode=12068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=95 name=(null) inode=12073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=96 name=(null) inode=12053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=97 name=(null) inode=12074 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=98 name=(null) inode=12074 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=99 name=(null) inode=12075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=100 name=(null) inode=12074 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=101 name=(null) inode=12076 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=102 name=(null) inode=12074 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=103 name=(null) inode=12077 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=104 name=(null) inode=12074 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=105 name=(null) inode=12078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=106 name=(null) inode=12074 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PATH item=107 name=(null) inode=12079 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:46:14.414000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:46:14.439107 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Jul 2 07:46:14.444294 systemd-networkd[1015]: eth0: DHCPv4 address 10.0.0.75/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 07:46:14.455100 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 07:46:14.459105 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:46:14.522656 kernel: kvm: Nested Virtualization enabled Jul 2 07:46:14.522796 kernel: SVM: kvm: Nested Paging enabled Jul 2 07:46:14.522812 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 2 07:46:14.522850 kernel: SVM: Virtual GIF supported Jul 2 07:46:14.539101 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:46:14.557451 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:46:14.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.568491 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:46:14.575094 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:46:14.601695 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:46:14.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.635058 systemd[1]: Reached target cryptsetup.target. Jul 2 07:46:14.636662 systemd[1]: Starting lvm2-activation.service... Jul 2 07:46:14.639725 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:46:14.665655 systemd[1]: Finished lvm2-activation.service. Jul 2 07:46:14.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.666554 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:46:14.667391 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:46:14.667414 systemd[1]: Reached target local-fs.target. Jul 2 07:46:14.668200 systemd[1]: Reached target machines.target. Jul 2 07:46:14.669815 systemd[1]: Starting ldconfig.service... Jul 2 07:46:14.670741 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:46:14.670800 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:14.671593 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:46:14.673366 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:46:14.675648 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:46:14.677421 systemd[1]: Starting systemd-sysext.service... Jul 2 07:46:14.678464 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Jul 2 07:46:14.679399 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:46:14.685661 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:46:14.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.689541 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:46:14.699698 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:46:14.699831 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:46:14.766308 (sd-sysext)[1055]: No suitable extensions found (2 ignored due to incompatible version). Jul 2 07:46:14.774510 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:14.775842 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:46:14.776125 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:46:14.777002 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:46:14.780602 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:46:14.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.784710 systemd[1]: Starting modprobe@loop.service... Jul 2 07:46:14.784806 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:46:14.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.784950 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:14.785116 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:14.786210 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:46:14.786353 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:46:14.786836 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:46:14.786958 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:46:14.787722 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:46:14.788802 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:46:14.788911 systemd[1]: Finished modprobe@loop.service. Jul 2 07:46:14.789240 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:46:14.791655 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:46:14.793034 systemd-fsck[1054]: fsck.fat 4.2 (2021-01-31) Jul 2 07:46:14.793034 systemd-fsck[1054]: /dev/vda1: 790 files, 119261/258078 clusters Jul 2 07:46:14.794076 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:46:14.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.795974 systemd[1]: Finished systemd-sysext.service. Jul 2 07:46:14.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:14.798252 systemd[1]: Mounting boot.mount... Jul 2 07:46:14.799783 systemd[1]: Starting ensure-sysext.service... Jul 2 07:46:14.801447 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:46:14.807311 systemd[1]: Mounted boot.mount. Jul 2 07:46:14.808160 systemd[1]: Reloading. Jul 2 07:46:14.847802 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:46:14.850953 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:46:14.852256 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:46:14.923293 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:46:14.923310 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:46:14.976385 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:46:14.987000 audit: BPF prog-id=30 op=LOAD Jul 2 07:46:14.987000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:46:14.987000 audit: BPF prog-id=31 op=LOAD Jul 2 07:46:14.988000 audit: BPF prog-id=32 op=LOAD Jul 2 07:46:14.988000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:46:14.988000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:46:14.989000 audit: BPF prog-id=33 op=LOAD Jul 2 07:46:14.989000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:46:14.990000 audit: BPF prog-id=34 op=LOAD Jul 2 07:46:14.990000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:46:14.990000 audit: BPF prog-id=35 op=LOAD Jul 2 07:46:14.990000 audit: BPF prog-id=36 op=LOAD Jul 2 07:46:14.990000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:46:14.990000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:46:14.991000 audit: BPF prog-id=37 op=LOAD Jul 2 07:46:14.991000 audit: BPF prog-id=38 op=LOAD Jul 2 07:46:14.991000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:46:14.991000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:46:14.993776 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:46:14.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.002977 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:15.003171 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.004173 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:46:15.021261 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:46:15.037008 systemd[1]: Starting modprobe@loop.service... Jul 2 07:46:15.037820 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.037924 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:15.038024 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:15.038844 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:46:15.038951 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:46:15.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.040128 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:46:15.040224 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:46:15.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.041389 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:46:15.041484 systemd[1]: Finished modprobe@loop.service. Jul 2 07:46:15.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.042804 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:46:15.042890 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.044115 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:15.044287 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.045268 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:46:15.046910 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:46:15.048584 systemd[1]: Starting modprobe@loop.service... Jul 2 07:46:15.049397 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.049495 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:15.049587 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:15.050291 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:46:15.050396 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:46:15.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.051531 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:46:15.051625 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:46:15.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.052780 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:46:15.052872 systemd[1]: Finished modprobe@loop.service. Jul 2 07:46:15.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.056779 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:15.057035 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.058398 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:46:15.060215 systemd[1]: Starting modprobe@drm.service... Jul 2 07:46:15.062046 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:46:15.063810 systemd[1]: Starting modprobe@loop.service... Jul 2 07:46:15.087838 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.087949 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:15.088075 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:46:15.089020 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:46:15.089137 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:46:15.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.090392 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:46:15.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.091648 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:46:15.091752 systemd[1]: Finished modprobe@drm.service. Jul 2 07:46:15.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.092939 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:46:15.093033 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:46:15.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.094302 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:46:15.094394 systemd[1]: Finished modprobe@loop.service. Jul 2 07:46:15.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.096650 systemd[1]: Starting audit-rules.service... Jul 2 07:46:15.098327 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:46:15.100192 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:46:15.101296 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:46:15.101343 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:46:15.101000 audit: BPF prog-id=39 op=LOAD Jul 2 07:46:15.103208 systemd[1]: Starting systemd-resolved.service... Jul 2 07:46:15.104000 audit: BPF prog-id=40 op=LOAD Jul 2 07:46:15.105473 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:46:15.107117 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:46:15.108516 systemd[1]: Finished ensure-sysext.service. Jul 2 07:46:15.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.109606 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:46:15.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.111489 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:46:15.114000 audit[1141]: SYSTEM_BOOT pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.116874 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:46:15.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.120126 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:46:15.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:15.165000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:46:15.165000 audit[1150]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd585373c0 a2=420 a3=0 items=0 ppid=1130 pid=1150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:15.165000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:46:15.165924 augenrules[1150]: No rules Jul 2 07:46:15.166464 systemd[1]: Finished audit-rules.service. Jul 2 07:46:15.191348 systemd-resolved[1138]: Positive Trust Anchors: Jul 2 07:46:15.191362 systemd-resolved[1138]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:46:15.191389 systemd-resolved[1138]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:46:15.192772 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:46:15.193721 systemd[1]: Reached target time-set.target. Jul 2 07:46:15.922069 systemd-timesyncd[1140]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 2 07:46:15.922106 systemd-timesyncd[1140]: Initial clock synchronization to Tue 2024-07-02 07:46:15.921996 UTC. Jul 2 07:46:15.927836 systemd-resolved[1138]: Defaulting to hostname 'linux'. Jul 2 07:46:15.929213 systemd[1]: Started systemd-resolved.service. Jul 2 07:46:15.930085 systemd[1]: Reached target network.target. Jul 2 07:46:15.930860 systemd[1]: Reached target nss-lookup.target. Jul 2 07:46:16.062113 systemd[1]: Finished ldconfig.service. Jul 2 07:46:16.064226 systemd[1]: Starting systemd-update-done.service... Jul 2 07:46:16.068945 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:46:16.069356 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:46:16.071195 systemd[1]: Finished systemd-update-done.service. Jul 2 07:46:16.072157 systemd[1]: Reached target sysinit.target. Jul 2 07:46:16.073012 systemd[1]: Started motdgen.path. Jul 2 07:46:16.073725 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:46:16.074914 systemd[1]: Started logrotate.timer. Jul 2 07:46:16.075716 systemd[1]: Started mdadm.timer. Jul 2 07:46:16.076388 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:46:16.077257 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:46:16.077289 systemd[1]: Reached target paths.target. Jul 2 07:46:16.078037 systemd[1]: Reached target timers.target. Jul 2 07:46:16.079067 systemd[1]: Listening on dbus.socket. Jul 2 07:46:16.081662 systemd[1]: Listening on sshd.socket. Jul 2 07:46:16.082434 systemd[1]: Reached target sockets.target. Jul 2 07:46:16.083290 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:16.083312 systemd[1]: Reached target basic.target. Jul 2 07:46:16.084102 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:16.084132 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:16.084839 systemd[1]: Starting dbus.service... Jul 2 07:46:16.086341 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:46:16.088223 systemd[1]: Starting extend-filesystems.service... Jul 2 07:46:16.089120 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:46:16.090185 systemd[1]: Starting motdgen.service... Jul 2 07:46:16.096368 jq[1161]: false Jul 2 07:46:16.092173 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:46:16.094179 systemd[1]: Starting sshd-keygen.service... Jul 2 07:46:16.097486 systemd[1]: Starting systemd-logind.service... Jul 2 07:46:16.099793 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:46:16.099872 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:46:16.100248 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:46:16.100926 systemd[1]: Starting update-engine.service... Jul 2 07:46:16.101745 extend-filesystems[1162]: Found sr0 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda1 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda2 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda3 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found usr Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda4 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda6 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda7 Jul 2 07:46:16.101745 extend-filesystems[1162]: Found vda9 Jul 2 07:46:16.101745 extend-filesystems[1162]: Checking size of /dev/vda9 Jul 2 07:46:16.103373 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:46:16.107603 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:46:16.121549 jq[1179]: true Jul 2 07:46:16.107793 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:46:16.121741 jq[1181]: true Jul 2 07:46:16.108098 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:46:16.108239 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:46:16.115804 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:46:16.115990 systemd[1]: Finished motdgen.service. Jul 2 07:46:16.138939 dbus-daemon[1160]: [system] SELinux support is enabled Jul 2 07:46:16.139115 systemd[1]: Started dbus.service. Jul 2 07:46:16.140182 extend-filesystems[1162]: Old size kept for /dev/vda9 Jul 2 07:46:16.142448 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:46:16.142634 systemd[1]: Finished extend-filesystems.service. Jul 2 07:46:16.143188 systemd-logind[1169]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:46:16.143203 systemd-logind[1169]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:46:16.145420 systemd-logind[1169]: New seat seat0. Jul 2 07:46:16.147159 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:46:16.147198 systemd[1]: Reached target system-config.target. Jul 2 07:46:16.148396 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:46:16.148423 systemd[1]: Reached target user-config.target. Jul 2 07:46:16.151353 systemd[1]: Started systemd-logind.service. Jul 2 07:46:16.153134 bash[1197]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:46:16.153847 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:46:16.157627 update_engine[1173]: I0702 07:46:16.156745 1173 main.cc:92] Flatcar Update Engine starting Jul 2 07:46:16.164100 update_engine[1173]: I0702 07:46:16.159999 1173 update_check_scheduler.cc:74] Next update check in 6m54s Jul 2 07:46:16.160384 systemd[1]: Started update-engine.service. Jul 2 07:46:16.162817 systemd[1]: Started locksmithd.service. Jul 2 07:46:16.186545 locksmithd[1201]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:46:16.807224 systemd-networkd[1015]: eth0: Gained IPv6LL Jul 2 07:46:17.273118 sshd_keygen[1180]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:46:17.291030 systemd[1]: Finished sshd-keygen.service. Jul 2 07:46:17.293219 systemd[1]: Starting issuegen.service... Jul 2 07:46:17.297605 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:46:17.297731 systemd[1]: Finished issuegen.service. Jul 2 07:46:17.299667 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:46:17.304595 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:46:17.306680 systemd[1]: Started getty@tty1.service. Jul 2 07:46:17.308448 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:46:17.309523 systemd[1]: Reached target getty.target. Jul 2 07:46:17.310422 systemd[1]: Reached target multi-user.target. Jul 2 07:46:17.312173 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:46:17.317711 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:46:17.317839 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:46:17.318974 systemd[1]: Startup finished in 566ms (kernel) + 3.265s (initrd) + 3.658s (userspace) = 7.490s. Jul 2 07:46:25.430760 systemd[1]: Created slice system-sshd.slice. Jul 2 07:46:25.431926 systemd[1]: Started sshd@0-10.0.0.75:22-10.0.0.1:55510.service. Jul 2 07:46:25.468290 sshd[1221]: Accepted publickey for core from 10.0.0.1 port 55510 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:25.469783 sshd[1221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:25.478640 systemd-logind[1169]: New session 1 of user core. Jul 2 07:46:25.479629 systemd[1]: Created slice user-500.slice. Jul 2 07:46:25.480718 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:46:25.487988 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:46:25.489346 systemd[1]: Starting user@500.service... Jul 2 07:46:25.491701 (systemd)[1224]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:25.559971 systemd[1224]: Queued start job for default target default.target. Jul 2 07:46:25.560399 systemd[1224]: Reached target paths.target. Jul 2 07:46:25.560419 systemd[1224]: Reached target sockets.target. Jul 2 07:46:25.560430 systemd[1224]: Reached target timers.target. Jul 2 07:46:25.560448 systemd[1224]: Reached target basic.target. Jul 2 07:46:25.560493 systemd[1224]: Reached target default.target. Jul 2 07:46:25.560530 systemd[1224]: Startup finished in 64ms. Jul 2 07:46:25.560589 systemd[1]: Started user@500.service. Jul 2 07:46:25.561516 systemd[1]: Started session-1.scope. Jul 2 07:46:25.611947 systemd[1]: Started sshd@1-10.0.0.75:22-10.0.0.1:55514.service. Jul 2 07:46:25.644578 sshd[1233]: Accepted publickey for core from 10.0.0.1 port 55514 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:25.645717 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:25.649540 systemd-logind[1169]: New session 2 of user core. Jul 2 07:46:25.650206 systemd[1]: Started session-2.scope. Jul 2 07:46:25.703204 sshd[1233]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:25.705409 systemd[1]: sshd@1-10.0.0.75:22-10.0.0.1:55514.service: Deactivated successfully. Jul 2 07:46:25.705883 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:46:25.706297 systemd-logind[1169]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:46:25.707205 systemd[1]: Started sshd@2-10.0.0.75:22-10.0.0.1:55526.service. Jul 2 07:46:25.707780 systemd-logind[1169]: Removed session 2. Jul 2 07:46:25.738277 sshd[1239]: Accepted publickey for core from 10.0.0.1 port 55526 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:25.739341 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:25.742317 systemd-logind[1169]: New session 3 of user core. Jul 2 07:46:25.742943 systemd[1]: Started session-3.scope. Jul 2 07:46:25.790528 sshd[1239]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:25.793745 systemd[1]: Started sshd@3-10.0.0.75:22-10.0.0.1:55528.service. Jul 2 07:46:25.794185 systemd[1]: sshd@2-10.0.0.75:22-10.0.0.1:55526.service: Deactivated successfully. Jul 2 07:46:25.794721 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:46:25.795284 systemd-logind[1169]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:46:25.796136 systemd-logind[1169]: Removed session 3. Jul 2 07:46:25.824214 sshd[1244]: Accepted publickey for core from 10.0.0.1 port 55528 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:25.825154 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:25.828065 systemd-logind[1169]: New session 4 of user core. Jul 2 07:46:25.828716 systemd[1]: Started session-4.scope. Jul 2 07:46:25.880675 sshd[1244]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:25.883331 systemd[1]: sshd@3-10.0.0.75:22-10.0.0.1:55528.service: Deactivated successfully. Jul 2 07:46:25.883803 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:46:25.884283 systemd-logind[1169]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:46:25.885233 systemd[1]: Started sshd@4-10.0.0.75:22-10.0.0.1:55540.service. Jul 2 07:46:25.885814 systemd-logind[1169]: Removed session 4. Jul 2 07:46:25.917167 sshd[1251]: Accepted publickey for core from 10.0.0.1 port 55540 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:25.918355 sshd[1251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:25.921512 systemd-logind[1169]: New session 5 of user core. Jul 2 07:46:25.922173 systemd[1]: Started session-5.scope. Jul 2 07:46:25.976090 sudo[1254]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:46:25.976252 sudo[1254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:25.984248 dbus-daemon[1160]: \xd0-F\x97>V: received setenforce notice (enforcing=-1988917520) Jul 2 07:46:25.986310 sudo[1254]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:25.988097 sshd[1251]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:25.991296 systemd[1]: Started sshd@5-10.0.0.75:22-10.0.0.1:55544.service. Jul 2 07:46:25.991730 systemd[1]: sshd@4-10.0.0.75:22-10.0.0.1:55540.service: Deactivated successfully. Jul 2 07:46:25.992200 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:46:25.993064 systemd-logind[1169]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:46:25.993897 systemd-logind[1169]: Removed session 5. Jul 2 07:46:26.021844 sshd[1257]: Accepted publickey for core from 10.0.0.1 port 55544 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:26.022897 sshd[1257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:26.026000 systemd-logind[1169]: New session 6 of user core. Jul 2 07:46:26.026763 systemd[1]: Started session-6.scope. Jul 2 07:46:26.078533 sudo[1262]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:46:26.078752 sudo[1262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:26.081319 sudo[1262]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:26.085448 sudo[1261]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:46:26.085617 sudo[1261]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:26.092991 systemd[1]: Stopping audit-rules.service... Jul 2 07:46:26.094000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:46:26.094375 auditctl[1265]: No rules Jul 2 07:46:26.094690 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:46:26.094858 systemd[1]: Stopped audit-rules.service. Jul 2 07:46:26.096417 systemd[1]: Starting audit-rules.service... Jul 2 07:46:26.097051 kernel: kauditd_printk_skb: 176 callbacks suppressed Jul 2 07:46:26.097123 kernel: audit: type=1305 audit(1719906386.094:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:46:26.097143 kernel: audit: type=1300 audit(1719906386.094:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffedcc4d030 a2=420 a3=0 items=0 ppid=1 pid=1265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:26.094000 audit[1265]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffedcc4d030 a2=420 a3=0 items=0 ppid=1 pid=1265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:26.094000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:46:26.102561 kernel: audit: type=1327 audit(1719906386.094:214): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:46:26.102601 kernel: audit: type=1131 audit(1719906386.094:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.114109 augenrules[1282]: No rules Jul 2 07:46:26.114584 systemd[1]: Finished audit-rules.service. Jul 2 07:46:26.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.115290 sudo[1261]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:26.115000 audit[1261]: USER_END pid=1261 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.118603 sshd[1257]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:26.120767 systemd[1]: sshd@5-10.0.0.75:22-10.0.0.1:55544.service: Deactivated successfully. Jul 2 07:46:26.121404 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:46:26.121858 systemd-logind[1169]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:46:26.121936 kernel: audit: type=1130 audit(1719906386.114:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.121963 kernel: audit: type=1106 audit(1719906386.115:217): pid=1261 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.121978 kernel: audit: type=1104 audit(1719906386.115:218): pid=1261 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.115000 audit[1261]: CRED_DISP pid=1261 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.125087 systemd[1]: Started sshd@6-10.0.0.75:22-10.0.0.1:55552.service. Jul 2 07:46:26.125178 kernel: audit: type=1106 audit(1719906386.119:219): pid=1257 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.119000 audit[1257]: USER_END pid=1257 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.125460 systemd-logind[1169]: Removed session 6. Jul 2 07:46:26.119000 audit[1257]: CRED_DISP pid=1257 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.132757 kernel: audit: type=1104 audit(1719906386.119:220): pid=1257 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.132785 kernel: audit: type=1131 audit(1719906386.120:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.75:22-10.0.0.1:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.75:22-10.0.0.1:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.75:22-10.0.0.1:55552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.159000 audit[1288]: USER_ACCT pid=1288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.159476 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 55552 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:26.160000 audit[1288]: CRED_ACQ pid=1288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.160000 audit[1288]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe497355e0 a2=3 a3=0 items=0 ppid=1 pid=1288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:26.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:26.160347 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:26.163194 systemd-logind[1169]: New session 7 of user core. Jul 2 07:46:26.163821 systemd[1]: Started session-7.scope. Jul 2 07:46:26.167000 audit[1288]: USER_START pid=1288 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.168000 audit[1290]: CRED_ACQ pid=1290 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.213655 sshd[1288]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:26.214000 audit[1288]: USER_END pid=1288 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.214000 audit[1288]: CRED_DISP pid=1288 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.215943 systemd[1]: sshd@6-10.0.0.75:22-10.0.0.1:55552.service: Deactivated successfully. Jul 2 07:46:26.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.75:22-10.0.0.1:55552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.216379 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:46:26.216774 systemd-logind[1169]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:46:26.217590 systemd[1]: Started sshd@7-10.0.0.75:22-10.0.0.1:55556.service. Jul 2 07:46:26.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.75:22-10.0.0.1:55556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.218297 systemd-logind[1169]: Removed session 7. Jul 2 07:46:26.248000 audit[1295]: USER_ACCT pid=1295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.248983 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 55556 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:26.250000 audit[1295]: CRED_ACQ pid=1295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.250000 audit[1295]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf25f7a50 a2=3 a3=0 items=0 ppid=1 pid=1295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:26.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:26.250387 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:26.253461 systemd-logind[1169]: New session 8 of user core. Jul 2 07:46:26.254265 systemd[1]: Started session-8.scope. Jul 2 07:46:26.257000 audit[1295]: USER_START pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.258000 audit[1297]: CRED_ACQ pid=1297 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.803956 sshd[1295]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:26.804000 audit[1295]: USER_END pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.804000 audit[1295]: CRED_DISP pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.806562 systemd[1]: sshd@7-10.0.0.75:22-10.0.0.1:55556.service: Deactivated successfully. Jul 2 07:46:26.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.75:22-10.0.0.1:55556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.806998 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:46:26.807444 systemd-logind[1169]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:46:26.808250 systemd[1]: Started sshd@8-10.0.0.75:22-10.0.0.1:55572.service. Jul 2 07:46:26.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.75:22-10.0.0.1:55572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:26.808834 systemd-logind[1169]: Removed session 8. Jul 2 07:46:26.837000 audit[1310]: USER_ACCT pid=1310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.838047 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 55572 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:26.838000 audit[1310]: CRED_ACQ pid=1310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.838000 audit[1310]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff45481b20 a2=3 a3=0 items=0 ppid=1 pid=1310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:26.838000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:26.838865 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:26.841879 systemd-logind[1169]: New session 9 of user core. Jul 2 07:46:26.842750 systemd[1]: Started session-9.scope. Jul 2 07:46:26.846000 audit[1310]: USER_START pid=1310 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:26.847000 audit[1312]: CRED_ACQ pid=1312 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.492000 audit[1313]: USER_ACCT pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.493098 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 2 07:46:33.493260 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:33.495473 sudo[1313]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:33.496361 sshd[1310]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:33.498190 kernel: kauditd_printk_skb: 30 callbacks suppressed Jul 2 07:46:33.498429 kernel: audit: type=1101 audit(1719906393.492:246): pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.493000 audit[1313]: CRED_REFR pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.499126 systemd[1]: Started sshd@9-10.0.0.75:22-10.0.0.1:44724.service. Jul 2 07:46:33.499505 systemd[1]: sshd@8-10.0.0.75:22-10.0.0.1:55572.service: Deactivated successfully. Jul 2 07:46:33.499941 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:46:33.500046 systemd[1]: session-9.scope: Consumed 3.850s CPU time. Jul 2 07:46:33.500515 systemd-logind[1169]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:46:33.501369 systemd-logind[1169]: Removed session 9. Jul 2 07:46:33.502184 kernel: audit: type=1110 audit(1719906393.493:247): pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.502230 kernel: audit: type=1105 audit(1719906393.493:248): pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.493000 audit[1313]: USER_START pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.493000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.511038 kernel: audit: type=1106 audit(1719906393.493:249): pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.511096 kernel: audit: type=1104 audit(1719906393.493:250): pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.493000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.493000 audit[1310]: USER_END pid=1310 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.519809 kernel: audit: type=1106 audit(1719906393.493:251): pid=1310 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.519839 kernel: audit: type=1104 audit(1719906393.493:252): pid=1310 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.493000 audit[1310]: CRED_DISP pid=1310 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.75:22-10.0.0.1:44724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.527025 kernel: audit: type=1130 audit(1719906393.498:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.75:22-10.0.0.1:44724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.527063 kernel: audit: type=1131 audit(1719906393.498:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.75:22-10.0.0.1:55572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.75:22-10.0.0.1:55572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.534000 audit[1369]: USER_ACCT pid=1369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.534423 sshd[1369]: Accepted publickey for core from 10.0.0.1 port 44724 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:33.537445 sshd[1369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:33.537000 audit[1369]: CRED_ACQ pid=1369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.537000 audit[1369]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3202bf40 a2=3 a3=0 items=0 ppid=1 pid=1369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:33.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:33.539082 kernel: audit: type=1101 audit(1719906393.534:255): pid=1369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.540131 systemd-logind[1169]: New session 10 of user core. Jul 2 07:46:33.540716 systemd[1]: Started session-10.scope. Jul 2 07:46:33.543000 audit[1369]: USER_START pid=1369 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.544000 audit[1372]: CRED_ACQ pid=1372 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.590000 audit[1373]: USER_ACCT pid=1373 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.590376 sudo[1373]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 2 07:46:33.590000 audit[1373]: CRED_REFR pid=1373 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.590530 sudo[1373]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:33.591000 audit[1373]: USER_START pid=1373 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.598707 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 2 07:46:33.598925 systemd[1]: Stopped ensure-sysext.service. Jul 2 07:46:33.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.599000 systemd[1]: Stopping ensure-sysext.service... Jul 2 07:46:33.600474 systemd[1]: Stopping systemd-sysext.service... Jul 2 07:46:33.612164 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:33.612439 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:33.614232 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 2 07:46:33.614443 systemd[1]: Stopped systemd-sysext.service. Jul 2 07:46:33.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.616368 systemd[1]: Starting systemd-sysext.service... Jul 2 07:46:33.621881 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:46:33.624411 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:46:33.624562 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:46:33.631082 kernel: loop0: detected capacity change from 0 to 322896 Jul 2 07:46:33.637068 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:33.648077 kernel: loop1: detected capacity change from 0 to 301320 Jul 2 07:46:33.652098 kernel: EXT4-fs (loop1): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:33.667074 kernel: loop2: detected capacity change from 0 to 322896 Jul 2 07:46:33.672070 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:33.674074 kernel: loop3: detected capacity change from 0 to 301320 Jul 2 07:46:33.677803 (sd-sysext)[1386]: Using extensions 'containerd', 'docker'. Jul 2 07:46:33.678109 kernel: EXT4-fs (loop3): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:33.679108 (sd-sysext)[1386]: Merged extensions into '/usr'. Jul 2 07:46:33.694111 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:46:33.699020 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:46:33.699446 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:33.699689 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:33.700927 systemd[1]: Finished systemd-sysext.service. Jul 2 07:46:33.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.701594 sudo[1373]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:33.701000 audit[1373]: USER_END pid=1373 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.701000 audit[1373]: CRED_DISP pid=1373 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.702701 sshd[1369]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:33.703000 audit[1369]: USER_END pid=1369 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.703000 audit[1369]: CRED_DISP pid=1369 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.702950 systemd[1]: Starting ensure-sysext.service... Jul 2 07:46:33.705373 systemd[1]: sshd@9-10.0.0.75:22-10.0.0.1:44724.service: Deactivated successfully. Jul 2 07:46:33.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.75:22-10.0.0.1:44724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.705814 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:46:33.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.75:22-10.0.0.1:44732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.706335 systemd-logind[1169]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:46:33.707047 systemd[1]: Started sshd@10-10.0.0.75:22-10.0.0.1:44732.service. Jul 2 07:46:33.709478 systemd-logind[1169]: Removed session 10. Jul 2 07:46:33.709497 systemd[1]: Reloading. Jul 2 07:46:33.826642 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:46:33.826657 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:46:33.841975 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit: BPF prog-id=46 op=LOAD Jul 2 07:46:33.898000 audit: BPF prog-id=30 op=UNLOAD Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit: BPF prog-id=47 op=LOAD Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.898000 audit: BPF prog-id=48 op=LOAD Jul 2 07:46:33.898000 audit: BPF prog-id=31 op=UNLOAD Jul 2 07:46:33.898000 audit: BPF prog-id=32 op=UNLOAD Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.899000 audit: BPF prog-id=49 op=LOAD Jul 2 07:46:33.899000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit: BPF prog-id=50 op=LOAD Jul 2 07:46:33.901000 audit: BPF prog-id=33 op=UNLOAD Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit: BPF prog-id=51 op=LOAD Jul 2 07:46:33.902000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit: BPF prog-id=52 op=LOAD Jul 2 07:46:33.902000 audit: BPF prog-id=34 op=UNLOAD Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit: BPF prog-id=53 op=LOAD Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit: BPF prog-id=54 op=LOAD Jul 2 07:46:33.903000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:46:33.903000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.903000 audit: BPF prog-id=55 op=LOAD Jul 2 07:46:33.903000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit: BPF prog-id=56 op=LOAD Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.904000 audit: BPF prog-id=57 op=LOAD Jul 2 07:46:33.904000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:46:33.904000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit: BPF prog-id=58 op=LOAD Jul 2 07:46:33.906000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit: BPF prog-id=59 op=LOAD Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:33.906000 audit: BPF prog-id=60 op=LOAD Jul 2 07:46:33.906000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:46:33.906000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:46:33.914131 systemd[1]: Starting docker.socket... Jul 2 07:46:33.915120 systemd[1]: Starting containerd.service... Jul 2 07:46:33.915522 systemd[1]: Listening on docker.socket. Jul 2 07:46:33.918706 systemd[1]: Stopped target sockets.target. Jul 2 07:46:33.918721 systemd[1]: Stopping sockets.target... Jul 2 07:46:33.918788 systemd[1]: Reached target sockets.target. Jul 2 07:46:33.919514 systemd[1]: Started containerd.service. Jul 2 07:46:33.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.920899 systemd[1]: Stopped target timers.target. Jul 2 07:46:33.920915 systemd[1]: Stopping timers.target... Jul 2 07:46:33.921015 systemd[1]: Reached target timers.target. Jul 2 07:46:33.923568 systemd[1]: Stopped target multi-user.target. Jul 2 07:46:33.923589 systemd[1]: Stopping multi-user.target... Jul 2 07:46:33.923610 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:46:33.924915 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:46:33.926104 systemd[1]: Starting extend-filesystems.service... Jul 2 07:46:33.928000 audit[1394]: USER_ACCT pid=1394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.932000 audit[1394]: CRED_ACQ pid=1394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.932000 audit[1394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff766a60e0 a2=3 a3=0 items=0 ppid=1 pid=1394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:33.932000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:33.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.927269 systemd[1]: Starting issuegen.service... Jul 2 07:46:33.934316 jq[1456]: false Jul 2 07:46:33.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.935473 sshd[1394]: Accepted publickey for core from 10.0.0.1 port 44732 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:33.933260 sshd[1394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:33.928430 systemd[1]: Starting motdgen.service... Jul 2 07:46:33.929576 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:46:33.929625 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:46:33.931158 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:46:33.931317 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:46:33.932879 systemd[1]: Finished ensure-sysext.service. Jul 2 07:46:33.933631 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:46:33.933847 systemd[1]: Finished issuegen.service. Jul 2 07:46:33.934291 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:46:33.934434 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:46:33.940271 extend-filesystems[1457]: Found loop2 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found loop3 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found sr0 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda1 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda2 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda3 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found usr Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda4 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda6 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda7 Jul 2 07:46:33.941577 extend-filesystems[1457]: Found vda9 Jul 2 07:46:33.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.941490 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:46:33.951332 extend-filesystems[1457]: Checking size of /dev/vda9 Jul 2 07:46:33.941653 systemd[1]: Finished motdgen.service. Jul 2 07:46:33.948147 systemd-logind[1169]: New session 11 of user core. Jul 2 07:46:33.951136 systemd[1]: Started session-11.scope. Jul 2 07:46:33.953251 extend-filesystems[1457]: Old size kept for /dev/vda9 Jul 2 07:46:33.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.955280 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:46:33.955404 systemd[1]: Finished extend-filesystems.service. Jul 2 07:46:33.955638 systemd[1]: Reached target multi-user.target. Jul 2 07:46:33.956788 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:46:33.970028 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:46:33.970177 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:46:33.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:33.986000 audit[1394]: USER_START pid=1394 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.987000 audit[1487]: CRED_ACQ pid=1487 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:33.993471 containerd[1455]: time="2024-07-02T07:46:33.993411136Z" level=info msg="starting containerd" revision=1c90a442489720eec95342e1789ee8a5e1b9536f version=v1.6.9 Jul 2 07:46:34.008415 containerd[1455]: time="2024-07-02T07:46:34.008377834Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:46:34.008497 containerd[1455]: time="2024-07-02T07:46:34.008473313Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:34.009940 containerd[1455]: time="2024-07-02T07:46:34.009906581Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:46:34.009940 containerd[1455]: time="2024-07-02T07:46:34.009931918Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:34.010158 containerd[1455]: time="2024-07-02T07:46:34.010131262Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:46:34.010158 containerd[1455]: time="2024-07-02T07:46:34.010150017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:34.010229 containerd[1455]: time="2024-07-02T07:46:34.010161459Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:46:34.010229 containerd[1455]: time="2024-07-02T07:46:34.010170746Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:34.010271 containerd[1455]: time="2024-07-02T07:46:34.010246188Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:34.010893 containerd[1455]: time="2024-07-02T07:46:34.010868414Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:34.011029 containerd[1455]: time="2024-07-02T07:46:34.010997837Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:46:34.011029 containerd[1455]: time="2024-07-02T07:46:34.011024407Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:46:34.011099 containerd[1455]: time="2024-07-02T07:46:34.011083818Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:46:34.011099 containerd[1455]: time="2024-07-02T07:46:34.011097925Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:46:34.016534 containerd[1455]: time="2024-07-02T07:46:34.016505777Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:46:34.016534 containerd[1455]: time="2024-07-02T07:46:34.016531946Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:46:34.016603 containerd[1455]: time="2024-07-02T07:46:34.016544319Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:46:34.016603 containerd[1455]: time="2024-07-02T07:46:34.016577040Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.016603 containerd[1455]: time="2024-07-02T07:46:34.016593992Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.016659 containerd[1455]: time="2024-07-02T07:46:34.016606746Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.016659 containerd[1455]: time="2024-07-02T07:46:34.016619500Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.016978 containerd[1455]: time="2024-07-02T07:46:34.016953376Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.016978 containerd[1455]: time="2024-07-02T07:46:34.016973444Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.017023 containerd[1455]: time="2024-07-02T07:46:34.016985717Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.017023 containerd[1455]: time="2024-07-02T07:46:34.016997248Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.017023 containerd[1455]: time="2024-07-02T07:46:34.017008239Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:46:34.017118 containerd[1455]: time="2024-07-02T07:46:34.017096064Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:46:34.017180 containerd[1455]: time="2024-07-02T07:46:34.017159793Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:46:34.017527 containerd[1455]: time="2024-07-02T07:46:34.017505391Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:46:34.017551 containerd[1455]: time="2024-07-02T07:46:34.017531200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017551 containerd[1455]: time="2024-07-02T07:46:34.017542892Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:46:34.017597 containerd[1455]: time="2024-07-02T07:46:34.017585171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017618 containerd[1455]: time="2024-07-02T07:46:34.017599979Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017618 containerd[1455]: time="2024-07-02T07:46:34.017610859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017659 containerd[1455]: time="2024-07-02T07:46:34.017620517Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017659 containerd[1455]: time="2024-07-02T07:46:34.017631508Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017659 containerd[1455]: time="2024-07-02T07:46:34.017642037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017659 containerd[1455]: time="2024-07-02T07:46:34.017652778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017735 containerd[1455]: time="2024-07-02T07:46:34.017662987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017735 containerd[1455]: time="2024-07-02T07:46:34.017676472Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:46:34.017827 containerd[1455]: time="2024-07-02T07:46:34.017802168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017852 containerd[1455]: time="2024-07-02T07:46:34.017825782Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017852 containerd[1455]: time="2024-07-02T07:46:34.017837224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.017852 containerd[1455]: time="2024-07-02T07:46:34.017848435Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:46:34.017907 containerd[1455]: time="2024-07-02T07:46:34.017861559Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:46:34.017907 containerd[1455]: time="2024-07-02T07:46:34.017871929Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:46:34.017907 containerd[1455]: time="2024-07-02T07:46:34.017894641Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:46:34.017968 containerd[1455]: time="2024-07-02T07:46:34.017926240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:46:34.018158 containerd[1455]: time="2024-07-02T07:46:34.018111828Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:46:34.018684 containerd[1455]: time="2024-07-02T07:46:34.018161702Z" level=info msg="Connect containerd service" Jul 2 07:46:34.018684 containerd[1455]: time="2024-07-02T07:46:34.018194003Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:46:34.018825 containerd[1455]: time="2024-07-02T07:46:34.018801251Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:46:34.019326 containerd[1455]: time="2024-07-02T07:46:34.019307250Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:46:34.019358 containerd[1455]: time="2024-07-02T07:46:34.019349099Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:46:34.019396 containerd[1455]: time="2024-07-02T07:46:34.019363275Z" level=info msg="containerd successfully booted in 0.027787s" Jul 2 07:46:34.019455 containerd[1455]: time="2024-07-02T07:46:34.019401958Z" level=info msg="Start subscribing containerd event" Jul 2 07:46:34.019482 containerd[1455]: time="2024-07-02T07:46:34.019473392Z" level=info msg="Start recovering state" Jul 2 07:46:34.019631 containerd[1455]: time="2024-07-02T07:46:34.019607313Z" level=info msg="Start event monitor" Jul 2 07:46:34.019657 containerd[1455]: time="2024-07-02T07:46:34.019629915Z" level=info msg="Start snapshots syncer" Jul 2 07:46:34.019657 containerd[1455]: time="2024-07-02T07:46:34.019640776Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:46:34.019657 containerd[1455]: time="2024-07-02T07:46:34.019647839Z" level=info msg="Start streaming server" Jul 2 07:46:34.065241 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:46:34.070629 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:46:34.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:34.070863 systemd[1]: Reached target network-online.target. Jul 2 07:46:34.071822 systemd[1]: Starting docker.service... Jul 2 07:46:34.131709 dockerd[1502]: time="2024-07-02T07:46:34.131600120Z" level=info msg="Starting up" Jul 2 07:46:34.135471 dockerd[1502]: time="2024-07-02T07:46:34.135444589Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:46:34.135573 dockerd[1502]: time="2024-07-02T07:46:34.135555187Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:46:34.135833 dockerd[1502]: time="2024-07-02T07:46:34.135760432Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:46:34.135833 dockerd[1502]: time="2024-07-02T07:46:34.135783054Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:46:34.141543 dockerd[1502]: time="2024-07-02T07:46:34.141526134Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:46:34.141625 dockerd[1502]: time="2024-07-02T07:46:34.141606966Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:46:34.141699 dockerd[1502]: time="2024-07-02T07:46:34.141678550Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:46:34.141766 dockerd[1502]: time="2024-07-02T07:46:34.141748051Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:46:34.170944 dockerd[1502]: time="2024-07-02T07:46:34.170908677Z" level=info msg="Loading containers: start." Jul 2 07:46:34.219000 audit[1535]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.219000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffee0625c80 a2=0 a3=7ffee0625c6c items=0 ppid=1502 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.219000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:46:34.220000 audit[1537]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.220000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdb5090e60 a2=0 a3=7ffdb5090e4c items=0 ppid=1502 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:46:34.222000 audit[1539]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.222000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffff4703190 a2=0 a3=7ffff470317c items=0 ppid=1502 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:34.224000 audit[1541]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.224000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe19750f80 a2=0 a3=7ffe19750f6c items=0 ppid=1502 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.224000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:34.225000 audit[1543]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.225000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff22fded90 a2=0 a3=7fff22fded7c items=0 ppid=1502 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:46:34.244000 audit[1548]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.244000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc2ac06f0 a2=0 a3=7ffdc2ac06dc items=0 ppid=1502 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:46:34.261000 audit[1550]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.261000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff08d131c0 a2=0 a3=7fff08d131ac items=0 ppid=1502 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.261000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:46:34.263000 audit[1552]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.263000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcbaa3a160 a2=0 a3=7ffcbaa3a14c items=0 ppid=1502 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:46:34.264000 audit[1554]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.264000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdf315b120 a2=0 a3=7ffdf315b10c items=0 ppid=1502 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:34.271000 audit[1558]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.271000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff495e0200 a2=0 a3=7fff495e01ec items=0 ppid=1502 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.271000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:34.272000 audit[1559]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.272000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffef4332540 a2=0 a3=7ffef433252c items=0 ppid=1502 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:34.280079 kernel: Initializing XFRM netlink socket Jul 2 07:46:34.304959 dockerd[1502]: time="2024-07-02T07:46:34.304921058Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:46:34.319000 audit[1566]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.319000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeee6a71d0 a2=0 a3=7ffeee6a71bc items=0 ppid=1502 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:46:34.333000 audit[1569]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.333000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcf8312c20 a2=0 a3=7ffcf8312c0c items=0 ppid=1502 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:46:34.335000 audit[1572]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.335000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd517463f0 a2=0 a3=7ffd517463dc items=0 ppid=1502 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:46:34.336000 audit[1574]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.336000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd3fb46d90 a2=0 a3=7ffd3fb46d7c items=0 ppid=1502 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:46:34.338000 audit[1576]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.338000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd5d6e5230 a2=0 a3=7ffd5d6e521c items=0 ppid=1502 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:46:34.339000 audit[1578]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.339000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd947242f0 a2=0 a3=7ffd947242dc items=0 ppid=1502 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:46:34.341000 audit[1580]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.341000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffd6c5c110 a2=0 a3=7fffd6c5c0fc items=0 ppid=1502 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:46:34.346000 audit[1583]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.346000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd9fcdb600 a2=0 a3=7ffd9fcdb5ec items=0 ppid=1502 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:46:34.348000 audit[1585]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.348000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcc0ced300 a2=0 a3=7ffcc0ced2ec items=0 ppid=1502 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:34.350000 audit[1587]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.350000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd86d1e420 a2=0 a3=7ffd86d1e40c items=0 ppid=1502 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:34.351000 audit[1589]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.351000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd044e9330 a2=0 a3=7ffd044e931c items=0 ppid=1502 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.351000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:46:34.352005 systemd-networkd[1015]: docker0: Link UP Jul 2 07:46:34.360000 audit[1593]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.360000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8147cfe0 a2=0 a3=7ffd8147cfcc items=0 ppid=1502 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:34.361000 audit[1594]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:34.361000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffed2d2b010 a2=0 a3=7ffed2d2affc items=0 ppid=1502 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:34.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:34.361413 dockerd[1502]: time="2024-07-02T07:46:34.361382133Z" level=info msg="Loading containers: done." Jul 2 07:46:34.381425 dockerd[1502]: time="2024-07-02T07:46:34.381386709Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:46:34.381551 dockerd[1502]: time="2024-07-02T07:46:34.381536520Z" level=info msg="Docker daemon" commit=3056208 graphdriver(s)=overlay2 version=20.10.21 Jul 2 07:46:34.381620 dockerd[1502]: time="2024-07-02T07:46:34.381603014Z" level=info msg="Daemon has completed initialization" Jul 2 07:46:34.398382 systemd[1]: Started docker.service. Jul 2 07:46:34.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:34.404905 dockerd[1502]: time="2024-07-02T07:46:34.404851243Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:46:34.624620 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck707972166-merged.mount: Deactivated successfully. Jul 2 07:46:35.510234 systemd[1]: var-lib-docker-overlay2-f7ee59aebf9d2e90da5bdc7fe86901237ad44c001c33eac2bc6cf76d1d01ff93\x2dinit-merged.mount: Deactivated successfully. Jul 2 07:46:36.034267 kernel: docker0: port 1(vethb101261) entered blocking state Jul 2 07:46:36.034414 kernel: docker0: port 1(vethb101261) entered disabled state Jul 2 07:46:36.034445 kernel: device vethb101261 entered promiscuous mode Jul 2 07:46:36.032000 audit: ANOM_PROMISCUOUS dev=vethb101261 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:46:36.032000 audit[1502]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=f a1=c00045fc80 a2=28 a3=0 items=0 ppid=1 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.032000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:46:36.035548 systemd-networkd[1015]: vethb101261: Link UP Jul 2 07:46:36.199176 containerd[1455]: time="2024-07-02T07:46:36.199097475Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:46:36.199176 containerd[1455]: time="2024-07-02T07:46:36.199140967Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:46:36.199176 containerd[1455]: time="2024-07-02T07:46:36.199160273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:46:36.199565 containerd[1455]: time="2024-07-02T07:46:36.199504508Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/e1a240aafdc31fd7800deeb527a28c6e5e4a21e54d4f18f5d107eef4c819086d pid=1634 runtime=io.containerd.runc.v2 Jul 2 07:46:36.211548 systemd[1]: Started docker-e1a240aafdc31fd7800deeb527a28c6e5e4a21e54d4f18f5d107eef4c819086d.scope. Jul 2 07:46:36.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit: BPF prog-id=61 op=LOAD Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1634 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316132343061616664633331666437383030646565623532 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1634 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316132343061616664633331666437383030646565623532 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit: BPF prog-id=62 op=LOAD Jul 2 07:46:36.223000 audit[1644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002969d0 items=0 ppid=1634 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316132343061616664633331666437383030646565623532 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit: BPF prog-id=63 op=LOAD Jul 2 07:46:36.223000 audit[1644]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000296a18 items=0 ppid=1634 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316132343061616664633331666437383030646565623532 Jul 2 07:46:36.223000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:46:36.223000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { perfmon } for pid=1644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit[1644]: AVC avc: denied { bpf } for pid=1644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:36.223000 audit: BPF prog-id=64 op=LOAD Jul 2 07:46:36.223000 audit[1644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000296e78 items=0 ppid=1634 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65316132343061616664633331666437383030646565623532 Jul 2 07:46:36.294082 kernel: eth0: renamed from veth901d3e4 Jul 2 07:46:36.300158 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethb101261: link becomes ready Jul 2 07:46:36.300267 kernel: docker0: port 1(vethb101261) entered blocking state Jul 2 07:46:36.300286 kernel: docker0: port 1(vethb101261) entered forwarding state Jul 2 07:46:36.301108 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready Jul 2 07:46:36.301189 systemd-networkd[1015]: vethb101261: Gained carrier Jul 2 07:46:36.302436 systemd-networkd[1015]: docker0: Gained carrier Jul 2 07:46:36.303634 systemd-resolved[1138]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 07:46:36.324067 systemd[1]: docker-e1a240aafdc31fd7800deeb527a28c6e5e4a21e54d4f18f5d107eef4c819086d.scope: Deactivated successfully. Jul 2 07:46:36.324000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:46:36.338487 containerd[1455]: time="2024-07-02T07:46:36.338427228Z" level=info msg="shim disconnected" id=e1a240aafdc31fd7800deeb527a28c6e5e4a21e54d4f18f5d107eef4c819086d Jul 2 07:46:36.338568 containerd[1455]: time="2024-07-02T07:46:36.338501557Z" level=warning msg="cleaning up after shim disconnected" id=e1a240aafdc31fd7800deeb527a28c6e5e4a21e54d4f18f5d107eef4c819086d namespace=moby Jul 2 07:46:36.338568 containerd[1455]: time="2024-07-02T07:46:36.338527366Z" level=info msg="cleaning up dead shim" Jul 2 07:46:36.338694 dockerd[1502]: time="2024-07-02T07:46:36.338655316Z" level=info msg="ignoring event" container=e1a240aafdc31fd7800deeb527a28c6e5e4a21e54d4f18f5d107eef4c819086d module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:46:36.343891 containerd[1455]: time="2024-07-02T07:46:36.343853104Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:46:36Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1689 runtime=io.containerd.runc.v2\n" Jul 2 07:46:36.348409 systemd-networkd[1015]: vethb101261: Lost carrier Jul 2 07:46:36.349080 kernel: docker0: port 1(vethb101261) entered disabled state Jul 2 07:46:36.349120 kernel: veth901d3e4: renamed from eth0 Jul 2 07:46:36.364086 systemd-networkd[1015]: vethb101261: Link DOWN Jul 2 07:46:36.366154 kernel: docker0: port 1(vethb101261) entered disabled state Jul 2 07:46:36.366203 kernel: device vethb101261 left promiscuous mode Jul 2 07:46:36.366225 kernel: docker0: port 1(vethb101261) entered disabled state Jul 2 07:46:36.363000 audit: ANOM_PROMISCUOUS dev=vethb101261 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:46:36.363000 audit[1502]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=f a1=c000d42900 a2=20 a3=0 items=0 ppid=1 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.363000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:46:36.411245 sshd[1394]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:36.412000 audit[1394]: USER_END pid=1394 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.412000 audit[1394]: CRED_DISP pid=1394 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.415434 systemd[1]: sshd@10-10.0.0.75:22-10.0.0.1:44732.service: Deactivated successfully. Jul 2 07:46:36.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.75:22-10.0.0.1:44732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:36.416009 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:46:36.416595 systemd-logind[1169]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:46:36.417703 systemd[1]: Started sshd@11-10.0.0.75:22-10.0.0.1:44738.service. Jul 2 07:46:36.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.75:22-10.0.0.1:44738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:36.418767 systemd-logind[1169]: Removed session 11. Jul 2 07:46:36.419000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:46:36.448000 audit[1704]: USER_ACCT pid=1704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.448539 sshd[1704]: Accepted publickey for core from 10.0.0.1 port 44738 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:36.449000 audit[1704]: CRED_ACQ pid=1704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.449000 audit[1704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9cb9d3e0 a2=3 a3=0 items=0 ppid=1 pid=1704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.449000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:36.449476 sshd[1704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:36.452801 systemd-logind[1169]: New session 12 of user core. Jul 2 07:46:36.453507 systemd[1]: Started session-12.scope. Jul 2 07:46:36.456000 audit[1704]: USER_START pid=1704 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.457000 audit[1706]: CRED_ACQ pid=1706 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.522636 sshd[1704]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:36.523000 audit[1704]: USER_END pid=1704 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.523000 audit[1704]: CRED_DISP pid=1704 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.525411 systemd[1]: sshd@11-10.0.0.75:22-10.0.0.1:44738.service: Deactivated successfully. Jul 2 07:46:36.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.75:22-10.0.0.1:44738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:36.525955 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:46:36.526441 systemd-logind[1169]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:46:36.527411 systemd[1]: Started sshd@12-10.0.0.75:22-10.0.0.1:44748.service. Jul 2 07:46:36.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.75:22-10.0.0.1:44748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:36.528009 systemd-logind[1169]: Removed session 12. Jul 2 07:46:36.557000 audit[1713]: USER_ACCT pid=1713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.557977 sshd[1713]: Accepted publickey for core from 10.0.0.1 port 44748 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:36.558000 audit[1713]: CRED_ACQ pid=1713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.558000 audit[1713]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60592c70 a2=3 a3=0 items=0 ppid=1 pid=1713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:36.558000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:36.558911 sshd[1713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:36.561839 systemd-logind[1169]: New session 13 of user core. Jul 2 07:46:36.562568 systemd[1]: Started session-13.scope. Jul 2 07:46:36.565000 audit[1713]: USER_START pid=1713 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.566000 audit[1715]: CRED_ACQ pid=1715 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:36.756966 systemd[1]: run-docker-netns-befae8518bf4.mount: Deactivated successfully. Jul 2 07:46:36.757086 systemd[1]: var-lib-docker-overlay2-f7ee59aebf9d2e90da5bdc7fe86901237ad44c001c33eac2bc6cf76d1d01ff93-merged.mount: Deactivated successfully. Jul 2 07:46:37.096317 systemd-networkd[1015]: docker0: Lost carrier Jul 2 07:46:37.607213 systemd-networkd[1015]: docker0: Gained IPv6LL Jul 2 07:46:44.666000 audit[1716]: USER_ACCT pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.666740 sudo[1716]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 2 07:46:44.666941 sudo[1716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:44.667683 kernel: kauditd_printk_skb: 372 callbacks suppressed Jul 2 07:46:44.667792 kernel: audit: type=1101 audit(1719906404.666:529): pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.670371 sudo[1716]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:44.671880 sshd[1713]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:44.666000 audit[1716]: CRED_REFR pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.676930 kernel: audit: type=1110 audit(1719906404.666:530): pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.677050 kernel: audit: type=1105 audit(1719906404.668:531): pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.668000 audit[1716]: USER_START pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.675986 systemd[1]: Started sshd@13-10.0.0.75:22-10.0.0.1:39056.service. Jul 2 07:46:44.677156 systemd[1]: sshd@12-10.0.0.75:22-10.0.0.1:44748.service: Deactivated successfully. Jul 2 07:46:44.677820 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:46:44.678183 systemd[1]: session-13.scope: Consumed 3.884s CPU time. Jul 2 07:46:44.678785 systemd-logind[1169]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:46:44.679615 systemd-logind[1169]: Removed session 13. Jul 2 07:46:44.670000 audit[1716]: USER_END pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.684316 kernel: audit: type=1106 audit(1719906404.670:532): pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.684466 kernel: audit: type=1104 audit(1719906404.670:533): pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.670000 audit[1716]: CRED_DISP pid=1716 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.688069 kernel: audit: type=1106 audit(1719906404.673:534): pid=1713 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.673000 audit[1713]: USER_END pid=1713 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.692996 kernel: audit: type=1104 audit(1719906404.673:535): pid=1713 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.673000 audit[1713]: CRED_DISP pid=1713 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.696956 kernel: audit: type=1130 audit(1719906404.676:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.75:22-10.0.0.1:39056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.75:22-10.0.0.1:39056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.700355 kernel: audit: type=1131 audit(1719906404.677:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.75:22-10.0.0.1:44748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.75:22-10.0.0.1:44748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.712000 audit[1772]: USER_ACCT pid=1772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.712686 sshd[1772]: Accepted publickey for core from 10.0.0.1 port 39056 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:44.716000 audit[1772]: CRED_ACQ pid=1772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.716000 audit[1772]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe11dbc8f0 a2=3 a3=0 items=0 ppid=1 pid=1772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:44.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:44.716772 sshd[1772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:44.717109 kernel: audit: type=1101 audit(1719906404.712:538): pid=1772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.720291 systemd-logind[1169]: New session 14 of user core. Jul 2 07:46:44.721013 systemd[1]: Started session-14.scope. Jul 2 07:46:44.724000 audit[1772]: USER_START pid=1772 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.725000 audit[1775]: CRED_ACQ pid=1775 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:44.772000 audit[1777]: USER_ACCT pid=1777 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.772332 sudo[1777]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 2 07:46:44.772000 audit[1777]: CRED_REFR pid=1777 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.772518 sudo[1777]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:44.773000 audit[1777]: USER_START pid=1777 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.779101 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 2 07:46:44.779245 systemd[1]: Stopped ensure-sysext.service. Jul 2 07:46:44.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.779297 systemd[1]: Stopping ensure-sysext.service... Jul 2 07:46:44.780340 systemd[1]: Stopping systemd-sysext.service... Jul 2 07:46:44.783285 systemd-sysext[1779]: Unmerged '/usr'. Jul 2 07:46:44.787196 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:46:44.795742 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:46:44.800183 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:46:44.801081 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 2 07:46:44.801232 systemd[1]: Stopped systemd-sysext.service. Jul 2 07:46:44.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.801448 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:44.801573 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:44.802771 systemd[1]: Starting systemd-sysext.service... Jul 2 07:46:44.808274 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:46:44.810841 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:46:44.810989 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:46:44.818079 kernel: loop4: detected capacity change from 0 to 301320 Jul 2 07:46:44.822076 kernel: EXT4-fs (loop4): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:44.835120 kernel: loop5: detected capacity change from 0 to 322896 Jul 2 07:46:44.839065 kernel: EXT4-fs (loop5): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:44.852066 kernel: loop6: detected capacity change from 0 to 301320 Jul 2 07:46:44.856074 kernel: EXT4-fs (loop6): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:44.858074 kernel: loop7: detected capacity change from 0 to 322896 Jul 2 07:46:44.861495 (sd-sysext)[1791]: Using extensions 'containerd', 'docker'. Jul 2 07:46:44.861839 (sd-sysext)[1791]: Merged extensions into '/usr'. Jul 2 07:46:44.862074 kernel: EXT4-fs (loop7): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:46:44.878912 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:46:44.883807 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:46:44.884866 systemd[1]: Finished systemd-sysext.service. Jul 2 07:46:44.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.885660 sudo[1777]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:44.885000 audit[1777]: USER_END pid=1777 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.885000 audit[1777]: CRED_DISP pid=1777 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.886276 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:44.886358 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:46:44.890000 audit[1776]: USER_ACCT pid=1776 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.890000 audit[1776]: CRED_REFR pid=1776 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:44.887375 systemd[1]: Starting ensure-sysext.service... Jul 2 07:46:44.890368 sudo[1776]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart docker containerd Jul 2 07:46:44.890577 sudo[1776]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:46:44.892396 systemd[1]: Reloading. Jul 2 07:46:44.893000 audit[1776]: USER_START pid=1776 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.012578 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:46:45.012597 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:46:45.027915 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit: BPF prog-id=65 op=LOAD Jul 2 07:46:45.084000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit: BPF prog-id=66 op=LOAD Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit: BPF prog-id=67 op=LOAD Jul 2 07:46:45.084000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:46:45.084000 audit: BPF prog-id=48 op=UNLOAD Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.085000 audit: BPF prog-id=68 op=LOAD Jul 2 07:46:45.085000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit: BPF prog-id=69 op=LOAD Jul 2 07:46:45.087000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.087000 audit: BPF prog-id=70 op=LOAD Jul 2 07:46:45.087000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit: BPF prog-id=71 op=LOAD Jul 2 07:46:45.088000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit: BPF prog-id=72 op=LOAD Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.088000 audit: BPF prog-id=73 op=LOAD Jul 2 07:46:45.088000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:46:45.088000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.089000 audit: BPF prog-id=74 op=LOAD Jul 2 07:46:45.089000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit: BPF prog-id=75 op=LOAD Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.090000 audit: BPF prog-id=76 op=LOAD Jul 2 07:46:45.090000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:46:45.090000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit: BPF prog-id=77 op=LOAD Jul 2 07:46:45.092000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit: BPF prog-id=78 op=LOAD Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.092000 audit: BPF prog-id=79 op=LOAD Jul 2 07:46:45.092000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:46:45.092000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:46:45.101477 dockerd[1502]: time="2024-07-02T07:46:45.101435747Z" level=info msg="Processing signal 'terminated'" Jul 2 07:46:45.101624 systemd[1]: Stopping docker.service... Jul 2 07:46:45.102327 dockerd[1502]: time="2024-07-02T07:46:45.102147452Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Jul 2 07:46:45.102327 dockerd[1502]: time="2024-07-02T07:46:45.102160466Z" level=info msg="Daemon shutdown complete" Jul 2 07:46:45.102327 dockerd[1502]: time="2024-07-02T07:46:45.102191695Z" level=info msg="stopping event stream following graceful shutdown" error="context canceled" module=libcontainerd namespace=plugins.moby Jul 2 07:46:45.103586 systemd[1]: docker.service: Deactivated successfully. Jul 2 07:46:45.103760 systemd[1]: Stopped docker.service. Jul 2 07:46:45.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.104190 systemd[1]: docker.socket: Deactivated successfully. Jul 2 07:46:45.104439 systemd[1]: Closed docker.socket. Jul 2 07:46:45.104465 systemd[1]: Stopping docker.socket... Jul 2 07:46:45.105851 systemd[1]: Starting docker.socket... Jul 2 07:46:45.106728 systemd[1]: Listening on docker.socket. Jul 2 07:46:45.107699 systemd[1]: Stopped target sockets.target. Jul 2 07:46:45.107714 systemd[1]: Stopping sockets.target... Jul 2 07:46:45.107817 systemd[1]: Reached target sockets.target. Jul 2 07:46:45.108141 containerd[1455]: time="2024-07-02T07:46:45.108116255Z" level=info msg="Stop CRI service" Jul 2 07:46:45.108169 systemd[1]: Stopping containerd.service... Jul 2 07:46:45.109144 systemd[1]: Stopped target timers.target. Jul 2 07:46:45.109158 systemd[1]: Stopping timers.target... Jul 2 07:46:45.109261 systemd[1]: Reached target timers.target. Jul 2 07:46:45.111703 systemd[1]: Stopped target multi-user.target. Jul 2 07:46:45.111719 systemd[1]: Stopping multi-user.target... Jul 2 07:46:45.111737 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:46:45.112276 containerd[1455]: time="2024-07-02T07:46:45.112137266Z" level=info msg="Stop CRI service" Jul 2 07:46:45.112276 containerd[1455]: time="2024-07-02T07:46:45.112177401Z" level=info msg="Event monitor stopped" Jul 2 07:46:45.113108 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:46:45.114262 systemd[1]: Starting extend-filesystems.service... Jul 2 07:46:45.117101 jq[1855]: false Jul 2 07:46:45.115379 systemd[1]: Starting issuegen.service... Jul 2 07:46:45.116548 systemd[1]: Starting motdgen.service... Jul 2 07:46:45.117666 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:46:45.117705 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:46:45.119302 systemd[1]: containerd.service: Deactivated successfully. Jul 2 07:46:45.119476 systemd[1]: Stopped containerd.service. Jul 2 07:46:45.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.119867 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:46:45.120002 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:46:45.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.121883 systemd[1]: Starting containerd.service... Jul 2 07:46:45.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.123981 systemd[1]: Finished ensure-sysext.service. Jul 2 07:46:45.124405 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:46:45.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.124964 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:46:45.125469 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:46:45.125708 systemd[1]: Finished issuegen.service. Jul 2 07:46:45.128111 extend-filesystems[1856]: Found loop2 Jul 2 07:46:45.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.128627 systemd[1]: Started containerd.service. Jul 2 07:46:45.129297 extend-filesystems[1856]: Found loop3 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found loop6 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found loop7 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found sr0 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda1 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda2 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda3 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found usr Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda4 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda6 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda7 Jul 2 07:46:45.129297 extend-filesystems[1856]: Found vda9 Jul 2 07:46:45.129297 extend-filesystems[1856]: Checking size of /dev/vda9 Jul 2 07:46:45.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.144686 extend-filesystems[1856]: Old size kept for /dev/vda9 Jul 2 07:46:45.130295 systemd[1]: Starting docker.service... Jul 2 07:46:45.130733 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:46:45.130869 systemd[1]: Finished motdgen.service. Jul 2 07:46:45.134952 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:46:45.135110 systemd[1]: Finished extend-filesystems.service. Jul 2 07:46:45.135514 systemd[1]: Reached target multi-user.target. Jul 2 07:46:45.136936 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:46:45.173734 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:46:45.173886 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:46:45.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.194928 containerd[1872]: time="2024-07-02T07:46:45.194847918Z" level=info msg="starting containerd" revision=5b842e528e99d4d4c1686467debf2bd4b88ecd86 version=v1.6.15 Jul 2 07:46:45.213413 containerd[1872]: time="2024-07-02T07:46:45.213364844Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:46:45.213413 containerd[1872]: time="2024-07-02T07:46:45.213415118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:45.215522 containerd[1872]: time="2024-07-02T07:46:45.215467918Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:46:45.215646 containerd[1872]: time="2024-07-02T07:46:45.215620995Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:45.215992 containerd[1872]: time="2024-07-02T07:46:45.215962035Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:46:45.216108 containerd[1872]: time="2024-07-02T07:46:45.216083853Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:45.216216 containerd[1872]: time="2024-07-02T07:46:45.216190173Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:46:45.216307 containerd[1872]: time="2024-07-02T07:46:45.216282385Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:45.216418 containerd[1872]: time="2024-07-02T07:46:45.216396109Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:45.217104 containerd[1872]: time="2024-07-02T07:46:45.217082696Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:46:45.217362 containerd[1872]: time="2024-07-02T07:46:45.217334458Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:46:45.217456 containerd[1872]: time="2024-07-02T07:46:45.217431571Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:46:45.217554 containerd[1872]: time="2024-07-02T07:46:45.217530787Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:46:45.217639 containerd[1872]: time="2024-07-02T07:46:45.217616888Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:46:45.217960 containerd[1872]: time="2024-07-02T07:46:45.217938772Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:46:45.218086 containerd[1872]: time="2024-07-02T07:46:45.218038228Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:46:45.218188 containerd[1872]: time="2024-07-02T07:46:45.218163263Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:46:45.218415 containerd[1872]: time="2024-07-02T07:46:45.218391441Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.218514 containerd[1872]: time="2024-07-02T07:46:45.218489705Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.218612 containerd[1872]: time="2024-07-02T07:46:45.218588711Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.218749 containerd[1872]: time="2024-07-02T07:46:45.218725928Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.219270 containerd[1872]: time="2024-07-02T07:46:45.219245673Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.219368 containerd[1872]: time="2024-07-02T07:46:45.219345760Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.219464 containerd[1872]: time="2024-07-02T07:46:45.219441330Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.219559 containerd[1872]: time="2024-07-02T07:46:45.219536067Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.219651 containerd[1872]: time="2024-07-02T07:46:45.219627739Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:46:45.219785 containerd[1872]: time="2024-07-02T07:46:45.219763774Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:46:45.219965 containerd[1872]: time="2024-07-02T07:46:45.219943371Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:46:45.220764 containerd[1872]: time="2024-07-02T07:46:45.220725959Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:46:45.220908 containerd[1872]: time="2024-07-02T07:46:45.220847457Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.221098 containerd[1872]: time="2024-07-02T07:46:45.221041470Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:46:45.221282 containerd[1872]: time="2024-07-02T07:46:45.221260030Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.221455 containerd[1872]: time="2024-07-02T07:46:45.221382019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.221608 containerd[1872]: time="2024-07-02T07:46:45.221586953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.221758 containerd[1872]: time="2024-07-02T07:46:45.221707459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.221910 containerd[1872]: time="2024-07-02T07:46:45.221880424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.222086 containerd[1872]: time="2024-07-02T07:46:45.222061634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.222189 containerd[1872]: time="2024-07-02T07:46:45.222166891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.222241 dockerd[1875]: time="2024-07-02T07:46:45.222212406Z" level=info msg="Starting up" Jul 2 07:46:45.222610 containerd[1872]: time="2024-07-02T07:46:45.222587269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.222734 containerd[1872]: time="2024-07-02T07:46:45.222688108Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:46:45.222993 containerd[1872]: time="2024-07-02T07:46:45.222939520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.223130 containerd[1872]: time="2024-07-02T07:46:45.223107295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.223226 containerd[1872]: time="2024-07-02T07:46:45.223203505Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.223351 containerd[1872]: time="2024-07-02T07:46:45.223327668Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:46:45.223485 containerd[1872]: time="2024-07-02T07:46:45.223459806Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:46:45.223582 containerd[1872]: time="2024-07-02T07:46:45.223558701Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:46:45.223699 containerd[1872]: time="2024-07-02T07:46:45.223673216Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:46:45.223820 containerd[1872]: time="2024-07-02T07:46:45.223798250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:46:45.223980 dockerd[1875]: time="2024-07-02T07:46:45.223953071Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:46:45.223980 dockerd[1875]: time="2024-07-02T07:46:45.223977717Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:46:45.224188 dockerd[1875]: time="2024-07-02T07:46:45.224000169Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:46:45.224188 dockerd[1875]: time="2024-07-02T07:46:45.224013815Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:46:45.224780 containerd[1872]: time="2024-07-02T07:46:45.224701484Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:46:45.225076 containerd[1872]: time="2024-07-02T07:46:45.225033958Z" level=info msg="Connect containerd service" Jul 2 07:46:45.225211 containerd[1872]: time="2024-07-02T07:46:45.225192325Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:46:45.225726 containerd[1872]: time="2024-07-02T07:46:45.225705758Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:46:45.226262 containerd[1872]: time="2024-07-02T07:46:45.226245500Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:46:45.226376 containerd[1872]: time="2024-07-02T07:46:45.226360155Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:46:45.226458 containerd[1872]: time="2024-07-02T07:46:45.226440315Z" level=info msg="containerd successfully booted in 0.034673s" Jul 2 07:46:45.227131 containerd[1872]: time="2024-07-02T07:46:45.227094562Z" level=info msg="Start subscribing containerd event" Jul 2 07:46:45.227225 containerd[1872]: time="2024-07-02T07:46:45.227209257Z" level=info msg="Start recovering state" Jul 2 07:46:45.227422 containerd[1872]: time="2024-07-02T07:46:45.227407409Z" level=info msg="Start event monitor" Jul 2 07:46:45.227497 containerd[1872]: time="2024-07-02T07:46:45.227480476Z" level=info msg="Start snapshots syncer" Jul 2 07:46:45.227575 containerd[1872]: time="2024-07-02T07:46:45.227557039Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:46:45.227650 containerd[1872]: time="2024-07-02T07:46:45.227632992Z" level=info msg="Start streaming server" Jul 2 07:46:45.237938 dockerd[1875]: time="2024-07-02T07:46:45.237888154Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:46:45.237938 dockerd[1875]: time="2024-07-02T07:46:45.237927959Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:46:45.238010 dockerd[1875]: time="2024-07-02T07:46:45.237951853Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 07:46:45.238010 dockerd[1875]: time="2024-07-02T07:46:45.237963155Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:46:45.251432 dockerd[1875]: time="2024-07-02T07:46:45.251389544Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jul 2 07:46:45.261346 dockerd[1875]: time="2024-07-02T07:46:45.261301042Z" level=info msg="Loading containers: start." Jul 2 07:46:45.265000 audit[1905]: NETFILTER_CFG table=nat:26 family=2 entries=1 op=nft_unregister_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.265000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=268 a0=3 a1=7fff10c5cb00 a2=0 a3=7fff10c5caec items=0 ppid=1875 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.265000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:46:45.267000 audit[1906]: NETFILTER_CFG table=nat:27 family=2 entries=1 op=nft_unregister_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.267000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=360 a0=3 a1=7ffda04152b0 a2=0 a3=7ffda041529c items=0 ppid=1875 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D44004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C0000002D2D647374003132372E302E302E302F38002D6A00444F434B4552 Jul 2 07:46:45.285000 audit[1910]: NETFILTER_CFG table=nat:28 family=2 entries=1 op=nft_unregister_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.285000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7ffd014bb890 a2=0 a3=7ffd014bb87c items=0 ppid=1875 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.285000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4600444F434B4552 Jul 2 07:46:45.286000 audit[1911]: NETFILTER_CFG table=nat:29 family=2 entries=1 op=nft_unregister_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.286000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd42082c80 a2=0 a3=7ffd42082c6c items=0 ppid=1875 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D5800444F434B4552 Jul 2 07:46:45.308000 audit[1914]: NETFILTER_CFG table=filter:30 family=2 entries=2 op=nft_unregister_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.308000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe937aff10 a2=0 a3=7ffe937afefc items=0 ppid=1875 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:45.313000 audit[1916]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_unregister_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.313000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd7ce31ce0 a2=0 a3=7ffd7ce31ccc items=0 ppid=1875 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.313000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:45.314000 audit[1917]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_unregister_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.314000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=120 a0=3 a1=7ffced4b8620 a2=0 a3=7ffced4b860c items=0 ppid=1875 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D5800444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:45.328000 audit[1921]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.328000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7fffc8470310 a2=0 a3=7fffc84702fc items=0 ppid=1875 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:46:45.332000 audit[1925]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.332000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffea7d26cf0 a2=0 a3=7ffea7d26cdc items=0 ppid=1875 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:45.333000 audit[1927]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.333000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc1847e00 a2=0 a3=7fffc1847dec items=0 ppid=1875 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:46:45.335000 audit[1929]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.335000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdaba787a0 a2=0 a3=7ffdaba7878c items=0 ppid=1875 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:46:45.340000 audit[1934]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.340000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe1555b7d0 a2=0 a3=7ffe1555b7bc items=0 ppid=1875 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:46:45.344000 audit[1939]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.344000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=276 a0=3 a1=7ffc0112cc40 a2=0 a3=7ffc0112cc2c items=0 ppid=1875 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:46:45.346000 audit[1941]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.346000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=368 a0=3 a1=7ffe5f31ade0 a2=0 a3=7ffe5f31adcc items=0 ppid=1875 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:46:45.351000 audit[1947]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_unregister_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.351000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7ffefe891fd0 a2=0 a3=7ffefe891fbc items=0 ppid=1875 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.351000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:45.352000 audit[1948]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.352000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe9efdbdd0 a2=0 a3=7ffe9efdbdbc items=0 ppid=1875 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:45.353000 audit[1950]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.353000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcb4cceae0 a2=0 a3=7ffcb4cceacc items=0 ppid=1875 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:45.355000 audit[1952]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.355000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc21690c40 a2=0 a3=7ffc21690c2c items=0 ppid=1875 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.355000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:46:45.360000 audit[1954]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_unregister_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.360000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=404 a0=3 a1=7ffda785d990 a2=0 a3=7ffda785d97c items=0 ppid=1875 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:46:45.362000 audit[1956]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_unregister_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.362000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=280 a0=3 a1=7ffe2275d450 a2=0 a3=7ffe2275d43c items=0 ppid=1875 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:46:45.375000 audit[1958]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_unregister_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.375000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffd94022500 a2=0 a3=7ffd940224ec items=0 ppid=1875 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.375000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:46:45.376000 audit[1960]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_unregister_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.376000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffee4ecf8f0 a2=0 a3=7ffee4ecf8dc items=0 ppid=1875 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:46:45.394000 audit[1963]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_unregister_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.394000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd03e93dc0 a2=0 a3=7ffd03e93dac items=0 ppid=1875 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:46:45.397000 audit[1966]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_unregister_rule pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.397000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=512 a0=3 a1=7ffcc14fe040 a2=0 a3=7ffcc14fe02c items=0 ppid=1875 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:46:45.406000 audit[1968]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_unregister_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.406000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=420 a0=3 a1=7ffe3fd5cfb0 a2=0 a3=7ffe3fd5cf9c items=0 ppid=1875 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:45.408000 audit[1970]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_unregister_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.408000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca64513c0 a2=0 a3=7ffca64513ac items=0 ppid=1875 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.408000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:46:45.423588 dockerd[1875]: time="2024-07-02T07:46:45.423542232Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:46:45.425000 audit[1972]: NETFILTER_CFG table=nat:52 family=2 entries=1 op=nft_register_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.425000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=412 a0=3 a1=7fff607c72a0 a2=0 a3=7fff607c728c items=0 ppid=1875 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:46:45.427000 audit[1974]: NETFILTER_CFG table=nat:53 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.427000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffb3102cd0 a2=0 a3=7fffb3102cbc items=0 ppid=1875 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:46:45.429000 audit[1977]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.429000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffefe97ea0 a2=0 a3=7fffefe97e8c items=0 ppid=1875 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:46:45.431000 audit[1979]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.431000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeb4409920 a2=0 a3=7ffeb440990c items=0 ppid=1875 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:46:45.436000 audit[1985]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.436000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdaba4fd40 a2=0 a3=7ffdaba4fd2c items=0 ppid=1875 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:46:45.437000 audit[1987]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.437000 audit[1987]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe4ff1adc0 a2=0 a3=7ffe4ff1adac items=0 ppid=1875 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.437000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:46:45.439000 audit[1989]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_unregister_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.439000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7ffcb7c18720 a2=0 a3=7ffcb7c1870c items=0 ppid=1875 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:45.440000 audit[1990]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.440000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcbe529790 a2=0 a3=7ffcbe52977c items=0 ppid=1875 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:46:45.442000 audit[1992]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.442000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffce889d610 a2=0 a3=7ffce889d5fc items=0 ppid=1875 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:46:45.443000 audit[1994]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.443000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd2d23300 a2=0 a3=7fffd2d232ec items=0 ppid=1875 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.443000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:46:45.450000 audit[1998]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_unregister_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.450000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea8345eb0 a2=0 a3=7ffea8345e9c items=0 ppid=1875 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:45.451000 audit[1999]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:46:45.451000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd6cbfd2a0 a2=0 a3=7ffd6cbfd28c items=0 ppid=1875 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.451000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:46:45.451907 dockerd[1875]: time="2024-07-02T07:46:45.451866360Z" level=info msg="Loading containers: done." Jul 2 07:46:45.474230 dockerd[1875]: time="2024-07-02T07:46:45.474192780Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:46:45.474345 dockerd[1875]: time="2024-07-02T07:46:45.474312464Z" level=info msg="Docker daemon" commit=6051f14 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:46:45.474345 dockerd[1875]: time="2024-07-02T07:46:45.474342490Z" level=info msg="Daemon has completed initialization" Jul 2 07:46:45.482682 systemd[1]: Started docker.service. Jul 2 07:46:45.483612 sudo[1776]: pam_unix(sudo:session): session closed for user root Jul 2 07:46:45.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.483000 audit[1776]: USER_END pid=1776 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.483000 audit[1776]: CRED_DISP pid=1776 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.484910 sshd[1772]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:45.485000 audit[1772]: USER_END pid=1772 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.486000 audit[1772]: CRED_DISP pid=1772 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.489520 dockerd[1875]: time="2024-07-02T07:46:45.489477474Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:46:45.490209 systemd-logind[1169]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:46:45.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.75:22-10.0.0.1:39060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.491177 systemd[1]: Started sshd@14-10.0.0.75:22-10.0.0.1:39060.service. Jul 2 07:46:45.523000 audit[2019]: USER_ACCT pid=2019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.523339 sshd[2019]: Accepted publickey for core from 10.0.0.1 port 39060 ssh2: RSA SHA256:nleLw6rQrPXDNmjSByoAmmq8uYaZ7eXcVx3kSRwUXrw Jul 2 07:46:45.524000 audit[2019]: CRED_ACQ pid=2019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.524000 audit[2019]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc28e18740 a2=3 a3=0 items=0 ppid=1 pid=2019 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:46:45.524481 sshd[2019]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:46:45.527884 systemd-logind[1169]: New session 15 of user core. Jul 2 07:46:45.528716 systemd[1]: Started session-15.scope. Jul 2 07:46:45.530938 systemd[1]: sshd@13-10.0.0.75:22-10.0.0.1:39056.service: Deactivated successfully. Jul 2 07:46:45.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.75:22-10.0.0.1:39056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.531607 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:46:45.533094 systemd-logind[1169]: Removed session 14. Jul 2 07:46:45.533000 audit[2019]: USER_START pid=2019 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.534000 audit[2022]: CRED_ACQ pid=2022 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.644862 kernel: docker0: port 1(veth513a33e) entered blocking state Jul 2 07:46:45.644993 kernel: docker0: port 1(veth513a33e) entered disabled state Jul 2 07:46:45.645012 kernel: device veth513a33e entered promiscuous mode Jul 2 07:46:45.643000 audit: ANOM_PROMISCUOUS dev=veth513a33e prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:46:45.643000 audit[1875]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=e a1=c0006ff590 a2=28 a3=0 items=0 ppid=1 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:46:45.646104 systemd-networkd[1015]: veth513a33e: Link UP Jul 2 07:46:45.646644 kernel: docker0: port 1(veth513a33e) entered blocking state Jul 2 07:46:45.646678 kernel: docker0: port 1(veth513a33e) entered forwarding state Jul 2 07:46:45.648461 kernel: docker0: port 1(veth513a33e) entered disabled state Jul 2 07:46:45.677477 containerd[1872]: time="2024-07-02T07:46:45.677410716Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:46:45.677477 containerd[1872]: time="2024-07-02T07:46:45.677444920Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:46:45.677477 containerd[1872]: time="2024-07-02T07:46:45.677455379Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:46:45.677900 containerd[1872]: time="2024-07-02T07:46:45.677843718Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/27949bbd2e373549b3c6c1ef51f0de0440fe089668e92392252f4193a3934124 pid=2043 runtime=io.containerd.runc.v2 Jul 2 07:46:45.686961 systemd[1]: Started docker-27949bbd2e373549b3c6c1ef51f0de0440fe089668e92392252f4193a3934124.scope. Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit: BPF prog-id=80 op=LOAD Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2043 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F32373934396262643265333733353439623363366331656635 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2043 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F32373934396262643265333733353439623363366331656635 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit: BPF prog-id=81 op=LOAD Jul 2 07:46:45.694000 audit[2052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039f6c0 items=0 ppid=2043 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F32373934396262643265333733353439623363366331656635 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.694000 audit: BPF prog-id=82 op=LOAD Jul 2 07:46:45.694000 audit[2052]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039f708 items=0 ppid=2043 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F32373934396262643265333733353439623363366331656635 Jul 2 07:46:45.695000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:46:45.695000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { perfmon } for pid=2052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit[2052]: AVC avc: denied { bpf } for pid=2052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:46:45.695000 audit: BPF prog-id=83 op=LOAD Jul 2 07:46:45.695000 audit[2052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039fb68 items=0 ppid=2043 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F32373934396262643265333733353439623363366331656635 Jul 2 07:46:45.751090 kernel: eth0: renamed from vethb319f24 Jul 2 07:46:45.756253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth513a33e: link becomes ready Jul 2 07:46:45.756298 kernel: docker0: port 1(veth513a33e) entered blocking state Jul 2 07:46:45.756316 kernel: docker0: port 1(veth513a33e) entered forwarding state Jul 2 07:46:45.757390 systemd-networkd[1015]: veth513a33e: Gained carrier Jul 2 07:46:45.757600 systemd-networkd[1015]: docker0: Gained carrier Jul 2 07:46:45.760490 systemd-resolved[1138]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 07:46:45.779934 systemd[1]: docker-27949bbd2e373549b3c6c1ef51f0de0440fe089668e92392252f4193a3934124.scope: Deactivated successfully. Jul 2 07:46:45.780000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:46:45.795230 containerd[1872]: time="2024-07-02T07:46:45.795137576Z" level=info msg="shim disconnected" id=27949bbd2e373549b3c6c1ef51f0de0440fe089668e92392252f4193a3934124 Jul 2 07:46:45.795230 containerd[1872]: time="2024-07-02T07:46:45.795195214Z" level=warning msg="cleaning up after shim disconnected" id=27949bbd2e373549b3c6c1ef51f0de0440fe089668e92392252f4193a3934124 namespace=moby Jul 2 07:46:45.795230 containerd[1872]: time="2024-07-02T07:46:45.795207326Z" level=info msg="cleaning up dead shim" Jul 2 07:46:45.795412 dockerd[1875]: time="2024-07-02T07:46:45.795189383Z" level=info msg="ignoring event" container=27949bbd2e373549b3c6c1ef51f0de0440fe089668e92392252f4193a3934124 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 07:46:45.801153 containerd[1872]: time="2024-07-02T07:46:45.801114444Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:46:45Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2100 runtime=io.containerd.runc.v2\n" Jul 2 07:46:45.805271 systemd-networkd[1015]: veth513a33e: Lost carrier Jul 2 07:46:45.806086 kernel: docker0: port 1(veth513a33e) entered disabled state Jul 2 07:46:45.806124 kernel: vethb319f24: renamed from eth0 Jul 2 07:46:45.821326 systemd-networkd[1015]: veth513a33e: Link DOWN Jul 2 07:46:45.823224 kernel: docker0: port 1(veth513a33e) entered disabled state Jul 2 07:46:45.823257 kernel: device veth513a33e left promiscuous mode Jul 2 07:46:45.823280 kernel: docker0: port 1(veth513a33e) entered disabled state Jul 2 07:46:45.821000 audit: ANOM_PROMISCUOUS dev=veth513a33e prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 07:46:45.821000 audit[1875]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=e a1=c000debfc0 a2=20 a3=0 items=0 ppid=1 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:46:45.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 07:46:45.838272 systemd[1]: run-docker-netns-ce12b4456e43.mount: Deactivated successfully. Jul 2 07:46:45.842484 systemd[1]: var-lib-docker-overlay2-28415da45e790ac24ec10738b561e6b2f7273f2a09dad4d210a450bc55774b86-merged.mount: Deactivated successfully. Jul 2 07:46:45.868396 sshd[2019]: pam_unix(sshd:session): session closed for user core Jul 2 07:46:45.869000 audit[2019]: USER_END pid=2019 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.869000 audit[2019]: CRED_DISP pid=2019 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 07:46:45.870000 audit: BPF prog-id=83 op=UNLOAD Jul 2 07:46:45.871044 systemd[1]: sshd@14-10.0.0.75:22-10.0.0.1:39060.service: Deactivated successfully. Jul 2 07:46:45.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.75:22-10.0.0.1:39060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:46:45.871839 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:46:45.872445 systemd-logind[1169]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:46:45.873153 systemd-logind[1169]: Removed session 15. Jul 2 07:46:46.695312 systemd-networkd[1015]: docker0: Lost carrier