Jul 2 00:39:47.744241 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 00:39:47.744262 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 00:39:47.744270 kernel: efi: EFI v2.70 by EDK II Jul 2 00:39:47.744276 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 2 00:39:47.744281 kernel: random: crng init done Jul 2 00:39:47.744287 kernel: ACPI: Early table checksum verification disabled Jul 2 00:39:47.744293 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 2 00:39:47.744300 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 2 00:39:47.744306 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744312 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744317 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744323 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744328 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744334 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744348 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744354 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744360 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:39:47.744366 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 2 00:39:47.744372 kernel: NUMA: Failed to initialise from firmware Jul 2 00:39:47.744377 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:39:47.744383 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] Jul 2 00:39:47.744389 kernel: Zone ranges: Jul 2 00:39:47.744395 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:39:47.744401 kernel: DMA32 empty Jul 2 00:39:47.744407 kernel: Normal empty Jul 2 00:39:47.744413 kernel: Movable zone start for each node Jul 2 00:39:47.744418 kernel: Early memory node ranges Jul 2 00:39:47.744424 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 2 00:39:47.744430 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 2 00:39:47.744436 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 2 00:39:47.744441 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 2 00:39:47.744447 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 2 00:39:47.744452 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 2 00:39:47.744458 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 2 00:39:47.744464 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:39:47.744471 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 2 00:39:47.744477 kernel: psci: probing for conduit method from ACPI. Jul 2 00:39:47.744482 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 00:39:47.744488 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 00:39:47.744494 kernel: psci: Trusted OS migration not required Jul 2 00:39:47.744502 kernel: psci: SMC Calling Convention v1.1 Jul 2 00:39:47.744508 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 2 00:39:47.744534 kernel: ACPI: SRAT not present Jul 2 00:39:47.744542 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 00:39:47.744548 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 00:39:47.744554 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 2 00:39:47.744561 kernel: Detected PIPT I-cache on CPU0 Jul 2 00:39:47.744567 kernel: CPU features: detected: GIC system register CPU interface Jul 2 00:39:47.744573 kernel: CPU features: detected: Hardware dirty bit management Jul 2 00:39:47.744579 kernel: CPU features: detected: Spectre-v4 Jul 2 00:39:47.744585 kernel: CPU features: detected: Spectre-BHB Jul 2 00:39:47.744594 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 00:39:47.744600 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 00:39:47.744606 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 00:39:47.744612 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 2 00:39:47.744618 kernel: Policy zone: DMA Jul 2 00:39:47.744625 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:39:47.744632 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 00:39:47.744638 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 00:39:47.744644 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 00:39:47.744650 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 00:39:47.744657 kernel: Memory: 2457460K/2572288K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 114828K reserved, 0K cma-reserved) Jul 2 00:39:47.744665 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 2 00:39:47.744671 kernel: trace event string verifier disabled Jul 2 00:39:47.744677 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 00:39:47.744684 kernel: rcu: RCU event tracing is enabled. Jul 2 00:39:47.744690 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 2 00:39:47.744696 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 00:39:47.744703 kernel: Tracing variant of Tasks RCU enabled. Jul 2 00:39:47.744709 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 00:39:47.744715 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 2 00:39:47.744721 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 00:39:47.744727 kernel: GICv3: 256 SPIs implemented Jul 2 00:39:47.744734 kernel: GICv3: 0 Extended SPIs implemented Jul 2 00:39:47.744740 kernel: GICv3: Distributor has no Range Selector support Jul 2 00:39:47.744746 kernel: Root IRQ handler: gic_handle_irq Jul 2 00:39:47.744752 kernel: GICv3: 16 PPIs implemented Jul 2 00:39:47.744758 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 2 00:39:47.744765 kernel: ACPI: SRAT not present Jul 2 00:39:47.744770 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 2 00:39:47.744777 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 2 00:39:47.744783 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 2 00:39:47.744789 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 2 00:39:47.744795 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 2 00:39:47.744801 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:39:47.744809 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 00:39:47.744815 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 00:39:47.744821 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 00:39:47.744827 kernel: arm-pv: using stolen time PV Jul 2 00:39:47.744834 kernel: Console: colour dummy device 80x25 Jul 2 00:39:47.744840 kernel: ACPI: Core revision 20210730 Jul 2 00:39:47.744847 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 00:39:47.744853 kernel: pid_max: default: 32768 minimum: 301 Jul 2 00:39:47.744860 kernel: LSM: Security Framework initializing Jul 2 00:39:47.744866 kernel: SELinux: Initializing. Jul 2 00:39:47.744874 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:39:47.744880 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:39:47.744887 kernel: rcu: Hierarchical SRCU implementation. Jul 2 00:39:47.744893 kernel: Platform MSI: ITS@0x8080000 domain created Jul 2 00:39:47.744899 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 2 00:39:47.744919 kernel: Remapping and enabling EFI services. Jul 2 00:39:47.744926 kernel: smp: Bringing up secondary CPUs ... Jul 2 00:39:47.744933 kernel: Detected PIPT I-cache on CPU1 Jul 2 00:39:47.744939 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 2 00:39:47.744949 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 2 00:39:47.744955 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:39:47.744962 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 00:39:47.744968 kernel: Detected PIPT I-cache on CPU2 Jul 2 00:39:47.744974 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 2 00:39:47.744983 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 2 00:39:47.744989 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:39:47.744996 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 2 00:39:47.745002 kernel: Detected PIPT I-cache on CPU3 Jul 2 00:39:47.745009 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 2 00:39:47.745018 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 2 00:39:47.745025 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:39:47.745031 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 2 00:39:47.745039 kernel: smp: Brought up 1 node, 4 CPUs Jul 2 00:39:47.745052 kernel: SMP: Total of 4 processors activated. Jul 2 00:39:47.745062 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 00:39:47.745069 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 00:39:47.745076 kernel: CPU features: detected: Common not Private translations Jul 2 00:39:47.745084 kernel: CPU features: detected: CRC32 instructions Jul 2 00:39:47.745091 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 00:39:47.745098 kernel: CPU features: detected: LSE atomic instructions Jul 2 00:39:47.745112 kernel: CPU features: detected: Privileged Access Never Jul 2 00:39:47.745120 kernel: CPU features: detected: RAS Extension Support Jul 2 00:39:47.745126 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 2 00:39:47.745133 kernel: CPU: All CPU(s) started at EL1 Jul 2 00:39:47.745140 kernel: alternatives: patching kernel code Jul 2 00:39:47.745147 kernel: devtmpfs: initialized Jul 2 00:39:47.745154 kernel: KASLR enabled Jul 2 00:39:47.745161 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 00:39:47.745168 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 2 00:39:47.745174 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 00:39:47.745181 kernel: SMBIOS 3.0.0 present. Jul 2 00:39:47.745187 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 2 00:39:47.745194 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 00:39:47.745201 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 00:39:47.745208 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 00:39:47.745216 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 00:39:47.745222 kernel: audit: initializing netlink subsys (disabled) Jul 2 00:39:47.745229 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Jul 2 00:39:47.745236 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 00:39:47.745243 kernel: cpuidle: using governor menu Jul 2 00:39:47.745251 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 00:39:47.745258 kernel: ASID allocator initialised with 32768 entries Jul 2 00:39:47.745264 kernel: ACPI: bus type PCI registered Jul 2 00:39:47.745271 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 00:39:47.745279 kernel: Serial: AMBA PL011 UART driver Jul 2 00:39:47.745285 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 00:39:47.745292 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 00:39:47.745298 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 00:39:47.745305 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 00:39:47.745311 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 00:39:47.745318 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 00:39:47.745325 kernel: ACPI: Added _OSI(Module Device) Jul 2 00:39:47.745331 kernel: ACPI: Added _OSI(Processor Device) Jul 2 00:39:47.745339 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 00:39:47.745346 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 00:39:47.745353 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 00:39:47.745359 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 00:39:47.745366 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 00:39:47.745372 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 00:39:47.745379 kernel: ACPI: Interpreter enabled Jul 2 00:39:47.745385 kernel: ACPI: Using GIC for interrupt routing Jul 2 00:39:47.745392 kernel: ACPI: MCFG table detected, 1 entries Jul 2 00:39:47.745400 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 2 00:39:47.745407 kernel: printk: console [ttyAMA0] enabled Jul 2 00:39:47.745413 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 00:39:47.745565 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 00:39:47.745637 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 00:39:47.745699 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 00:39:47.745762 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 2 00:39:47.745827 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 2 00:39:47.745836 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 2 00:39:47.745843 kernel: PCI host bridge to bus 0000:00 Jul 2 00:39:47.745910 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 2 00:39:47.745967 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 2 00:39:47.746023 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 2 00:39:47.746080 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 00:39:47.746173 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 2 00:39:47.746249 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 00:39:47.746316 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 2 00:39:47.746381 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 2 00:39:47.746444 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 00:39:47.746508 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 00:39:47.746590 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 2 00:39:47.746658 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 2 00:39:47.746717 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 2 00:39:47.746775 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 2 00:39:47.746831 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 2 00:39:47.746859 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 2 00:39:47.746866 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 2 00:39:47.746873 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 2 00:39:47.746882 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 2 00:39:47.746889 kernel: iommu: Default domain type: Translated Jul 2 00:39:47.746895 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 00:39:47.746902 kernel: vgaarb: loaded Jul 2 00:39:47.746909 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 00:39:47.746915 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 00:39:47.746922 kernel: PTP clock support registered Jul 2 00:39:47.746928 kernel: Registered efivars operations Jul 2 00:39:47.746935 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 00:39:47.746942 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 00:39:47.746950 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 00:39:47.746957 kernel: pnp: PnP ACPI init Jul 2 00:39:47.747032 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 2 00:39:47.747046 kernel: pnp: PnP ACPI: found 1 devices Jul 2 00:39:47.747052 kernel: NET: Registered PF_INET protocol family Jul 2 00:39:47.747059 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 00:39:47.747066 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 00:39:47.747073 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 00:39:47.747083 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 00:39:47.747091 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 00:39:47.747097 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 00:39:47.747109 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:39:47.747116 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:39:47.747122 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 00:39:47.747131 kernel: PCI: CLS 0 bytes, default 64 Jul 2 00:39:47.747137 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 2 00:39:47.747146 kernel: kvm [1]: HYP mode not available Jul 2 00:39:47.747152 kernel: Initialise system trusted keyrings Jul 2 00:39:47.747159 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 00:39:47.747167 kernel: Key type asymmetric registered Jul 2 00:39:47.747175 kernel: Asymmetric key parser 'x509' registered Jul 2 00:39:47.747181 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 00:39:47.747188 kernel: io scheduler mq-deadline registered Jul 2 00:39:47.747196 kernel: io scheduler kyber registered Jul 2 00:39:47.747203 kernel: io scheduler bfq registered Jul 2 00:39:47.747210 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 2 00:39:47.747220 kernel: ACPI: button: Power Button [PWRB] Jul 2 00:39:47.747227 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 2 00:39:47.747301 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 2 00:39:47.747310 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 00:39:47.747317 kernel: thunder_xcv, ver 1.0 Jul 2 00:39:47.747323 kernel: thunder_bgx, ver 1.0 Jul 2 00:39:47.747330 kernel: nicpf, ver 1.0 Jul 2 00:39:47.747337 kernel: nicvf, ver 1.0 Jul 2 00:39:47.747410 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 00:39:47.747476 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T00:39:47 UTC (1719880787) Jul 2 00:39:47.747486 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 00:39:47.747493 kernel: NET: Registered PF_INET6 protocol family Jul 2 00:39:47.747500 kernel: Segment Routing with IPv6 Jul 2 00:39:47.747506 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 00:39:47.747513 kernel: NET: Registered PF_PACKET protocol family Jul 2 00:39:47.747536 kernel: Key type dns_resolver registered Jul 2 00:39:47.747543 kernel: registered taskstats version 1 Jul 2 00:39:47.747552 kernel: Loading compiled-in X.509 certificates Jul 2 00:39:47.747559 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 00:39:47.747565 kernel: Key type .fscrypt registered Jul 2 00:39:47.747572 kernel: Key type fscrypt-provisioning registered Jul 2 00:39:47.747578 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 00:39:47.747585 kernel: ima: Allocated hash algorithm: sha1 Jul 2 00:39:47.747592 kernel: ima: No architecture policies found Jul 2 00:39:47.747598 kernel: clk: Disabling unused clocks Jul 2 00:39:47.747605 kernel: Freeing unused kernel memory: 36352K Jul 2 00:39:47.747613 kernel: Run /init as init process Jul 2 00:39:47.747620 kernel: with arguments: Jul 2 00:39:47.747627 kernel: /init Jul 2 00:39:47.747633 kernel: with environment: Jul 2 00:39:47.747640 kernel: HOME=/ Jul 2 00:39:47.747647 kernel: TERM=linux Jul 2 00:39:47.747653 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 00:39:47.747662 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:39:47.747671 systemd[1]: Detected virtualization kvm. Jul 2 00:39:47.747679 systemd[1]: Detected architecture arm64. Jul 2 00:39:47.747686 systemd[1]: Running in initrd. Jul 2 00:39:47.747692 systemd[1]: No hostname configured, using default hostname. Jul 2 00:39:47.747699 systemd[1]: Hostname set to . Jul 2 00:39:47.747707 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:39:47.747714 systemd[1]: Queued start job for default target initrd.target. Jul 2 00:39:47.747721 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:39:47.747729 systemd[1]: Reached target cryptsetup.target. Jul 2 00:39:47.747736 systemd[1]: Reached target paths.target. Jul 2 00:39:47.747743 systemd[1]: Reached target slices.target. Jul 2 00:39:47.747750 systemd[1]: Reached target swap.target. Jul 2 00:39:47.747757 systemd[1]: Reached target timers.target. Jul 2 00:39:47.747765 systemd[1]: Listening on iscsid.socket. Jul 2 00:39:47.747772 systemd[1]: Listening on iscsiuio.socket. Jul 2 00:39:47.747781 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 00:39:47.747788 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 00:39:47.747795 systemd[1]: Listening on systemd-journald.socket. Jul 2 00:39:47.747802 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:39:47.747809 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:39:47.747817 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:39:47.747824 systemd[1]: Reached target sockets.target. Jul 2 00:39:47.747831 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:39:47.747838 systemd[1]: Finished network-cleanup.service. Jul 2 00:39:47.747846 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 00:39:47.747853 systemd[1]: Starting systemd-journald.service... Jul 2 00:39:47.747861 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:39:47.747868 systemd[1]: Starting systemd-resolved.service... Jul 2 00:39:47.747875 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 00:39:47.747882 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:39:47.747889 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 00:39:47.747896 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:39:47.747903 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 00:39:47.747912 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 00:39:47.747919 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:39:47.747927 kernel: audit: type=1130 audit(1719880787.744:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.747938 systemd-journald[290]: Journal started Jul 2 00:39:47.747980 systemd-journald[290]: Runtime Journal (/run/log/journal/18088473c02d4e609d0f742c2bd3ba57) is 6.0M, max 48.7M, 42.6M free. Jul 2 00:39:47.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.739297 systemd-modules-load[291]: Inserted module 'overlay' Jul 2 00:39:47.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.752129 systemd[1]: Started systemd-journald.service. Jul 2 00:39:47.752160 kernel: audit: type=1130 audit(1719880787.749:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.759224 systemd-resolved[292]: Positive Trust Anchors: Jul 2 00:39:47.759240 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:39:47.759268 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:39:47.770557 kernel: audit: type=1130 audit(1719880787.761:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.770580 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 00:39:47.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.760250 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 00:39:47.767208 systemd-resolved[292]: Defaulting to hostname 'linux'. Jul 2 00:39:47.774910 kernel: Bridge firewalling registered Jul 2 00:39:47.774929 kernel: audit: type=1130 audit(1719880787.772:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.767888 systemd[1]: Starting dracut-cmdline.service... Jul 2 00:39:47.771187 systemd[1]: Started systemd-resolved.service. Jul 2 00:39:47.772557 systemd-modules-load[291]: Inserted module 'br_netfilter' Jul 2 00:39:47.777937 dracut-cmdline[307]: dracut-dracut-053 Jul 2 00:39:47.774947 systemd[1]: Reached target nss-lookup.target. Jul 2 00:39:47.779841 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:39:47.785554 kernel: SCSI subsystem initialized Jul 2 00:39:47.791943 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 00:39:47.791975 kernel: device-mapper: uevent: version 1.0.3 Jul 2 00:39:47.792841 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 00:39:47.795155 systemd-modules-load[291]: Inserted module 'dm_multipath' Jul 2 00:39:47.795949 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:39:47.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.799548 kernel: audit: type=1130 audit(1719880787.796:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.799825 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:39:47.807005 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:39:47.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.810554 kernel: audit: type=1130 audit(1719880787.807:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.846544 kernel: Loading iSCSI transport class v2.0-870. Jul 2 00:39:47.860548 kernel: iscsi: registered transport (tcp) Jul 2 00:39:47.875548 kernel: iscsi: registered transport (qla4xxx) Jul 2 00:39:47.875582 kernel: QLogic iSCSI HBA Driver Jul 2 00:39:47.909390 systemd[1]: Finished dracut-cmdline.service. Jul 2 00:39:47.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.910873 systemd[1]: Starting dracut-pre-udev.service... Jul 2 00:39:47.913308 kernel: audit: type=1130 audit(1719880787.909:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:47.958545 kernel: raid6: neonx8 gen() 13763 MB/s Jul 2 00:39:47.975538 kernel: raid6: neonx8 xor() 10812 MB/s Jul 2 00:39:47.992568 kernel: raid6: neonx4 gen() 13557 MB/s Jul 2 00:39:48.009530 kernel: raid6: neonx4 xor() 11289 MB/s Jul 2 00:39:48.026530 kernel: raid6: neonx2 gen() 12912 MB/s Jul 2 00:39:48.043536 kernel: raid6: neonx2 xor() 10487 MB/s Jul 2 00:39:48.060530 kernel: raid6: neonx1 gen() 10545 MB/s Jul 2 00:39:48.077544 kernel: raid6: neonx1 xor() 8754 MB/s Jul 2 00:39:48.094542 kernel: raid6: int64x8 gen() 6231 MB/s Jul 2 00:39:48.111540 kernel: raid6: int64x8 xor() 3521 MB/s Jul 2 00:39:48.128535 kernel: raid6: int64x4 gen() 7208 MB/s Jul 2 00:39:48.145542 kernel: raid6: int64x4 xor() 3838 MB/s Jul 2 00:39:48.162536 kernel: raid6: int64x2 gen() 6130 MB/s Jul 2 00:39:48.179541 kernel: raid6: int64x2 xor() 3309 MB/s Jul 2 00:39:48.196548 kernel: raid6: int64x1 gen() 5033 MB/s Jul 2 00:39:48.213796 kernel: raid6: int64x1 xor() 2633 MB/s Jul 2 00:39:48.213816 kernel: raid6: using algorithm neonx8 gen() 13763 MB/s Jul 2 00:39:48.213825 kernel: raid6: .... xor() 10812 MB/s, rmw enabled Jul 2 00:39:48.213834 kernel: raid6: using neon recovery algorithm Jul 2 00:39:48.224540 kernel: xor: measuring software checksum speed Jul 2 00:39:48.225534 kernel: 8regs : 17293 MB/sec Jul 2 00:39:48.226853 kernel: 32regs : 20760 MB/sec Jul 2 00:39:48.226865 kernel: arm64_neon : 27939 MB/sec Jul 2 00:39:48.226874 kernel: xor: using function: arm64_neon (27939 MB/sec) Jul 2 00:39:48.285550 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 00:39:48.295206 systemd[1]: Finished dracut-pre-udev.service. Jul 2 00:39:48.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:48.296767 systemd[1]: Starting systemd-udevd.service... Jul 2 00:39:48.299645 kernel: audit: type=1130 audit(1719880788.295:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:48.299667 kernel: audit: type=1334 audit(1719880788.295:10): prog-id=7 op=LOAD Jul 2 00:39:48.295000 audit: BPF prog-id=7 op=LOAD Jul 2 00:39:48.295000 audit: BPF prog-id=8 op=LOAD Jul 2 00:39:48.315073 systemd-udevd[489]: Using default interface naming scheme 'v252'. Jul 2 00:39:48.319559 systemd[1]: Started systemd-udevd.service. Jul 2 00:39:48.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:48.320960 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 00:39:48.331555 dracut-pre-trigger[492]: rd.md=0: removing MD RAID activation Jul 2 00:39:48.359374 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 00:39:48.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:48.360812 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:39:48.396120 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:39:48.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:48.421898 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jul 2 00:39:48.424545 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:39:48.439549 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (554) Jul 2 00:39:48.440695 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 00:39:48.441584 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 00:39:48.445745 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 00:39:48.451924 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 00:39:48.458046 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:39:48.461598 systemd[1]: Starting disk-uuid.service... Jul 2 00:39:48.475540 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:39:48.478544 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:39:49.484329 disk-uuid[564]: The operation has completed successfully. Jul 2 00:39:49.485484 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:39:49.513828 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 00:39:49.514683 systemd[1]: Finished disk-uuid.service. Jul 2 00:39:49.516179 systemd[1]: Starting verity-setup.service... Jul 2 00:39:49.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.530537 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 00:39:49.554765 systemd[1]: Found device dev-mapper-usr.device. Jul 2 00:39:49.556731 systemd[1]: Mounting sysusr-usr.mount... Jul 2 00:39:49.558686 systemd[1]: Finished verity-setup.service. Jul 2 00:39:49.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.605324 systemd[1]: Mounted sysusr-usr.mount. Jul 2 00:39:49.606340 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:39:49.605987 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 00:39:49.606717 systemd[1]: Starting ignition-setup.service... Jul 2 00:39:49.608339 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 00:39:49.616914 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:39:49.616953 kernel: BTRFS info (device vda6): using free space tree Jul 2 00:39:49.616963 kernel: BTRFS info (device vda6): has skinny extents Jul 2 00:39:49.624964 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 00:39:49.630922 systemd[1]: Finished ignition-setup.service. Jul 2 00:39:49.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.632638 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 00:39:49.703064 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 00:39:49.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.705000 audit: BPF prog-id=9 op=LOAD Jul 2 00:39:49.706752 systemd[1]: Starting systemd-networkd.service... Jul 2 00:39:49.723708 ignition[651]: Ignition 2.14.0 Jul 2 00:39:49.723720 ignition[651]: Stage: fetch-offline Jul 2 00:39:49.723758 ignition[651]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:39:49.723768 ignition[651]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:39:49.723900 ignition[651]: parsed url from cmdline: "" Jul 2 00:39:49.723903 ignition[651]: no config URL provided Jul 2 00:39:49.723907 ignition[651]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 00:39:49.723914 ignition[651]: no config at "/usr/lib/ignition/user.ign" Jul 2 00:39:49.723933 ignition[651]: op(1): [started] loading QEMU firmware config module Jul 2 00:39:49.723937 ignition[651]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 2 00:39:49.734070 systemd-networkd[742]: lo: Link UP Jul 2 00:39:49.734084 systemd-networkd[742]: lo: Gained carrier Jul 2 00:39:49.734707 systemd-networkd[742]: Enumeration completed Jul 2 00:39:49.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.734835 systemd[1]: Started systemd-networkd.service. Jul 2 00:39:49.741342 ignition[651]: op(1): [finished] loading QEMU firmware config module Jul 2 00:39:49.735065 systemd-networkd[742]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:39:49.737000 systemd-networkd[742]: eth0: Link UP Jul 2 00:39:49.737004 systemd-networkd[742]: eth0: Gained carrier Jul 2 00:39:49.740758 systemd[1]: Reached target network.target. Jul 2 00:39:49.742738 systemd[1]: Starting iscsiuio.service... Jul 2 00:39:49.750200 ignition[651]: parsing config with SHA512: d7c3dccae8572316154e8c19389cf07b2b2887a6944f5118c642514e389cc6cbab573ce8f5e3ad9d1bf43001fc5ab59abdfab5ddaf49564fc9b1a484c1ed7573 Jul 2 00:39:49.755372 systemd[1]: Started iscsiuio.service. Jul 2 00:39:49.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.756885 systemd[1]: Starting iscsid.service... Jul 2 00:39:49.761338 iscsid[749]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:39:49.761338 iscsid[749]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 00:39:49.761338 iscsid[749]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 00:39:49.761338 iscsid[749]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 00:39:49.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.768543 iscsid[749]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:39:49.768543 iscsid[749]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 00:39:49.766668 systemd[1]: Started iscsid.service. Jul 2 00:39:49.768474 systemd[1]: Starting dracut-initqueue.service... Jul 2 00:39:49.769180 systemd-networkd[742]: eth0: DHCPv4 address 10.0.0.20/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 00:39:49.776618 unknown[651]: fetched base config from "system" Jul 2 00:39:49.776634 unknown[651]: fetched user config from "qemu" Jul 2 00:39:49.776895 ignition[651]: fetch-offline: fetch-offline passed Jul 2 00:39:49.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.778088 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 00:39:49.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.777092 ignition[651]: Ignition finished successfully Jul 2 00:39:49.779431 systemd[1]: Finished dracut-initqueue.service. Jul 2 00:39:49.780511 systemd[1]: Reached target remote-fs-pre.target. Jul 2 00:39:49.781596 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:39:49.782678 systemd[1]: Reached target remote-fs.target. Jul 2 00:39:49.784465 systemd[1]: Starting dracut-pre-mount.service... Jul 2 00:39:49.785671 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 00:39:49.786354 systemd[1]: Starting ignition-kargs.service... Jul 2 00:39:49.792313 systemd[1]: Finished dracut-pre-mount.service. Jul 2 00:39:49.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.795432 ignition[759]: Ignition 2.14.0 Jul 2 00:39:49.795447 ignition[759]: Stage: kargs Jul 2 00:39:49.795548 ignition[759]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:39:49.795558 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:39:49.796565 ignition[759]: kargs: kargs passed Jul 2 00:39:49.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.798278 systemd[1]: Finished ignition-kargs.service. Jul 2 00:39:49.796611 ignition[759]: Ignition finished successfully Jul 2 00:39:49.800411 systemd[1]: Starting ignition-disks.service... Jul 2 00:39:49.807141 ignition[769]: Ignition 2.14.0 Jul 2 00:39:49.807157 ignition[769]: Stage: disks Jul 2 00:39:49.807253 ignition[769]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:39:49.808976 systemd[1]: Finished ignition-disks.service. Jul 2 00:39:49.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.807262 ignition[769]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:39:49.810237 systemd[1]: Reached target initrd-root-device.target. Jul 2 00:39:49.807914 ignition[769]: disks: disks passed Jul 2 00:39:49.811303 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:39:49.807954 ignition[769]: Ignition finished successfully Jul 2 00:39:49.812648 systemd[1]: Reached target local-fs.target. Jul 2 00:39:49.813766 systemd[1]: Reached target sysinit.target. Jul 2 00:39:49.814694 systemd[1]: Reached target basic.target. Jul 2 00:39:49.816582 systemd[1]: Starting systemd-fsck-root.service... Jul 2 00:39:49.827183 systemd-fsck[777]: ROOT: clean, 614/553520 files, 56019/553472 blocks Jul 2 00:39:49.830622 systemd[1]: Finished systemd-fsck-root.service. Jul 2 00:39:49.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.832002 systemd[1]: Mounting sysroot.mount... Jul 2 00:39:49.838545 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 00:39:49.838557 systemd[1]: Mounted sysroot.mount. Jul 2 00:39:49.839165 systemd[1]: Reached target initrd-root-fs.target. Jul 2 00:39:49.841146 systemd[1]: Mounting sysroot-usr.mount... Jul 2 00:39:49.841905 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 00:39:49.841942 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 00:39:49.841966 systemd[1]: Reached target ignition-diskful.target. Jul 2 00:39:49.843770 systemd[1]: Mounted sysroot-usr.mount. Jul 2 00:39:49.846212 systemd[1]: Starting initrd-setup-root.service... Jul 2 00:39:49.850454 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 00:39:49.855078 initrd-setup-root[795]: cut: /sysroot/etc/group: No such file or directory Jul 2 00:39:49.858827 initrd-setup-root[803]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 00:39:49.862547 initrd-setup-root[811]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 00:39:49.890140 systemd[1]: Finished initrd-setup-root.service. Jul 2 00:39:49.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.891609 systemd[1]: Starting ignition-mount.service... Jul 2 00:39:49.892728 systemd[1]: Starting sysroot-boot.service... Jul 2 00:39:49.897169 bash[828]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 00:39:49.904477 ignition[830]: INFO : Ignition 2.14.0 Jul 2 00:39:49.904477 ignition[830]: INFO : Stage: mount Jul 2 00:39:49.906281 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:39:49.906281 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:39:49.906281 ignition[830]: INFO : mount: mount passed Jul 2 00:39:49.906281 ignition[830]: INFO : Ignition finished successfully Jul 2 00:39:49.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:49.906403 systemd[1]: Finished ignition-mount.service. Jul 2 00:39:49.912910 systemd[1]: Finished sysroot-boot.service. Jul 2 00:39:49.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.566596 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:39:50.573537 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (839) Jul 2 00:39:50.574935 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:39:50.574951 kernel: BTRFS info (device vda6): using free space tree Jul 2 00:39:50.574961 kernel: BTRFS info (device vda6): has skinny extents Jul 2 00:39:50.579007 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:39:50.580631 systemd[1]: Starting ignition-files.service... Jul 2 00:39:50.595875 ignition[859]: INFO : Ignition 2.14.0 Jul 2 00:39:50.595875 ignition[859]: INFO : Stage: files Jul 2 00:39:50.597350 ignition[859]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:39:50.597350 ignition[859]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:39:50.597350 ignition[859]: DEBUG : files: compiled without relabeling support, skipping Jul 2 00:39:50.601364 ignition[859]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 00:39:50.601364 ignition[859]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 00:39:50.603965 ignition[859]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 00:39:50.603965 ignition[859]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 00:39:50.606299 ignition[859]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 00:39:50.606299 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:39:50.606299 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:39:50.606299 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 2 00:39:50.606299 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 2 00:39:50.606299 ignition[859]: INFO : files: op(5): [started] processing unit "coreos-metadata.service" Jul 2 00:39:50.606299 ignition[859]: INFO : files: op(5): op(6): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 00:39:50.606299 ignition[859]: INFO : files: op(5): op(6): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 00:39:50.606299 ignition[859]: INFO : files: op(5): [finished] processing unit "coreos-metadata.service" Jul 2 00:39:50.606299 ignition[859]: INFO : files: op(7): [started] setting preset to disabled for "coreos-metadata.service" Jul 2 00:39:50.606299 ignition[859]: INFO : files: op(7): op(8): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 00:39:50.604461 unknown[859]: wrote ssh authorized keys file for user: core Jul 2 00:39:50.655997 ignition[859]: INFO : files: op(7): op(8): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 00:39:50.657872 ignition[859]: INFO : files: op(7): [finished] setting preset to disabled for "coreos-metadata.service" Jul 2 00:39:50.657872 ignition[859]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:39:50.657872 ignition[859]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:39:50.657872 ignition[859]: INFO : files: files passed Jul 2 00:39:50.657872 ignition[859]: INFO : Ignition finished successfully Jul 2 00:39:50.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.658043 systemd[1]: Finished ignition-files.service. Jul 2 00:39:50.660736 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 00:39:50.662083 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 00:39:50.668991 initrd-setup-root-after-ignition[883]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 2 00:39:50.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.662804 systemd[1]: Starting ignition-quench.service... Jul 2 00:39:50.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.672113 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 00:39:50.667425 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 00:39:50.667539 systemd[1]: Finished ignition-quench.service. Jul 2 00:39:50.669835 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 00:39:50.671585 systemd[1]: Reached target ignition-complete.target. Jul 2 00:39:50.673425 systemd[1]: Starting initrd-parse-etc.service... Jul 2 00:39:50.686114 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 00:39:50.686221 systemd[1]: Finished initrd-parse-etc.service. Jul 2 00:39:50.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.687726 systemd[1]: Reached target initrd-fs.target. Jul 2 00:39:50.688908 systemd[1]: Reached target initrd.target. Jul 2 00:39:50.690206 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 00:39:50.690947 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 00:39:50.701217 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 00:39:50.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.702661 systemd[1]: Starting initrd-cleanup.service... Jul 2 00:39:50.710673 systemd[1]: Stopped target nss-lookup.target. Jul 2 00:39:50.711392 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 00:39:50.712525 systemd[1]: Stopped target timers.target. Jul 2 00:39:50.713606 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 00:39:50.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.713710 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 00:39:50.714757 systemd[1]: Stopped target initrd.target. Jul 2 00:39:50.715988 systemd[1]: Stopped target basic.target. Jul 2 00:39:50.717058 systemd[1]: Stopped target ignition-complete.target. Jul 2 00:39:50.718164 systemd[1]: Stopped target ignition-diskful.target. Jul 2 00:39:50.719203 systemd[1]: Stopped target initrd-root-device.target. Jul 2 00:39:50.720350 systemd[1]: Stopped target remote-fs.target. Jul 2 00:39:50.721408 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 00:39:50.722549 systemd[1]: Stopped target sysinit.target. Jul 2 00:39:50.723565 systemd[1]: Stopped target local-fs.target. Jul 2 00:39:50.724755 systemd[1]: Stopped target local-fs-pre.target. Jul 2 00:39:50.725930 systemd[1]: Stopped target swap.target. Jul 2 00:39:50.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.726943 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 00:39:50.727062 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 00:39:50.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.728164 systemd[1]: Stopped target cryptsetup.target. Jul 2 00:39:50.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.729160 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 00:39:50.729264 systemd[1]: Stopped dracut-initqueue.service. Jul 2 00:39:50.730426 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 00:39:50.730528 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 00:39:50.731585 systemd[1]: Stopped target paths.target. Jul 2 00:39:50.732607 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 00:39:50.736546 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 00:39:50.737968 systemd[1]: Stopped target slices.target. Jul 2 00:39:50.738641 systemd[1]: Stopped target sockets.target. Jul 2 00:39:50.739674 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 00:39:50.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.739783 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 00:39:50.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.740907 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 00:39:50.740995 systemd[1]: Stopped ignition-files.service. Jul 2 00:39:50.744640 iscsid[749]: iscsid shutting down. Jul 2 00:39:50.743261 systemd[1]: Stopping ignition-mount.service... Jul 2 00:39:50.744306 systemd[1]: Stopping iscsid.service... Jul 2 00:39:50.745822 systemd[1]: Stopping sysroot-boot.service... Jul 2 00:39:50.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.746553 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 00:39:50.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.746713 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 00:39:50.747769 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 00:39:50.747863 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 00:39:50.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.750540 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 00:39:50.752742 ignition[898]: INFO : Ignition 2.14.0 Jul 2 00:39:50.752742 ignition[898]: INFO : Stage: umount Jul 2 00:39:50.752742 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:39:50.752742 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:39:50.752742 ignition[898]: INFO : umount: umount passed Jul 2 00:39:50.752742 ignition[898]: INFO : Ignition finished successfully Jul 2 00:39:50.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.750650 systemd[1]: Stopped iscsid.service. Jul 2 00:39:50.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.751915 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 00:39:50.751977 systemd[1]: Closed iscsid.socket. Jul 2 00:39:50.753304 systemd[1]: Stopping iscsiuio.service... Jul 2 00:39:50.756495 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 00:39:50.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.756594 systemd[1]: Stopped iscsiuio.service. Jul 2 00:39:50.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.757832 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 00:39:50.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.757915 systemd[1]: Finished initrd-cleanup.service. Jul 2 00:39:50.758821 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 00:39:50.758901 systemd[1]: Stopped ignition-mount.service. Jul 2 00:39:50.760565 systemd[1]: Stopped target network.target. Jul 2 00:39:50.761568 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 00:39:50.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.761604 systemd[1]: Closed iscsiuio.socket. Jul 2 00:39:50.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.762363 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 00:39:50.762401 systemd[1]: Stopped ignition-disks.service. Jul 2 00:39:50.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.763409 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 00:39:50.763449 systemd[1]: Stopped ignition-kargs.service. Jul 2 00:39:50.764746 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 00:39:50.764785 systemd[1]: Stopped ignition-setup.service. Jul 2 00:39:50.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.766260 systemd[1]: Stopping systemd-networkd.service... Jul 2 00:39:50.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.767418 systemd[1]: Stopping systemd-resolved.service... Jul 2 00:39:50.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.769242 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 00:39:50.770027 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 00:39:50.770118 systemd[1]: Stopped sysroot-boot.service. Jul 2 00:39:50.770859 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 00:39:50.770913 systemd[1]: Stopped initrd-setup-root.service. Jul 2 00:39:50.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.771572 systemd-networkd[742]: eth0: DHCPv6 lease lost Jul 2 00:39:50.772790 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 00:39:50.789000 audit: BPF prog-id=9 op=UNLOAD Jul 2 00:39:50.772868 systemd[1]: Stopped systemd-networkd.service. Jul 2 00:39:50.774271 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 00:39:50.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.774300 systemd[1]: Closed systemd-networkd.socket. Jul 2 00:39:50.775939 systemd[1]: Stopping network-cleanup.service... Jul 2 00:39:50.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.777009 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 00:39:50.777076 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 00:39:50.778391 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 00:39:50.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.796000 audit: BPF prog-id=6 op=UNLOAD Jul 2 00:39:50.778440 systemd[1]: Stopped systemd-sysctl.service. Jul 2 00:39:50.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.779927 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 00:39:50.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.779970 systemd[1]: Stopped systemd-modules-load.service. Jul 2 00:39:50.781041 systemd[1]: Stopping systemd-udevd.service... Jul 2 00:39:50.785729 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 00:39:50.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.786262 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 00:39:50.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.786352 systemd[1]: Stopped systemd-resolved.service. Jul 2 00:39:50.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.790224 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 00:39:50.790333 systemd[1]: Stopped network-cleanup.service. Jul 2 00:39:50.791956 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 00:39:50.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:50.792092 systemd[1]: Stopped systemd-udevd.service. Jul 2 00:39:50.793090 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 00:39:50.793150 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 00:39:50.793932 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 00:39:50.793971 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 00:39:50.795109 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 00:39:50.795156 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 00:39:50.796159 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 00:39:50.796196 systemd[1]: Stopped dracut-cmdline.service. Jul 2 00:39:50.797348 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 00:39:50.797387 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 00:39:50.799167 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 00:39:50.800204 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 00:39:50.800263 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 00:39:50.802145 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 00:39:50.802190 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 00:39:50.802927 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 00:39:50.802970 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 00:39:50.805117 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 00:39:50.805603 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 00:39:50.805703 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 00:39:50.806839 systemd[1]: Reached target initrd-switch-root.target. Jul 2 00:39:50.808794 systemd[1]: Starting initrd-switch-root.service... Jul 2 00:39:50.815668 systemd[1]: Switching root. Jul 2 00:39:50.838758 systemd-journald[290]: Journal stopped Jul 2 00:39:51.398051 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Jul 2 00:39:51.398125 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 00:39:51.398138 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 00:39:51.398150 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 00:39:51.398159 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 00:39:51.398169 kernel: SELinux: policy capability open_perms=1 Jul 2 00:39:51.398179 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 00:39:51.398190 kernel: SELinux: policy capability always_check_network=0 Jul 2 00:39:51.398200 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 00:39:51.398210 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 00:39:51.398219 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 00:39:51.398228 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 00:39:51.398238 systemd[1]: Successfully loaded SELinux policy in 32.496ms. Jul 2 00:39:51.398259 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.882ms. Jul 2 00:39:51.398270 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:39:51.398283 systemd[1]: Detected virtualization kvm. Jul 2 00:39:51.398294 systemd[1]: Detected architecture arm64. Jul 2 00:39:51.398304 systemd[1]: Detected first boot. Jul 2 00:39:51.398315 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:39:51.398325 systemd[1]: Populated /etc with preset unit settings. Jul 2 00:39:51.398336 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:39:51.398347 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:39:51.398358 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 00:39:51.398373 systemd[1]: Stopped initrd-switch-root.service. Jul 2 00:39:51.398385 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 00:39:51.398396 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 00:39:51.398406 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 00:39:51.398416 systemd[1]: Created slice system-getty.slice. Jul 2 00:39:51.398426 systemd[1]: Created slice system-modprobe.slice. Jul 2 00:39:51.398437 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 00:39:51.398447 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 00:39:51.398457 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 00:39:51.398469 systemd[1]: Created slice user.slice. Jul 2 00:39:51.398479 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:39:51.398490 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 00:39:51.398504 systemd[1]: Set up automount boot.automount. Jul 2 00:39:51.398526 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 00:39:51.398538 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 00:39:51.398548 systemd[1]: Stopped target initrd-fs.target. Jul 2 00:39:51.398558 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 00:39:51.398569 systemd[1]: Reached target integritysetup.target. Jul 2 00:39:51.398581 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:39:51.398592 systemd[1]: Reached target remote-fs.target. Jul 2 00:39:51.398603 systemd[1]: Reached target slices.target. Jul 2 00:39:51.398613 systemd[1]: Reached target swap.target. Jul 2 00:39:51.398624 systemd[1]: Reached target veritysetup.target. Jul 2 00:39:51.398634 systemd[1]: Listening on systemd-coredump.socket. Jul 2 00:39:51.398646 systemd[1]: Listening on systemd-initctl.socket. Jul 2 00:39:51.398656 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:39:51.398666 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:39:51.398677 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:39:51.398687 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 00:39:51.398701 systemd[1]: Mounting dev-hugepages.mount... Jul 2 00:39:51.398711 systemd[1]: Mounting dev-mqueue.mount... Jul 2 00:39:51.398722 systemd[1]: Mounting media.mount... Jul 2 00:39:51.398733 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 00:39:51.398743 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 00:39:51.398753 systemd[1]: Mounting tmp.mount... Jul 2 00:39:51.398763 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 00:39:51.398774 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:39:51.398784 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:39:51.398794 systemd[1]: Starting modprobe@configfs.service... Jul 2 00:39:51.398804 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:39:51.398814 systemd[1]: Starting modprobe@drm.service... Jul 2 00:39:51.398825 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:39:51.398835 systemd[1]: Starting modprobe@fuse.service... Jul 2 00:39:51.398846 systemd[1]: Starting modprobe@loop.service... Jul 2 00:39:51.398857 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 00:39:51.398867 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 00:39:51.398877 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 00:39:51.398887 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 00:39:51.398897 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 00:39:51.398912 systemd[1]: Stopped systemd-journald.service. Jul 2 00:39:51.398923 kernel: loop: module loaded Jul 2 00:39:51.398933 systemd[1]: Starting systemd-journald.service... Jul 2 00:39:51.398943 kernel: fuse: init (API version 7.34) Jul 2 00:39:51.398958 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:39:51.398969 systemd[1]: Starting systemd-network-generator.service... Jul 2 00:39:51.398979 systemd[1]: Starting systemd-remount-fs.service... Jul 2 00:39:51.398989 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:39:51.398999 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 00:39:51.399009 systemd[1]: Stopped verity-setup.service. Jul 2 00:39:51.399020 systemd[1]: Mounted dev-hugepages.mount. Jul 2 00:39:51.399031 systemd[1]: Mounted dev-mqueue.mount. Jul 2 00:39:51.399041 systemd[1]: Mounted media.mount. Jul 2 00:39:51.399052 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 00:39:51.399065 systemd-journald[999]: Journal started Jul 2 00:39:51.399110 systemd-journald[999]: Runtime Journal (/run/log/journal/18088473c02d4e609d0f742c2bd3ba57) is 6.0M, max 48.7M, 42.6M free. Jul 2 00:39:51.399146 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 00:39:50.916000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 00:39:50.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:39:50.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:39:50.953000 audit: BPF prog-id=10 op=LOAD Jul 2 00:39:50.953000 audit: BPF prog-id=10 op=UNLOAD Jul 2 00:39:50.953000 audit: BPF prog-id=11 op=LOAD Jul 2 00:39:50.953000 audit: BPF prog-id=11 op=UNLOAD Jul 2 00:39:51.288000 audit: BPF prog-id=12 op=LOAD Jul 2 00:39:51.288000 audit: BPF prog-id=3 op=UNLOAD Jul 2 00:39:51.288000 audit: BPF prog-id=13 op=LOAD Jul 2 00:39:51.288000 audit: BPF prog-id=14 op=LOAD Jul 2 00:39:51.288000 audit: BPF prog-id=4 op=UNLOAD Jul 2 00:39:51.288000 audit: BPF prog-id=5 op=UNLOAD Jul 2 00:39:51.289000 audit: BPF prog-id=15 op=LOAD Jul 2 00:39:51.289000 audit: BPF prog-id=12 op=UNLOAD Jul 2 00:39:51.289000 audit: BPF prog-id=16 op=LOAD Jul 2 00:39:51.289000 audit: BPF prog-id=17 op=LOAD Jul 2 00:39:51.289000 audit: BPF prog-id=13 op=UNLOAD Jul 2 00:39:51.289000 audit: BPF prog-id=14 op=UNLOAD Jul 2 00:39:51.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.298000 audit: BPF prog-id=15 op=UNLOAD Jul 2 00:39:51.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.372000 audit: BPF prog-id=18 op=LOAD Jul 2 00:39:51.372000 audit: BPF prog-id=19 op=LOAD Jul 2 00:39:51.372000 audit: BPF prog-id=20 op=LOAD Jul 2 00:39:51.372000 audit: BPF prog-id=16 op=UNLOAD Jul 2 00:39:51.372000 audit: BPF prog-id=17 op=UNLOAD Jul 2 00:39:51.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.396000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 00:39:51.396000 audit[999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffff01436e0 a2=4000 a3=1 items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:39:51.396000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 00:39:51.287373 systemd[1]: Queued start job for default target multi-user.target. Jul 2 00:39:51.400558 systemd[1]: Started systemd-journald.service. Jul 2 00:39:51.287386 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 00:39:51.290314 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 00:39:51.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.402235 systemd[1]: Mounted tmp.mount. Jul 2 00:39:51.403079 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:39:51.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.403999 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 00:39:51.404178 systemd[1]: Finished modprobe@configfs.service. Jul 2 00:39:51.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.405042 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:39:51.405196 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:39:51.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.406117 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:39:51.406292 systemd[1]: Finished modprobe@drm.service. Jul 2 00:39:51.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.407165 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:39:51.407303 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:39:51.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.408433 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 00:39:51.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.409333 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 00:39:51.409481 systemd[1]: Finished modprobe@fuse.service. Jul 2 00:39:51.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.410431 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:39:51.410643 systemd[1]: Finished modprobe@loop.service. Jul 2 00:39:51.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.411547 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:39:51.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.412664 systemd[1]: Finished systemd-network-generator.service. Jul 2 00:39:51.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.413686 systemd[1]: Finished systemd-remount-fs.service. Jul 2 00:39:51.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.414998 systemd[1]: Reached target network-pre.target. Jul 2 00:39:51.416953 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 00:39:51.418867 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 00:39:51.419494 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 00:39:51.425825 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 00:39:51.427506 systemd[1]: Starting systemd-journal-flush.service... Jul 2 00:39:51.428359 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:39:51.429395 systemd[1]: Starting systemd-random-seed.service... Jul 2 00:39:51.430143 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:39:51.431272 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:39:51.433725 systemd[1]: Starting systemd-sysusers.service... Jul 2 00:39:51.435917 systemd-journald[999]: Time spent on flushing to /var/log/journal/18088473c02d4e609d0f742c2bd3ba57 is 21.994ms for 920 entries. Jul 2 00:39:51.435917 systemd-journald[999]: System Journal (/var/log/journal/18088473c02d4e609d0f742c2bd3ba57) is 8.0M, max 195.6M, 187.6M free. Jul 2 00:39:51.476810 systemd-journald[999]: Received client request to flush runtime journal. Jul 2 00:39:51.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.437183 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 00:39:51.438408 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 00:39:51.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.479686 udevadm[1026]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 00:39:51.446611 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:39:51.447642 systemd[1]: Finished systemd-random-seed.service. Jul 2 00:39:51.448597 systemd[1]: Reached target first-boot-complete.target. Jul 2 00:39:51.450321 systemd[1]: Starting systemd-udev-settle.service... Jul 2 00:39:51.453764 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:39:51.466356 systemd[1]: Finished systemd-sysusers.service. Jul 2 00:39:51.468176 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:39:51.477810 systemd[1]: Finished systemd-journal-flush.service. Jul 2 00:39:51.490423 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:39:51.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.805702 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 00:39:51.806000 audit: BPF prog-id=21 op=LOAD Jul 2 00:39:51.806000 audit: BPF prog-id=22 op=LOAD Jul 2 00:39:51.806000 audit: BPF prog-id=7 op=UNLOAD Jul 2 00:39:51.806000 audit: BPF prog-id=8 op=UNLOAD Jul 2 00:39:51.807762 systemd[1]: Starting systemd-udevd.service... Jul 2 00:39:51.837467 systemd-udevd[1030]: Using default interface naming scheme 'v252'. Jul 2 00:39:51.850725 systemd[1]: Started systemd-udevd.service. Jul 2 00:39:51.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.851000 audit: BPF prog-id=23 op=LOAD Jul 2 00:39:51.854406 systemd[1]: Starting systemd-networkd.service... Jul 2 00:39:51.861448 systemd[1]: Starting systemd-userdbd.service... Jul 2 00:39:51.860000 audit: BPF prog-id=24 op=LOAD Jul 2 00:39:51.860000 audit: BPF prog-id=25 op=LOAD Jul 2 00:39:51.860000 audit: BPF prog-id=26 op=LOAD Jul 2 00:39:51.879836 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 00:39:51.898672 systemd[1]: Started systemd-userdbd.service. Jul 2 00:39:51.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.918726 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:39:51.965992 systemd[1]: Finished systemd-udev-settle.service. Jul 2 00:39:51.968209 systemd[1]: Starting lvm2-activation-early.service... Jul 2 00:39:51.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.973410 systemd-networkd[1037]: lo: Link UP Jul 2 00:39:51.973422 systemd-networkd[1037]: lo: Gained carrier Jul 2 00:39:51.973923 systemd-networkd[1037]: Enumeration completed Jul 2 00:39:51.974033 systemd-networkd[1037]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:39:51.974054 systemd[1]: Started systemd-networkd.service. Jul 2 00:39:51.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:51.981053 systemd-networkd[1037]: eth0: Link UP Jul 2 00:39:51.981060 systemd-networkd[1037]: eth0: Gained carrier Jul 2 00:39:51.984237 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:39:52.000650 systemd-networkd[1037]: eth0: DHCPv4 address 10.0.0.20/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 00:39:52.011473 systemd[1]: Finished lvm2-activation-early.service. Jul 2 00:39:52.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.012365 systemd[1]: Reached target cryptsetup.target. Jul 2 00:39:52.014359 systemd[1]: Starting lvm2-activation.service... Jul 2 00:39:52.018503 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:39:52.047461 systemd[1]: Finished lvm2-activation.service. Jul 2 00:39:52.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.048308 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:39:52.048728 kernel: kauditd_printk_skb: 138 callbacks suppressed Jul 2 00:39:52.048785 kernel: audit: type=1130 audit(1719880792.047:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.051291 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 00:39:52.051441 systemd[1]: Reached target local-fs.target. Jul 2 00:39:52.052117 systemd[1]: Reached target machines.target. Jul 2 00:39:52.054215 systemd[1]: Starting ldconfig.service... Jul 2 00:39:52.055417 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.055614 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.056820 systemd[1]: Starting systemd-boot-update.service... Jul 2 00:39:52.058612 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 00:39:52.061157 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 00:39:52.063260 systemd[1]: Starting systemd-sysext.service... Jul 2 00:39:52.066954 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1066 (bootctl) Jul 2 00:39:52.068123 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 00:39:52.071974 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 00:39:52.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.076533 kernel: audit: type=1130 audit(1719880792.073:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.077932 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:39:52.083660 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:39:52.083838 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:39:52.094327 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 00:39:52.094577 (sd-sysext)[1076]: No suitable extensions found (2 ignored due to incompatible version). Jul 2 00:39:52.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.097534 kernel: audit: type=1130 audit(1719880792.094:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.106376 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.107737 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:39:52.109473 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:39:52.112258 systemd[1]: Starting modprobe@loop.service... Jul 2 00:39:52.113020 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.113176 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.114023 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:39:52.114162 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:39:52.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.115332 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:39:52.115452 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:39:52.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.118532 kernel: audit: type=1130 audit(1719880792.114:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.118582 kernel: audit: type=1131 audit(1719880792.114:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.122264 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:39:52.122377 systemd[1]: Finished modprobe@loop.service. Jul 2 00:39:52.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.126478 kernel: audit: type=1130 audit(1719880792.121:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.126537 kernel: audit: type=1131 audit(1719880792.121:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.126674 systemd-fsck[1074]: fsck.fat 4.2 (2021-01-31) Jul 2 00:39:52.126674 systemd-fsck[1074]: /dev/vda1: 236 files, 117047/258078 clusters Jul 2 00:39:52.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.129010 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 00:39:52.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.131531 kernel: audit: type=1130 audit(1719880792.128:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.131588 kernel: audit: type=1131 audit(1719880792.128:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.137544 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:39:52.137633 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.138633 kernel: audit: type=1130 audit(1719880792.135:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.191005 ldconfig[1065]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 00:39:52.194791 systemd[1]: Finished ldconfig.service. Jul 2 00:39:52.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.393301 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 00:39:52.395223 systemd[1]: Mounting boot.mount... Jul 2 00:39:52.397089 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:39:52.401341 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:39:52.404636 systemd[1]: Finished systemd-sysext.service. Jul 2 00:39:52.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.405715 systemd[1]: Mounted boot.mount. Jul 2 00:39:52.408291 systemd[1]: Starting ensure-sysext.service... Jul 2 00:39:52.410563 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 00:39:52.415316 systemd[1]: Finished systemd-boot-update.service. Jul 2 00:39:52.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.416189 systemd[1]: Reloading. Jul 2 00:39:52.418948 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 00:39:52.419865 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 00:39:52.420971 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 00:39:52.504613 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:39:52.504630 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:39:52.560000 audit: BPF prog-id=27 op=LOAD Jul 2 00:39:52.560000 audit: BPF prog-id=18 op=UNLOAD Jul 2 00:39:52.560000 audit: BPF prog-id=28 op=LOAD Jul 2 00:39:52.560000 audit: BPF prog-id=29 op=LOAD Jul 2 00:39:52.560000 audit: BPF prog-id=19 op=UNLOAD Jul 2 00:39:52.560000 audit: BPF prog-id=20 op=UNLOAD Jul 2 00:39:52.561000 audit: BPF prog-id=30 op=LOAD Jul 2 00:39:52.561000 audit: BPF prog-id=31 op=LOAD Jul 2 00:39:52.561000 audit: BPF prog-id=21 op=UNLOAD Jul 2 00:39:52.561000 audit: BPF prog-id=22 op=UNLOAD Jul 2 00:39:52.562000 audit: BPF prog-id=32 op=LOAD Jul 2 00:39:52.562000 audit: BPF prog-id=24 op=UNLOAD Jul 2 00:39:52.562000 audit: BPF prog-id=33 op=LOAD Jul 2 00:39:52.562000 audit: BPF prog-id=34 op=LOAD Jul 2 00:39:52.562000 audit: BPF prog-id=25 op=UNLOAD Jul 2 00:39:52.562000 audit: BPF prog-id=26 op=UNLOAD Jul 2 00:39:52.562000 audit: BPF prog-id=35 op=LOAD Jul 2 00:39:52.562000 audit: BPF prog-id=23 op=UNLOAD Jul 2 00:39:52.566127 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 00:39:52.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.570264 systemd[1]: Starting audit-rules.service... Jul 2 00:39:52.572121 systemd[1]: Starting clean-ca-certificates.service... Jul 2 00:39:52.574099 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 00:39:52.575000 audit: BPF prog-id=36 op=LOAD Jul 2 00:39:52.577000 audit: BPF prog-id=37 op=LOAD Jul 2 00:39:52.576487 systemd[1]: Starting systemd-resolved.service... Jul 2 00:39:52.578647 systemd[1]: Starting systemd-timesyncd.service... Jul 2 00:39:52.580408 systemd[1]: Starting systemd-update-utmp.service... Jul 2 00:39:52.582855 systemd[1]: Finished clean-ca-certificates.service. Jul 2 00:39:52.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.585974 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:39:52.587000 audit[1149]: SYSTEM_BOOT pid=1149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.591689 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.593225 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:39:52.595056 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:39:52.596967 systemd[1]: Starting modprobe@loop.service... Jul 2 00:39:52.597586 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.597775 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.597915 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:39:52.599161 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 00:39:52.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.600648 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:39:52.600775 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:39:52.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.601953 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:39:52.602058 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:39:52.603232 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:39:52.603336 systemd[1]: Finished modprobe@loop.service. Jul 2 00:39:52.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.604464 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:39:52.604701 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.606175 systemd[1]: Starting systemd-update-done.service... Jul 2 00:39:52.607651 systemd[1]: Finished systemd-update-utmp.service. Jul 2 00:39:52.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.610731 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.612005 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:39:52.613788 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:39:52.615614 systemd[1]: Starting modprobe@loop.service... Jul 2 00:39:52.616195 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.616303 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.616397 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:39:52.617252 systemd[1]: Finished systemd-update-done.service. Jul 2 00:39:52.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.618388 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:39:52.618551 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:39:52.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.619757 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:39:52.619894 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:39:52.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.621134 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:39:52.621267 systemd[1]: Finished modprobe@loop.service. Jul 2 00:39:52.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:39:52.622501 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:39:52.622632 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.624736 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.625421 augenrules[1166]: No rules Jul 2 00:39:52.624000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 00:39:52.624000 audit[1166]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffde966190 a2=420 a3=0 items=0 ppid=1138 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:39:52.624000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 00:39:52.625914 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:39:52.627650 systemd[1]: Starting modprobe@drm.service... Jul 2 00:39:52.630480 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:39:52.632394 systemd[1]: Starting modprobe@loop.service... Jul 2 00:39:52.633059 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.633186 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.633299 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:39:52.634201 systemd[1]: Finished audit-rules.service. Jul 2 00:39:52.635181 systemd[1]: Started systemd-timesyncd.service. Jul 2 00:39:52.635621 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 2 00:39:52.635682 systemd-resolved[1142]: Positive Trust Anchors: Jul 2 00:39:52.635683 systemd-timesyncd[1147]: Initial clock synchronization to Tue 2024-07-02 00:39:52.805293 UTC. Jul 2 00:39:52.635689 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:39:52.635715 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:39:52.636622 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:39:52.636739 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:39:52.637767 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:39:52.637882 systemd[1]: Finished modprobe@drm.service. Jul 2 00:39:52.638916 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:39:52.639031 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:39:52.640156 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:39:52.640265 systemd[1]: Finished modprobe@loop.service. Jul 2 00:39:52.641806 systemd[1]: Reached target time-set.target. Jul 2 00:39:52.642459 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:39:52.642495 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.642919 systemd[1]: Finished ensure-sysext.service. Jul 2 00:39:52.645026 systemd-resolved[1142]: Defaulting to hostname 'linux'. Jul 2 00:39:52.646301 systemd[1]: Started systemd-resolved.service. Jul 2 00:39:52.647073 systemd[1]: Reached target network.target. Jul 2 00:39:52.647646 systemd[1]: Reached target nss-lookup.target. Jul 2 00:39:52.648198 systemd[1]: Reached target sysinit.target. Jul 2 00:39:52.648800 systemd[1]: Started motdgen.path. Jul 2 00:39:52.649316 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 00:39:52.650298 systemd[1]: Started logrotate.timer. Jul 2 00:39:52.651119 systemd[1]: Started mdadm.timer. Jul 2 00:39:52.651638 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 00:39:52.652230 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:39:52.652259 systemd[1]: Reached target paths.target. Jul 2 00:39:52.652808 systemd[1]: Reached target timers.target. Jul 2 00:39:52.653777 systemd[1]: Listening on dbus.socket. Jul 2 00:39:52.660509 systemd[1]: Listening on sshd.socket. Jul 2 00:39:52.661135 systemd[1]: Reached target sockets.target. Jul 2 00:39:52.661782 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.661808 systemd[1]: Reached target basic.target. Jul 2 00:39:52.662361 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.662394 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:39:52.663461 systemd[1]: Starting dbus.service... Jul 2 00:39:52.665004 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:39:52.666804 systemd[1]: Starting extend-filesystems.service... Jul 2 00:39:52.667574 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 00:39:52.668893 systemd[1]: Starting motdgen.service... Jul 2 00:39:52.670946 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:39:52.672712 systemd[1]: Starting sshd-keygen.service... Jul 2 00:39:52.675763 systemd[1]: Starting systemd-logind.service... Jul 2 00:39:52.676380 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:39:52.676463 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:39:52.676832 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 00:39:52.677718 systemd[1]: Starting update-engine.service... Jul 2 00:39:52.680786 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 00:39:52.682567 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:39:52.682734 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:39:52.691198 jq[1178]: false Jul 2 00:39:52.693478 jq[1192]: true Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda1 Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda2 Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda3 Jul 2 00:39:52.697088 extend-filesystems[1179]: Found usr Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda4 Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda6 Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda7 Jul 2 00:39:52.697088 extend-filesystems[1179]: Found vda9 Jul 2 00:39:52.697088 extend-filesystems[1179]: Checking size of /dev/vda9 Jul 2 00:39:52.697699 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:39:52.697889 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:39:52.704034 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:39:52.704222 systemd[1]: Finished motdgen.service. Jul 2 00:39:52.714871 extend-filesystems[1179]: Old size kept for /dev/vda9 Jul 2 00:39:52.717931 jq[1197]: true Jul 2 00:39:52.715777 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:39:52.715928 systemd[1]: Finished extend-filesystems.service. Jul 2 00:39:52.728726 dbus-daemon[1177]: [system] SELinux support is enabled Jul 2 00:39:52.728867 systemd[1]: Started dbus.service. Jul 2 00:39:52.732793 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 00:39:52.732821 systemd[1]: Reached target system-config.target. Jul 2 00:39:52.733723 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 00:39:52.733742 systemd[1]: Reached target user-config.target. Jul 2 00:39:52.736680 systemd-logind[1186]: Watching system buttons on /dev/input/event0 (Power Button) Jul 2 00:39:52.737844 systemd-logind[1186]: New seat seat0. Jul 2 00:39:52.745463 systemd[1]: Started systemd-logind.service. Jul 2 00:39:52.759435 update_engine[1190]: I0702 00:39:52.758628 1190 main.cc:92] Flatcar Update Engine starting Jul 2 00:39:52.761808 systemd[1]: Started update-engine.service. Jul 2 00:39:52.761977 update_engine[1190]: I0702 00:39:52.761816 1190 update_check_scheduler.cc:74] Next update check in 6m0s Jul 2 00:39:52.764667 systemd[1]: Started locksmithd.service. Jul 2 00:39:52.766236 bash[1217]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:39:52.767219 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 00:39:52.798993 locksmithd[1218]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 00:39:53.412751 systemd-networkd[1037]: eth0: Gained IPv6LL Jul 2 00:39:53.631760 sshd_keygen[1196]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 00:39:53.649709 systemd[1]: Finished sshd-keygen.service. Jul 2 00:39:53.651957 systemd[1]: Starting issuegen.service... Jul 2 00:39:53.656475 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:39:53.656654 systemd[1]: Finished issuegen.service. Jul 2 00:39:53.658821 systemd[1]: Starting systemd-user-sessions.service... Jul 2 00:39:53.665441 systemd[1]: Finished systemd-user-sessions.service. Jul 2 00:39:53.667587 systemd[1]: Started getty@tty1.service. Jul 2 00:39:53.669452 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 00:39:53.670350 systemd[1]: Reached target getty.target. Jul 2 00:39:53.671035 systemd[1]: Reached target multi-user.target. Jul 2 00:39:53.672822 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:39:53.679698 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:39:53.679850 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:39:53.680684 systemd[1]: Startup finished in 591ms (kernel) + 3.298s (initrd) + 2.808s (userspace) = 6.699s. Jul 2 00:40:00.721032 systemd[1]: Created slice system-sshd.slice. Jul 2 00:40:00.722634 systemd[1]: Started sshd@0-10.0.0.20:22-10.0.0.1:52326.service. Jul 2 00:40:00.763299 sshd[1238]: Accepted publickey for core from 10.0.0.1 port 52326 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:00.765114 sshd[1238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:00.773039 systemd[1]: Created slice user-500.slice. Jul 2 00:40:00.774467 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 00:40:00.776093 systemd-logind[1186]: New session 1 of user core. Jul 2 00:40:00.781702 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 00:40:00.783128 systemd[1]: Starting user@500.service... Jul 2 00:40:00.785717 (systemd)[1241]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:00.841321 systemd[1241]: Queued start job for default target default.target. Jul 2 00:40:00.841777 systemd[1241]: Reached target paths.target. Jul 2 00:40:00.841798 systemd[1241]: Reached target sockets.target. Jul 2 00:40:00.841809 systemd[1241]: Reached target timers.target. Jul 2 00:40:00.841819 systemd[1241]: Reached target basic.target. Jul 2 00:40:00.841855 systemd[1241]: Reached target default.target. Jul 2 00:40:00.841882 systemd[1241]: Startup finished in 50ms. Jul 2 00:40:00.842084 systemd[1]: Started user@500.service. Jul 2 00:40:00.843065 systemd[1]: Started session-1.scope. Jul 2 00:40:00.893549 systemd[1]: Started sshd@1-10.0.0.20:22-10.0.0.1:52338.service. Jul 2 00:40:00.936161 sshd[1250]: Accepted publickey for core from 10.0.0.1 port 52338 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:00.937431 sshd[1250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:00.940848 systemd-logind[1186]: New session 2 of user core. Jul 2 00:40:00.941686 systemd[1]: Started session-2.scope. Jul 2 00:40:00.995094 sshd[1250]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:00.998023 systemd[1]: sshd@1-10.0.0.20:22-10.0.0.1:52338.service: Deactivated successfully. Jul 2 00:40:00.998619 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 00:40:00.999073 systemd-logind[1186]: Session 2 logged out. Waiting for processes to exit. Jul 2 00:40:01.000267 systemd[1]: Started sshd@2-10.0.0.20:22-10.0.0.1:52340.service. Jul 2 00:40:01.000930 systemd-logind[1186]: Removed session 2. Jul 2 00:40:01.041245 sshd[1256]: Accepted publickey for core from 10.0.0.1 port 52340 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:01.042431 sshd[1256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:01.045588 systemd-logind[1186]: New session 3 of user core. Jul 2 00:40:01.046399 systemd[1]: Started session-3.scope. Jul 2 00:40:01.094552 sshd[1256]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:01.098676 systemd[1]: sshd@2-10.0.0.20:22-10.0.0.1:52340.service: Deactivated successfully. Jul 2 00:40:01.099424 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 00:40:01.100137 systemd-logind[1186]: Session 3 logged out. Waiting for processes to exit. Jul 2 00:40:01.102235 systemd[1]: Started sshd@3-10.0.0.20:22-10.0.0.1:52352.service. Jul 2 00:40:01.103125 systemd-logind[1186]: Removed session 3. Jul 2 00:40:01.138840 sshd[1262]: Accepted publickey for core from 10.0.0.1 port 52352 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:01.139913 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:01.142852 systemd-logind[1186]: New session 4 of user core. Jul 2 00:40:01.144292 systemd[1]: Started session-4.scope. Jul 2 00:40:01.197354 sshd[1262]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:01.201644 systemd[1]: sshd@3-10.0.0.20:22-10.0.0.1:52352.service: Deactivated successfully. Jul 2 00:40:01.202355 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 00:40:01.203069 systemd-logind[1186]: Session 4 logged out. Waiting for processes to exit. Jul 2 00:40:01.204936 systemd[1]: Started sshd@4-10.0.0.20:22-10.0.0.1:52360.service. Jul 2 00:40:01.205732 systemd-logind[1186]: Removed session 4. Jul 2 00:40:01.241254 sshd[1268]: Accepted publickey for core from 10.0.0.1 port 52360 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:01.242344 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:01.245257 systemd-logind[1186]: New session 5 of user core. Jul 2 00:40:01.247023 systemd[1]: Started session-5.scope. Jul 2 00:40:01.313115 sudo[1271]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 00:40:01.313314 sudo[1271]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:01.323728 dbus-daemon[1177]: avc: received setenforce notice (enforcing=1) Jul 2 00:40:01.325489 sudo[1271]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:01.327487 sshd[1268]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:01.331356 systemd[1]: sshd@4-10.0.0.20:22-10.0.0.1:52360.service: Deactivated successfully. Jul 2 00:40:01.331933 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 00:40:01.332430 systemd-logind[1186]: Session 5 logged out. Waiting for processes to exit. Jul 2 00:40:01.333455 systemd[1]: Started sshd@5-10.0.0.20:22-10.0.0.1:52366.service. Jul 2 00:40:01.334082 systemd-logind[1186]: Removed session 5. Jul 2 00:40:01.370562 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 52366 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:01.372153 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:01.375891 systemd[1]: Started session-6.scope. Jul 2 00:40:01.376289 systemd-logind[1186]: New session 6 of user core. Jul 2 00:40:01.427911 sudo[1280]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 00:40:01.428117 sudo[1280]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:01.430598 sudo[1280]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:01.434807 sudo[1279]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 00:40:01.435248 sudo[1279]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:01.443199 systemd[1]: Stopping audit-rules.service... Jul 2 00:40:01.442000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:40:01.444385 auditctl[1283]: No rules Jul 2 00:40:01.444690 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 00:40:01.444858 systemd[1]: Stopped audit-rules.service. Jul 2 00:40:01.444999 kernel: kauditd_printk_skb: 44 callbacks suppressed Jul 2 00:40:01.445024 kernel: audit: type=1305 audit(1719880801.442:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:40:01.442000 audit[1283]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd4239a70 a2=420 a3=0 items=0 ppid=1 pid=1283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:01.446558 systemd[1]: Starting audit-rules.service... Jul 2 00:40:01.450035 kernel: audit: type=1300 audit(1719880801.442:199): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd4239a70 a2=420 a3=0 items=0 ppid=1 pid=1283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:01.450087 kernel: audit: type=1327 audit(1719880801.442:199): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:40:01.442000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:40:01.451645 kernel: audit: type=1131 audit(1719880801.443:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.461143 augenrules[1300]: No rules Jul 2 00:40:01.461740 systemd[1]: Finished audit-rules.service. Jul 2 00:40:01.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.463241 sudo[1279]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:01.461000 audit[1279]: USER_END pid=1279 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.464584 sshd[1275]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:01.466658 kernel: audit: type=1130 audit(1719880801.460:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.466710 kernel: audit: type=1106 audit(1719880801.461:202): pid=1279 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.466726 kernel: audit: type=1104 audit(1719880801.461:203): pid=1279 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.461000 audit[1279]: CRED_DISP pid=1279 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.468052 systemd[1]: Started sshd@6-10.0.0.20:22-10.0.0.1:52374.service. Jul 2 00:40:01.468579 systemd[1]: sshd@5-10.0.0.20:22-10.0.0.1:52366.service: Deactivated successfully. Jul 2 00:40:01.468797 kernel: audit: type=1106 audit(1719880801.463:204): pid=1275 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.463000 audit[1275]: USER_END pid=1275 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.469207 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 00:40:01.469706 systemd-logind[1186]: Session 6 logged out. Waiting for processes to exit. Jul 2 00:40:01.470777 systemd-logind[1186]: Removed session 6. Jul 2 00:40:01.471452 kernel: audit: type=1104 audit(1719880801.463:205): pid=1275 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.463000 audit[1275]: CRED_DISP pid=1275 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.473563 kernel: audit: type=1130 audit(1719880801.466:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.20:22-10.0.0.1:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.20:22-10.0.0.1:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.20:22-10.0.0.1:52366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.507000 audit[1305]: USER_ACCT pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.508042 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 52374 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:01.509000 audit[1305]: CRED_ACQ pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.509000 audit[1305]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffdf14e40 a2=3 a3=1 items=0 ppid=1 pid=1305 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:01.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:01.510169 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:01.513573 systemd-logind[1186]: New session 7 of user core. Jul 2 00:40:01.514295 systemd[1]: Started session-7.scope. Jul 2 00:40:01.516000 audit[1305]: USER_START pid=1305 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.517000 audit[1308]: CRED_ACQ pid=1308 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.564852 sshd[1305]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:01.564000 audit[1305]: USER_END pid=1305 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.564000 audit[1305]: CRED_DISP pid=1305 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.567168 systemd[1]: sshd@6-10.0.0.20:22-10.0.0.1:52374.service: Deactivated successfully. Jul 2 00:40:01.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.20:22-10.0.0.1:52374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.567725 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 00:40:01.568217 systemd-logind[1186]: Session 7 logged out. Waiting for processes to exit. Jul 2 00:40:01.569206 systemd[1]: Started sshd@7-10.0.0.20:22-10.0.0.1:52390.service. Jul 2 00:40:01.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.20:22-10.0.0.1:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:01.569836 systemd-logind[1186]: Removed session 7. Jul 2 00:40:01.604000 audit[1313]: USER_ACCT pid=1313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.606092 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 52390 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:01.605000 audit[1313]: CRED_ACQ pid=1313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.605000 audit[1313]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7209cf0 a2=3 a3=1 items=0 ppid=1 pid=1313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:01.605000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:01.607130 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:01.610318 systemd-logind[1186]: New session 8 of user core. Jul 2 00:40:01.611099 systemd[1]: Started session-8.scope. Jul 2 00:40:01.612000 audit[1313]: USER_START pid=1313 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:01.614000 audit[1315]: CRED_ACQ pid=1315 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:02.166299 sshd[1313]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:02.165000 audit[1313]: USER_END pid=1313 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:02.166000 audit[1313]: CRED_DISP pid=1313 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:02.169237 systemd[1]: sshd@7-10.0.0.20:22-10.0.0.1:52390.service: Deactivated successfully. Jul 2 00:40:02.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.20:22-10.0.0.1:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:02.169808 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 00:40:02.170280 systemd-logind[1186]: Session 8 logged out. Waiting for processes to exit. Jul 2 00:40:02.171395 systemd[1]: Started sshd@8-10.0.0.20:22-10.0.0.1:52394.service. Jul 2 00:40:02.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.20:22-10.0.0.1:52394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:02.172090 systemd-logind[1186]: Removed session 8. Jul 2 00:40:02.206000 audit[1328]: USER_ACCT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:02.208291 sshd[1328]: Accepted publickey for core from 10.0.0.1 port 52394 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:02.208000 audit[1328]: CRED_ACQ pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:02.208000 audit[1328]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda347ec0 a2=3 a3=1 items=0 ppid=1 pid=1328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:02.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:02.209415 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:02.212545 systemd-logind[1186]: New session 9 of user core. Jul 2 00:40:02.213300 systemd[1]: Started session-9.scope. Jul 2 00:40:02.215000 audit[1328]: USER_START pid=1328 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:02.216000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.829000 audit[1331]: USER_ACCT pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.829864 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 2 00:40:07.830057 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:07.832228 kernel: kauditd_printk_skb: 30 callbacks suppressed Jul 2 00:40:07.832289 kernel: audit: type=1101 audit(1719880807.829:231): pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.832313 kernel: audit: type=1110 audit(1719880807.829:232): pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.829000 audit[1331]: CRED_REFR pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.834135 kernel: audit: type=1105 audit(1719880807.832:233): pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.832000 audit[1331]: USER_START pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.834163 sudo[1331]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:07.836263 kernel: audit: type=1106 audit(1719880807.833:234): pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.833000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.833000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.839730 sshd[1328]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:07.840588 kernel: audit: type=1104 audit(1719880807.833:235): pid=1331 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.840645 kernel: audit: type=1106 audit(1719880807.839:236): pid=1328 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.839000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.840000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.844222 systemd[1]: Started sshd@9-10.0.0.20:22-10.0.0.1:52402.service. Jul 2 00:40:07.844718 systemd[1]: sshd@8-10.0.0.20:22-10.0.0.1:52394.service: Deactivated successfully. Jul 2 00:40:07.845330 kernel: audit: type=1104 audit(1719880807.840:237): pid=1328 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.845365 kernel: audit: type=1130 audit(1719880807.843:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.20:22-10.0.0.1:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.20:22-10.0.0.1:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.845419 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 00:40:07.845583 systemd[1]: session-9.scope: Consumed 3.915s CPU time. Jul 2 00:40:07.846026 systemd-logind[1186]: Session 9 logged out. Waiting for processes to exit. Jul 2 00:40:07.846894 systemd-logind[1186]: Removed session 9. Jul 2 00:40:07.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.20:22-10.0.0.1:52394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.849400 kernel: audit: type=1131 audit(1719880807.844:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.20:22-10.0.0.1:52394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.882000 audit[1387]: USER_ACCT pid=1387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.882929 sshd[1387]: Accepted publickey for core from 10.0.0.1 port 52402 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:07.884291 sshd[1387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:07.883000 audit[1387]: CRED_ACQ pid=1387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.883000 audit[1387]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe10d00a0 a2=3 a3=1 items=0 ppid=1 pid=1387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:07.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:07.885536 kernel: audit: type=1101 audit(1719880807.882:240): pid=1387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.889643 systemd-logind[1186]: New session 10 of user core. Jul 2 00:40:07.890082 systemd[1]: Started session-10.scope. Jul 2 00:40:07.893000 audit[1387]: USER_START pid=1387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.894000 audit[1390]: CRED_ACQ pid=1390 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:07.941000 audit[1391]: USER_ACCT pid=1391 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.941839 sudo[1391]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 2 00:40:07.941000 audit[1391]: CRED_REFR pid=1391 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.942061 sudo[1391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:07.942000 audit[1391]: USER_START pid=1391 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.949087 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 2 00:40:07.949249 systemd[1]: Stopped ensure-sysext.service. Jul 2 00:40:07.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.949312 systemd[1]: Stopping ensure-sysext.service... Jul 2 00:40:07.950478 systemd[1]: Stopping systemd-sysext.service... Jul 2 00:40:07.960968 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:07.961148 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:07.962464 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 2 00:40:07.962659 systemd[1]: Stopped systemd-sysext.service. Jul 2 00:40:07.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:07.964172 systemd[1]: Starting systemd-sysext.service... Jul 2 00:40:07.970051 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:40:07.973162 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:40:07.973333 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:40:07.981545 kernel: loop0: detected capacity change from 0 to 301296 Jul 2 00:40:07.985543 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:08.018545 kernel: loop1: detected capacity change from 0 to 315088 Jul 2 00:40:08.022534 kernel: EXT4-fs (loop1): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:08.043547 kernel: loop2: detected capacity change from 0 to 301296 Jul 2 00:40:08.047531 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:08.048545 kernel: loop3: detected capacity change from 0 to 315088 Jul 2 00:40:08.051536 kernel: EXT4-fs (loop3): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:08.051761 (sd-sysext)[1404]: Using extensions 'containerd', 'docker'. Jul 2 00:40:08.053115 (sd-sysext)[1404]: Merged extensions into '/usr'. Jul 2 00:40:08.070954 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:40:08.076170 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:40:08.077113 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:08.077259 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:08.077812 systemd[1]: Finished systemd-sysext.service. Jul 2 00:40:08.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.078653 sudo[1391]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:08.077000 audit[1391]: USER_END pid=1391 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.077000 audit[1391]: CRED_DISP pid=1391 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.080330 sshd[1387]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:08.079957 systemd[1]: Starting ensure-sysext.service... Jul 2 00:40:08.081000 audit[1387]: USER_END pid=1387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:08.081000 audit[1387]: CRED_DISP pid=1387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:08.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.20:22-10.0.0.1:52402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.084684 systemd[1]: sshd@9-10.0.0.20:22-10.0.0.1:52402.service: Deactivated successfully. Jul 2 00:40:08.085250 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 00:40:08.085789 systemd-logind[1186]: Session 10 logged out. Waiting for processes to exit. Jul 2 00:40:08.088363 systemd[1]: Started sshd@10-10.0.0.20:22-10.0.0.1:52412.service. Jul 2 00:40:08.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.20:22-10.0.0.1:52412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.088949 systemd[1]: Reloading. Jul 2 00:40:08.089041 systemd-logind[1186]: Removed session 10. Jul 2 00:40:08.191369 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:40:08.191396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:40:08.206196 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit: BPF prog-id=43 op=LOAD Jul 2 00:40:08.255000 audit: BPF prog-id=27 op=UNLOAD Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit: BPF prog-id=44 op=LOAD Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.255000 audit: BPF prog-id=45 op=LOAD Jul 2 00:40:08.255000 audit: BPF prog-id=28 op=UNLOAD Jul 2 00:40:08.255000 audit: BPF prog-id=29 op=UNLOAD Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit: BPF prog-id=46 op=LOAD Jul 2 00:40:08.256000 audit: BPF prog-id=36 op=UNLOAD Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.256000 audit: BPF prog-id=47 op=LOAD Jul 2 00:40:08.256000 audit: BPF prog-id=37 op=UNLOAD Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit: BPF prog-id=48 op=LOAD Jul 2 00:40:08.259000 audit: BPF prog-id=38 op=UNLOAD Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit: BPF prog-id=49 op=LOAD Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit: BPF prog-id=50 op=LOAD Jul 2 00:40:08.259000 audit: BPF prog-id=39 op=UNLOAD Jul 2 00:40:08.259000 audit: BPF prog-id=40 op=UNLOAD Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit: BPF prog-id=51 op=LOAD Jul 2 00:40:08.259000 audit: BPF prog-id=41 op=UNLOAD Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit: BPF prog-id=52 op=LOAD Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit: BPF prog-id=53 op=LOAD Jul 2 00:40:08.260000 audit: BPF prog-id=30 op=UNLOAD Jul 2 00:40:08.260000 audit: BPF prog-id=31 op=UNLOAD Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.260000 audit: BPF prog-id=54 op=LOAD Jul 2 00:40:08.260000 audit: BPF prog-id=32 op=UNLOAD Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit: BPF prog-id=55 op=LOAD Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit: BPF prog-id=56 op=LOAD Jul 2 00:40:08.261000 audit: BPF prog-id=33 op=UNLOAD Jul 2 00:40:08.261000 audit: BPF prog-id=34 op=UNLOAD Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:08.261000 audit: BPF prog-id=57 op=LOAD Jul 2 00:40:08.261000 audit: BPF prog-id=35 op=UNLOAD Jul 2 00:40:08.271393 systemd[1]: Starting docker.socket... Jul 2 00:40:08.272704 systemd[1]: Starting containerd.service... Jul 2 00:40:08.273080 systemd[1]: Listening on docker.socket. Jul 2 00:40:08.276511 systemd[1]: Stopped target sockets.target. Jul 2 00:40:08.276561 systemd[1]: Stopping sockets.target... Jul 2 00:40:08.276648 systemd[1]: Reached target sockets.target. Jul 2 00:40:08.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.277437 systemd[1]: Started containerd.service. Jul 2 00:40:08.278799 systemd[1]: Stopped target timers.target. Jul 2 00:40:08.278814 systemd[1]: Stopping timers.target... Jul 2 00:40:08.278886 systemd[1]: Reached target timers.target. Jul 2 00:40:08.280672 systemd[1]: Stopped target multi-user.target. Jul 2 00:40:08.280692 systemd[1]: Stopping multi-user.target... Jul 2 00:40:08.280717 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:40:08.282157 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:40:08.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.290206 jq[1471]: false Jul 2 00:40:08.283657 systemd[1]: Starting extend-filesystems.service... Jul 2 00:40:08.285025 systemd[1]: Starting issuegen.service... Jul 2 00:40:08.286409 systemd[1]: Starting motdgen.service... Jul 2 00:40:08.287917 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:40:08.287971 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:40:08.289359 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:40:08.289551 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:40:08.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.293736 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:40:08.293891 systemd[1]: Finished issuegen.service. Jul 2 00:40:08.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.295449 systemd[1]: Finished ensure-sysext.service. Jul 2 00:40:08.298590 extend-filesystems[1472]: Found loop2 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found loop3 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda1 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda2 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda3 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found usr Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda4 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda6 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda7 Jul 2 00:40:08.298590 extend-filesystems[1472]: Found vda9 Jul 2 00:40:08.298590 extend-filesystems[1472]: Checking size of /dev/vda9 Jul 2 00:40:08.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.296990 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:40:08.310871 extend-filesystems[1472]: Old size kept for /dev/vda9 Jul 2 00:40:08.297139 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:40:08.303050 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:40:08.303838 systemd[1]: Finished motdgen.service. Jul 2 00:40:08.306633 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:40:08.306792 systemd[1]: Finished extend-filesystems.service. Jul 2 00:40:08.307100 systemd[1]: Reached target multi-user.target. Jul 2 00:40:08.308731 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:40:08.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.321433 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:40:08.321615 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:40:08.351000 audit[1412]: USER_ACCT pid=1412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:08.352878 sshd[1412]: Accepted publickey for core from 10.0.0.1 port 52412 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:08.354000 audit[1412]: CRED_ACQ pid=1412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:08.354000 audit[1412]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeff11e70 a2=3 a3=1 items=0 ppid=1 pid=1412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.354000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:08.356534 sshd[1412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:08.363594 systemd-logind[1186]: New session 11 of user core. Jul 2 00:40:08.366136 systemd[1]: Started session-11.scope. Jul 2 00:40:08.376000 audit[1412]: USER_START pid=1412 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:08.377000 audit[1502]: CRED_ACQ pid=1502 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:08.446070 containerd[1470]: time="2024-07-02T00:40:08.445990466Z" level=info msg="starting containerd" revision=1c90a442489720eec95342e1789ee8a5e1b9536f version=v1.6.9 Jul 2 00:40:08.465484 containerd[1470]: time="2024-07-02T00:40:08.465432875Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 00:40:08.465617 containerd[1470]: time="2024-07-02T00:40:08.465597987Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:08.467192 containerd[1470]: time="2024-07-02T00:40:08.467127997Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:40:08.467192 containerd[1470]: time="2024-07-02T00:40:08.467158323Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:08.467406 containerd[1470]: time="2024-07-02T00:40:08.467374581Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:40:08.467406 containerd[1470]: time="2024-07-02T00:40:08.467399452Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:08.467469 containerd[1470]: time="2024-07-02T00:40:08.467413612Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 00:40:08.467469 containerd[1470]: time="2024-07-02T00:40:08.467424082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:08.467552 containerd[1470]: time="2024-07-02T00:40:08.467490953Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:08.468122 containerd[1470]: time="2024-07-02T00:40:08.468097967Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:08.468259 containerd[1470]: time="2024-07-02T00:40:08.468237887Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:40:08.468299 containerd[1470]: time="2024-07-02T00:40:08.468258947Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 00:40:08.468351 containerd[1470]: time="2024-07-02T00:40:08.468316872Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 00:40:08.468351 containerd[1470]: time="2024-07-02T00:40:08.468333239Z" level=info msg="metadata content store policy set" policy=shared Jul 2 00:40:08.473748 containerd[1470]: time="2024-07-02T00:40:08.473717457Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 00:40:08.473748 containerd[1470]: time="2024-07-02T00:40:08.473750110Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 00:40:08.473841 containerd[1470]: time="2024-07-02T00:40:08.473763629Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 00:40:08.473841 containerd[1470]: time="2024-07-02T00:40:08.473809159Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.473841 containerd[1470]: time="2024-07-02T00:40:08.473823118Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.473841 containerd[1470]: time="2024-07-02T00:40:08.473836717Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.473947 containerd[1470]: time="2024-07-02T00:40:08.473924047Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.474288 containerd[1470]: time="2024-07-02T00:40:08.474265622Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.474331 containerd[1470]: time="2024-07-02T00:40:08.474298877Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.474331 containerd[1470]: time="2024-07-02T00:40:08.474314682Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.474331 containerd[1470]: time="2024-07-02T00:40:08.474327479Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.474387 containerd[1470]: time="2024-07-02T00:40:08.474340436Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 00:40:08.474464 containerd[1470]: time="2024-07-02T00:40:08.474446579Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 00:40:08.474570 containerd[1470]: time="2024-07-02T00:40:08.474554527Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 00:40:08.475002 containerd[1470]: time="2024-07-02T00:40:08.474972922Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 00:40:08.475120 containerd[1470]: time="2024-07-02T00:40:08.475103014Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475179 containerd[1470]: time="2024-07-02T00:40:08.475165833Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 00:40:08.475444 containerd[1470]: time="2024-07-02T00:40:08.475423569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475539 containerd[1470]: time="2024-07-02T00:40:08.475514429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475635 containerd[1470]: time="2024-07-02T00:40:08.475617604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475737 containerd[1470]: time="2024-07-02T00:40:08.475720578Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475826 containerd[1470]: time="2024-07-02T00:40:08.475811437Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475913 containerd[1470]: time="2024-07-02T00:40:08.475896400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.475972 containerd[1470]: time="2024-07-02T00:40:08.475957936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.476055 containerd[1470]: time="2024-07-02T00:40:08.476038767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.476136 containerd[1470]: time="2024-07-02T00:40:08.476121523Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 00:40:08.476336 containerd[1470]: time="2024-07-02T00:40:08.476315918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.476413 containerd[1470]: time="2024-07-02T00:40:08.476398033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.476472 containerd[1470]: time="2024-07-02T00:40:08.476459007Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.476559 containerd[1470]: time="2024-07-02T00:40:08.476517213Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 00:40:08.476646 containerd[1470]: time="2024-07-02T00:40:08.476625282Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 00:40:08.476703 containerd[1470]: time="2024-07-02T00:40:08.476689706Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 00:40:08.476769 containerd[1470]: time="2024-07-02T00:40:08.476755012Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 00:40:08.476852 containerd[1470]: time="2024-07-02T00:40:08.476837608Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 00:40:08.477178 containerd[1470]: time="2024-07-02T00:40:08.477124227Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 00:40:08.477969 containerd[1470]: time="2024-07-02T00:40:08.477674919Z" level=info msg="Connect containerd service" Jul 2 00:40:08.477969 containerd[1470]: time="2024-07-02T00:40:08.477794942Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 00:40:08.479264 containerd[1470]: time="2024-07-02T00:40:08.479232889Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:40:08.479844 containerd[1470]: time="2024-07-02T00:40:08.479807370Z" level=info msg="Start subscribing containerd event" Jul 2 00:40:08.480304 containerd[1470]: time="2024-07-02T00:40:08.480271215Z" level=info msg="Start recovering state" Jul 2 00:40:08.480534 containerd[1470]: time="2024-07-02T00:40:08.480503639Z" level=info msg="Start event monitor" Jul 2 00:40:08.480708 containerd[1470]: time="2024-07-02T00:40:08.480601197Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 00:40:08.480708 containerd[1470]: time="2024-07-02T00:40:08.480666624Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 00:40:08.480708 containerd[1470]: time="2024-07-02T00:40:08.480690693Z" level=info msg="containerd successfully booted in 0.035686s" Jul 2 00:40:08.480812 containerd[1470]: time="2024-07-02T00:40:08.480794068Z" level=info msg="Start snapshots syncer" Jul 2 00:40:08.480870 containerd[1470]: time="2024-07-02T00:40:08.480857850Z" level=info msg="Start cni network conf syncer for default" Jul 2 00:40:08.480952 containerd[1470]: time="2024-07-02T00:40:08.480937317Z" level=info msg="Start streaming server" Jul 2 00:40:08.511892 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 00:40:08.517459 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 00:40:08.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.517781 systemd[1]: Reached target network-online.target. Jul 2 00:40:08.519026 systemd[1]: Starting docker.service... Jul 2 00:40:08.633323 dockerd[1516]: time="2024-07-02T00:40:08.633190806Z" level=info msg="Starting up" Jul 2 00:40:08.636685 dockerd[1516]: time="2024-07-02T00:40:08.636641541Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:40:08.636685 dockerd[1516]: time="2024-07-02T00:40:08.636675519Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:40:08.636795 dockerd[1516]: time="2024-07-02T00:40:08.636695536Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 00:40:08.636795 dockerd[1516]: time="2024-07-02T00:40:08.636705604Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:40:08.645766 dockerd[1516]: time="2024-07-02T00:40:08.645733870Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:40:08.645766 dockerd[1516]: time="2024-07-02T00:40:08.645759664Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:40:08.645858 dockerd[1516]: time="2024-07-02T00:40:08.645776672Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 00:40:08.645858 dockerd[1516]: time="2024-07-02T00:40:08.645787583Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:40:08.668169 dockerd[1516]: time="2024-07-02T00:40:08.668136052Z" level=info msg="Loading containers: start." Jul 2 00:40:08.716000 audit[1549]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.716000 audit[1549]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffdfeaf550 a2=0 a3=1 items=0 ppid=1516 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.716000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 00:40:08.719000 audit[1551]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.719000 audit[1551]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc2b82d90 a2=0 a3=1 items=0 ppid=1516 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.719000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 00:40:08.721000 audit[1553]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.721000 audit[1553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd2efcfa0 a2=0 a3=1 items=0 ppid=1516 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.721000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:08.723000 audit[1555]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.723000 audit[1555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffcfec610 a2=0 a3=1 items=0 ppid=1516 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.723000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:08.727000 audit[1557]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.727000 audit[1557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffb20d420 a2=0 a3=1 items=0 ppid=1516 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 00:40:08.756000 audit[1562]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.756000 audit[1562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe5dcb400 a2=0 a3=1 items=0 ppid=1516 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 00:40:08.777000 audit[1564]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.777000 audit[1564]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff76dfb30 a2=0 a3=1 items=0 ppid=1516 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 00:40:08.779000 audit[1566]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.779000 audit[1566]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc0cdef40 a2=0 a3=1 items=0 ppid=1516 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 00:40:08.781000 audit[1568]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.781000 audit[1568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc4684bc0 a2=0 a3=1 items=0 ppid=1516 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:08.788000 audit[1572]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.788000 audit[1572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd0c5e4d0 a2=0 a3=1 items=0 ppid=1516 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:08.789000 audit[1573]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.789000 audit[1573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd15b0da0 a2=0 a3=1 items=0 ppid=1516 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:08.799549 kernel: Initializing XFRM netlink socket Jul 2 00:40:08.824848 dockerd[1516]: time="2024-07-02T00:40:08.824811771Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 00:40:08.838000 audit[1580]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.838000 audit[1580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffdce37f50 a2=0 a3=1 items=0 ppid=1516 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 00:40:08.854000 audit[1583]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.854000 audit[1583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff5605660 a2=0 a3=1 items=0 ppid=1516 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.854000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:40:08.857000 audit[1586]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.857000 audit[1586]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff25d86c0 a2=0 a3=1 items=0 ppid=1516 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.857000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 00:40:08.859000 audit[1588]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.859000 audit[1588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffe50f940 a2=0 a3=1 items=0 ppid=1516 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 00:40:08.862000 audit[1590]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.862000 audit[1590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffca3cb3f0 a2=0 a3=1 items=0 ppid=1516 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 00:40:08.864000 audit[1592]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.864000 audit[1592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe2a425c0 a2=0 a3=1 items=0 ppid=1516 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.864000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 00:40:08.866000 audit[1594]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.866000 audit[1594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe2d49d30 a2=0 a3=1 items=0 ppid=1516 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.866000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 00:40:08.881000 audit[1597]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1597 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.881000 audit[1597]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffff47f2d0 a2=0 a3=1 items=0 ppid=1516 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.881000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 00:40:08.883000 audit[1599]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.883000 audit[1599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd5342b70 a2=0 a3=1 items=0 ppid=1516 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:08.885000 audit[1601]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1601 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.885000 audit[1601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffcab8bc80 a2=0 a3=1 items=0 ppid=1516 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:08.887000 audit[1603]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1603 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.887000 audit[1603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffde717d60 a2=0 a3=1 items=0 ppid=1516 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:40:08.888771 systemd-networkd[1037]: docker0: Link UP Jul 2 00:40:08.895000 audit[1607]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.895000 audit[1607]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe9f48c80 a2=0 a3=1 items=0 ppid=1516 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:08.896000 audit[1608]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1608 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:08.896000 audit[1608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffee7fe1e0 a2=0 a3=1 items=0 ppid=1516 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:08.896000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:08.897837 dockerd[1516]: time="2024-07-02T00:40:08.897789001Z" level=info msg="Loading containers: done." Jul 2 00:40:08.933980 dockerd[1516]: time="2024-07-02T00:40:08.933926532Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 00:40:08.934184 dockerd[1516]: time="2024-07-02T00:40:08.934160801Z" level=info msg="Docker daemon" commit=3056208 graphdriver(s)=overlay2 version=20.10.21 Jul 2 00:40:08.934273 dockerd[1516]: time="2024-07-02T00:40:08.934253667Z" level=info msg="Daemon has completed initialization" Jul 2 00:40:08.948412 systemd[1]: Started docker.service. Jul 2 00:40:08.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:08.958555 dockerd[1516]: time="2024-07-02T00:40:08.958493859Z" level=info msg="API listen on /run/docker.sock" Jul 2 00:40:08.973381 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1514622708-merged.mount: Deactivated successfully. Jul 2 00:40:10.078743 systemd[1]: var-lib-docker-overlay2-61f5d4be3e928b6965cdcedce2374a04fa5490f8aa96102106eab66a58715058\x2dinit-merged.mount: Deactivated successfully. Jul 2 00:40:10.099212 systemd[1]: var-lib-docker-overlay2-61f5d4be3e928b6965cdcedce2374a04fa5490f8aa96102106eab66a58715058-merged.mount: Deactivated successfully. Jul 2 00:40:10.121762 kernel: docker0: port 1(veth0484173) entered blocking state Jul 2 00:40:10.121869 kernel: docker0: port 1(veth0484173) entered disabled state Jul 2 00:40:10.121893 kernel: device veth0484173 entered promiscuous mode Jul 2 00:40:10.120000 audit: ANOM_PROMISCUOUS dev=veth0484173 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 00:40:10.120000 audit[1516]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=4000a122a0 a2=28 a3=0 items=0 ppid=1 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.120000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 00:40:10.123687 systemd-networkd[1037]: veth0484173: Link UP Jul 2 00:40:10.189946 containerd[1470]: time="2024-07-02T00:40:10.189854049Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:40:10.189946 containerd[1470]: time="2024-07-02T00:40:10.189901793Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:40:10.190299 containerd[1470]: time="2024-07-02T00:40:10.189912857Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:40:10.190299 containerd[1470]: time="2024-07-02T00:40:10.190160519Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/a8f6b443fc909ab84b49d75b09c792738f9bbaed56dc1214e803a52cc563d44c pid=1649 runtime=io.containerd.runc.v2 Jul 2 00:40:10.205306 systemd[1]: Started docker-a8f6b443fc909ab84b49d75b09c792738f9bbaed56dc1214e803a52cc563d44c.scope. Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit: BPF prog-id=58 op=LOAD Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1649 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61386636623434336663393039616238346234396437356230 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1649 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61386636623434336663393039616238346234396437356230 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit: BPF prog-id=59 op=LOAD Jul 2 00:40:10.214000 audit[1659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1649 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61386636623434336663393039616238346234396437356230 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit: BPF prog-id=60 op=LOAD Jul 2 00:40:10.214000 audit[1659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1649 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61386636623434336663393039616238346234396437356230 Jul 2 00:40:10.214000 audit: BPF prog-id=60 op=UNLOAD Jul 2 00:40:10.214000 audit: BPF prog-id=59 op=UNLOAD Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:10.214000 audit: BPF prog-id=61 op=LOAD Jul 2 00:40:10.214000 audit[1659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1649 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F61386636623434336663393039616238346234396437356230 Jul 2 00:40:10.276548 kernel: eth0: renamed from veth43a7e0d Jul 2 00:40:10.288468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth0484173: link becomes ready Jul 2 00:40:10.288565 kernel: docker0: port 1(veth0484173) entered blocking state Jul 2 00:40:10.288594 kernel: docker0: port 1(veth0484173) entered forwarding state Jul 2 00:40:10.288619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready Jul 2 00:40:10.288449 systemd-networkd[1037]: veth0484173: Gained carrier Jul 2 00:40:10.289055 systemd-networkd[1037]: docker0: Gained carrier Jul 2 00:40:10.291674 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:40:10.312214 systemd[1]: docker-a8f6b443fc909ab84b49d75b09c792738f9bbaed56dc1214e803a52cc563d44c.scope: Deactivated successfully. Jul 2 00:40:10.310000 audit: BPF prog-id=58 op=UNLOAD Jul 2 00:40:10.323695 dockerd[1516]: time="2024-07-02T00:40:10.323653462Z" level=info msg="ignoring event" container=a8f6b443fc909ab84b49d75b09c792738f9bbaed56dc1214e803a52cc563d44c module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 00:40:10.323986 containerd[1470]: time="2024-07-02T00:40:10.323714035Z" level=info msg="shim disconnected" id=a8f6b443fc909ab84b49d75b09c792738f9bbaed56dc1214e803a52cc563d44c Jul 2 00:40:10.323986 containerd[1470]: time="2024-07-02T00:40:10.323830370Z" level=warning msg="cleaning up after shim disconnected" id=a8f6b443fc909ab84b49d75b09c792738f9bbaed56dc1214e803a52cc563d44c namespace=moby Jul 2 00:40:10.323986 containerd[1470]: time="2024-07-02T00:40:10.323848489Z" level=info msg="cleaning up dead shim" Jul 2 00:40:10.330200 containerd[1470]: time="2024-07-02T00:40:10.330100369Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:40:10Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1702 runtime=io.containerd.runc.v2\n" Jul 2 00:40:10.335761 kernel: docker0: port 1(veth0484173) entered disabled state Jul 2 00:40:10.335825 kernel: veth43a7e0d: renamed from eth0 Jul 2 00:40:10.335078 systemd-networkd[1037]: veth0484173: Lost carrier Jul 2 00:40:10.356547 kernel: docker0: port 1(veth0484173) entered disabled state Jul 2 00:40:10.356599 systemd-networkd[1037]: veth0484173: Link DOWN Jul 2 00:40:10.354000 audit: ANOM_PROMISCUOUS dev=veth0484173 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 00:40:10.357758 kernel: device veth0484173 left promiscuous mode Jul 2 00:40:10.357832 kernel: docker0: port 1(veth0484173) entered disabled state Jul 2 00:40:10.354000 audit[1516]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=40012199e0 a2=20 a3=0 items=0 ppid=1 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 00:40:10.398097 sshd[1412]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:10.400000 audit[1412]: USER_END pid=1412 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.400000 audit[1412]: CRED_DISP pid=1412 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.403606 systemd[1]: sshd@10-10.0.0.20:22-10.0.0.1:52412.service: Deactivated successfully. Jul 2 00:40:10.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.20:22-10.0.0.1:52412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:10.404236 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 00:40:10.404826 systemd-logind[1186]: Session 11 logged out. Waiting for processes to exit. Jul 2 00:40:10.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.20:22-10.0.0.1:36388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:10.406360 systemd[1]: Started sshd@11-10.0.0.20:22-10.0.0.1:36388.service. Jul 2 00:40:10.408028 systemd-logind[1186]: Removed session 11. Jul 2 00:40:10.412000 audit: BPF prog-id=61 op=UNLOAD Jul 2 00:40:10.442000 audit[1718]: USER_ACCT pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.443542 sshd[1718]: Accepted publickey for core from 10.0.0.1 port 36388 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:10.444000 audit[1718]: CRED_ACQ pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.444000 audit[1718]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5df8250 a2=3 a3=1 items=0 ppid=1 pid=1718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:10.445293 sshd[1718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:10.449580 systemd[1]: Started session-12.scope. Jul 2 00:40:10.449751 systemd-logind[1186]: New session 12 of user core. Jul 2 00:40:10.453000 audit[1718]: USER_START pid=1718 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.455000 audit[1720]: CRED_ACQ pid=1720 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.519454 sshd[1718]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:10.520000 audit[1718]: USER_END pid=1718 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.520000 audit[1718]: CRED_DISP pid=1718 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.522186 systemd[1]: sshd@11-10.0.0.20:22-10.0.0.1:36388.service: Deactivated successfully. Jul 2 00:40:10.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.20:22-10.0.0.1:36388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:10.522799 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 00:40:10.523284 systemd-logind[1186]: Session 12 logged out. Waiting for processes to exit. Jul 2 00:40:10.524434 systemd[1]: Started sshd@12-10.0.0.20:22-10.0.0.1:36394.service. Jul 2 00:40:10.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.20:22-10.0.0.1:36394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:10.525104 systemd-logind[1186]: Removed session 12. Jul 2 00:40:10.560000 audit[1727]: USER_ACCT pid=1727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.561228 sshd[1727]: Accepted publickey for core from 10.0.0.1 port 36394 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:10.561000 audit[1727]: CRED_ACQ pid=1727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.561000 audit[1727]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1e470d0 a2=3 a3=1 items=0 ppid=1 pid=1727 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:10.561000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:10.562743 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:10.565916 systemd-logind[1186]: New session 13 of user core. Jul 2 00:40:10.566754 systemd[1]: Started session-13.scope. Jul 2 00:40:10.569000 audit[1727]: USER_START pid=1727 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:10.570000 audit[1729]: CRED_ACQ pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:11.075758 systemd[1]: var-lib-docker-overlay2-61f5d4be3e928b6965cdcedce2374a04fa5490f8aa96102106eab66a58715058-merged.mount: Deactivated successfully. Jul 2 00:40:11.140785 systemd-networkd[1037]: docker0: Lost carrier Jul 2 00:40:11.972873 systemd-networkd[1037]: docker0: Gained IPv6LL Jul 2 00:40:15.557000 audit[1730]: USER_ACCT pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.558820 kernel: kauditd_printk_skb: 372 callbacks suppressed Jul 2 00:40:15.558854 kernel: audit: type=1101 audit(1719880815.557:514): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.558311 sudo[1730]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 2 00:40:15.558548 sudo[1730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:15.557000 audit[1730]: CRED_REFR pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.562489 sudo[1730]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:15.562594 kernel: audit: type=1110 audit(1719880815.557:515): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.562632 kernel: audit: type=1105 audit(1719880815.560:516): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.560000 audit[1730]: USER_START pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.562000 audit[1730]: USER_END pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.567182 kernel: audit: type=1106 audit(1719880815.562:517): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.562000 audit[1730]: CRED_DISP pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.567724 sshd[1727]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:15.569722 kernel: audit: type=1104 audit(1719880815.562:518): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.569771 kernel: audit: type=1106 audit(1719880815.568:519): pid=1727 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.568000 audit[1727]: USER_END pid=1727 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.570991 systemd[1]: Started sshd@13-10.0.0.20:22-10.0.0.1:36400.service. Jul 2 00:40:15.572959 kernel: audit: type=1104 audit(1719880815.568:520): pid=1727 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.568000 audit[1727]: CRED_DISP pid=1727 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.572029 systemd[1]: sshd@12-10.0.0.20:22-10.0.0.1:36394.service: Deactivated successfully. Jul 2 00:40:15.572642 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 00:40:15.572769 systemd[1]: session-13.scope: Consumed 3.647s CPU time. Jul 2 00:40:15.575546 kernel: audit: type=1130 audit(1719880815.570:521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.20:22-10.0.0.1:36400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.20:22-10.0.0.1:36400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.575600 systemd-logind[1186]: Session 13 logged out. Waiting for processes to exit. Jul 2 00:40:15.576381 systemd-logind[1186]: Removed session 13. Jul 2 00:40:15.576465 kernel: audit: type=1131 audit(1719880815.571:522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.20:22-10.0.0.1:36394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.20:22-10.0.0.1:36394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.608000 audit[1786]: USER_ACCT pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.608773 sshd[1786]: Accepted publickey for core from 10.0.0.1 port 36400 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:15.609834 sshd[1786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:15.608000 audit[1786]: CRED_ACQ pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.609000 audit[1786]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb34bb40 a2=3 a3=1 items=0 ppid=1 pid=1786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:15.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:15.611541 kernel: audit: type=1101 audit(1719880815.608:523): pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.612858 systemd-logind[1186]: New session 14 of user core. Jul 2 00:40:15.613813 systemd[1]: Started session-14.scope. Jul 2 00:40:15.616000 audit[1786]: USER_START pid=1786 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.617000 audit[1789]: CRED_ACQ pid=1789 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:15.664000 audit[1791]: USER_ACCT pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.665068 sudo[1791]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 2 00:40:15.664000 audit[1791]: CRED_REFR pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.665305 sudo[1791]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:15.666000 audit[1791]: USER_START pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.672837 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 2 00:40:15.673002 systemd[1]: Stopped ensure-sysext.service. Jul 2 00:40:15.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.673068 systemd[1]: Stopping ensure-sysext.service... Jul 2 00:40:15.674314 systemd[1]: Stopping systemd-sysext.service... Jul 2 00:40:15.679282 systemd-sysext[1793]: Unmerged '/usr'. Jul 2 00:40:15.683336 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:40:15.694340 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:40:15.699872 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:40:15.701203 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 2 00:40:15.701402 systemd[1]: Stopped systemd-sysext.service. Jul 2 00:40:15.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.701845 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:15.702106 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:15.703835 systemd[1]: Starting systemd-sysext.service... Jul 2 00:40:15.710439 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:40:15.713595 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:40:15.713817 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:40:15.722540 kernel: loop4: detected capacity change from 0 to 315112 Jul 2 00:40:15.726534 kernel: EXT4-fs (loop4): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:15.748541 kernel: loop5: detected capacity change from 0 to 301296 Jul 2 00:40:15.752540 kernel: EXT4-fs (loop5): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:15.773540 kernel: loop6: detected capacity change from 0 to 315112 Jul 2 00:40:15.777532 kernel: EXT4-fs (loop6): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:15.779530 kernel: loop7: detected capacity change from 0 to 301296 Jul 2 00:40:15.782429 (sd-sysext)[1805]: Using extensions 'containerd', 'docker'. Jul 2 00:40:15.782687 kernel: EXT4-fs (loop7): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:40:15.783575 (sd-sysext)[1805]: Merged extensions into '/usr'. Jul 2 00:40:15.801919 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:40:15.807464 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:40:15.808785 systemd[1]: Finished systemd-sysext.service. Jul 2 00:40:15.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.811030 sudo[1791]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:15.810000 audit[1791]: USER_END pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.811062 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:15.810000 audit[1791]: CRED_DISP pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.811161 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:40:15.812613 systemd[1]: Starting ensure-sysext.service... Jul 2 00:40:15.815000 audit[1790]: USER_ACCT pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.815995 sudo[1790]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart docker containerd Jul 2 00:40:15.815000 audit[1790]: CRED_REFR pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.816232 sudo[1790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:40:15.817000 audit[1790]: USER_START pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:15.819536 systemd[1]: Reloading. Jul 2 00:40:15.939139 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:40:15.939326 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:40:15.955538 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit: BPF prog-id=62 op=LOAD Jul 2 00:40:16.006000 audit: BPF prog-id=43 op=UNLOAD Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.006000 audit: BPF prog-id=63 op=LOAD Jul 2 00:40:16.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.007000 audit: BPF prog-id=64 op=LOAD Jul 2 00:40:16.007000 audit: BPF prog-id=44 op=UNLOAD Jul 2 00:40:16.007000 audit: BPF prog-id=45 op=UNLOAD Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.008000 audit: BPF prog-id=65 op=LOAD Jul 2 00:40:16.008000 audit: BPF prog-id=46 op=UNLOAD Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.009000 audit: BPF prog-id=66 op=LOAD Jul 2 00:40:16.009000 audit: BPF prog-id=47 op=UNLOAD Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit: BPF prog-id=67 op=LOAD Jul 2 00:40:16.012000 audit: BPF prog-id=48 op=UNLOAD Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit: BPF prog-id=68 op=LOAD Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit: BPF prog-id=69 op=LOAD Jul 2 00:40:16.013000 audit: BPF prog-id=49 op=UNLOAD Jul 2 00:40:16.013000 audit: BPF prog-id=50 op=UNLOAD Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit: BPF prog-id=70 op=LOAD Jul 2 00:40:16.014000 audit: BPF prog-id=51 op=UNLOAD Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit: BPF prog-id=71 op=LOAD Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.017000 audit: BPF prog-id=72 op=LOAD Jul 2 00:40:16.017000 audit: BPF prog-id=52 op=UNLOAD Jul 2 00:40:16.017000 audit: BPF prog-id=53 op=UNLOAD Jul 2 00:40:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit: BPF prog-id=73 op=LOAD Jul 2 00:40:16.019000 audit: BPF prog-id=54 op=UNLOAD Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.019000 audit: BPF prog-id=74 op=LOAD Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.020000 audit: BPF prog-id=75 op=LOAD Jul 2 00:40:16.020000 audit: BPF prog-id=55 op=UNLOAD Jul 2 00:40:16.020000 audit: BPF prog-id=56 op=UNLOAD Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.021000 audit: BPF prog-id=76 op=LOAD Jul 2 00:40:16.021000 audit: BPF prog-id=57 op=UNLOAD Jul 2 00:40:16.040837 dockerd[1516]: time="2024-07-02T00:40:16.040784838Z" level=info msg="Processing signal 'terminated'" Jul 2 00:40:16.040839 systemd[1]: Stopping docker.service... Jul 2 00:40:16.041855 dockerd[1516]: time="2024-07-02T00:40:16.041814890Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Jul 2 00:40:16.042165 dockerd[1516]: time="2024-07-02T00:40:16.042018290Z" level=info msg="Daemon shutdown complete" Jul 2 00:40:16.044220 systemd[1]: docker.service: Deactivated successfully. Jul 2 00:40:16.044445 systemd[1]: Stopped docker.service. Jul 2 00:40:16.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.047464 systemd[1]: docker.socket: Deactivated successfully. Jul 2 00:40:16.048593 systemd[1]: Closed docker.socket. Jul 2 00:40:16.048635 systemd[1]: Stopping docker.socket... Jul 2 00:40:16.050093 systemd[1]: Starting docker.socket... Jul 2 00:40:16.050703 containerd[1470]: time="2024-07-02T00:40:16.050510320Z" level=info msg="Stop CRI service" Jul 2 00:40:16.050703 containerd[1470]: time="2024-07-02T00:40:16.050651379Z" level=info msg="Stop CRI service" Jul 2 00:40:16.050531 systemd[1]: Stopping containerd.service... Jul 2 00:40:16.051075 containerd[1470]: time="2024-07-02T00:40:16.050732779Z" level=info msg="Event monitor stopped" Jul 2 00:40:16.051075 containerd[1470]: time="2024-07-02T00:40:16.050744951Z" level=info msg="Stream server stopped" Jul 2 00:40:16.051169 systemd[1]: Listening on docker.socket. Jul 2 00:40:16.057274 systemd[1]: containerd.service: Deactivated successfully. Jul 2 00:40:16.058144 systemd[1]: Stopped containerd.service. Jul 2 00:40:16.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.058749 systemd[1]: Stopped target sockets.target. Jul 2 00:40:16.058766 systemd[1]: Stopping sockets.target... Jul 2 00:40:16.058897 systemd[1]: Reached target sockets.target. Jul 2 00:40:16.065688 systemd[1]: Starting containerd.service... Jul 2 00:40:16.068240 systemd[1]: Stopped target timers.target. Jul 2 00:40:16.068266 systemd[1]: Stopping timers.target... Jul 2 00:40:16.068409 systemd[1]: Reached target timers.target. Jul 2 00:40:16.069497 systemd[1]: Started containerd.service. Jul 2 00:40:16.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.074841 systemd[1]: Stopped target multi-user.target. Jul 2 00:40:16.074861 systemd[1]: Stopping multi-user.target... Jul 2 00:40:16.074882 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:40:16.076946 systemd[1]: Starting docker.service... Jul 2 00:40:16.079677 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:40:16.082147 jq[1870]: false Jul 2 00:40:16.081806 systemd[1]: Starting extend-filesystems.service... Jul 2 00:40:16.083898 systemd[1]: Starting issuegen.service... Jul 2 00:40:16.088718 systemd[1]: Starting motdgen.service... Jul 2 00:40:16.090741 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:40:16.090800 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:40:16.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.095503 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:40:16.095714 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:40:16.096577 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:40:16.096749 systemd[1]: Finished issuegen.service. Jul 2 00:40:16.097454 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:40:16.097644 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:40:16.098401 extend-filesystems[1871]: Found loop2 Jul 2 00:40:16.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.099301 extend-filesystems[1871]: Found loop3 Jul 2 00:40:16.099938 extend-filesystems[1871]: Found loop6 Jul 2 00:40:16.100588 systemd[1]: Finished ensure-sysext.service. Jul 2 00:40:16.100745 extend-filesystems[1871]: Found loop7 Jul 2 00:40:16.101330 extend-filesystems[1871]: Found vda Jul 2 00:40:16.101872 extend-filesystems[1871]: Found vda1 Jul 2 00:40:16.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.103068 extend-filesystems[1871]: Found vda2 Jul 2 00:40:16.103068 extend-filesystems[1871]: Found vda3 Jul 2 00:40:16.103068 extend-filesystems[1871]: Found usr Jul 2 00:40:16.103068 extend-filesystems[1871]: Found vda4 Jul 2 00:40:16.103068 extend-filesystems[1871]: Found vda6 Jul 2 00:40:16.103068 extend-filesystems[1871]: Found vda7 Jul 2 00:40:16.103068 extend-filesystems[1871]: Found vda9 Jul 2 00:40:16.103068 extend-filesystems[1871]: Checking size of /dev/vda9 Jul 2 00:40:16.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.102860 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:40:16.103041 systemd[1]: Finished motdgen.service. Jul 2 00:40:16.112843 extend-filesystems[1871]: Old size kept for /dev/vda9 Jul 2 00:40:16.113411 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:40:16.113604 systemd[1]: Finished extend-filesystems.service. Jul 2 00:40:16.114126 systemd[1]: Reached target multi-user.target. Jul 2 00:40:16.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.116752 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:40:16.139570 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:40:16.139757 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:40:16.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.263907 containerd[1868]: time="2024-07-02T00:40:16.263828178Z" level=info msg="starting containerd" revision=5b842e528e99d4d4c1686467debf2bd4b88ecd86 version=v1.6.15 Jul 2 00:40:16.285615 containerd[1868]: time="2024-07-02T00:40:16.285560666Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 00:40:16.285776 containerd[1868]: time="2024-07-02T00:40:16.285759461Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:16.288484 containerd[1868]: time="2024-07-02T00:40:16.288442339Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:40:16.288484 containerd[1868]: time="2024-07-02T00:40:16.288478375Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:16.288687 containerd[1868]: time="2024-07-02T00:40:16.288650984Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:40:16.288687 containerd[1868]: time="2024-07-02T00:40:16.288673527Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:16.288687 containerd[1868]: time="2024-07-02T00:40:16.288687180Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 00:40:16.288778 containerd[1868]: time="2024-07-02T00:40:16.288697910Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:16.288778 containerd[1868]: time="2024-07-02T00:40:16.288755247Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:16.289635 containerd[1868]: time="2024-07-02T00:40:16.289614492Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:40:16.289819 containerd[1868]: time="2024-07-02T00:40:16.289785660Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:40:16.289819 containerd[1868]: time="2024-07-02T00:40:16.289809523Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 00:40:16.289879 containerd[1868]: time="2024-07-02T00:40:16.289829343Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 00:40:16.289879 containerd[1868]: time="2024-07-02T00:40:16.289839793Z" level=info msg="metadata content store policy set" policy=shared Jul 2 00:40:16.290162 containerd[1868]: time="2024-07-02T00:40:16.290128877Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 00:40:16.290162 containerd[1868]: time="2024-07-02T00:40:16.290161590Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 00:40:16.290240 containerd[1868]: time="2024-07-02T00:40:16.290195863Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 00:40:16.290240 containerd[1868]: time="2024-07-02T00:40:16.290230898Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290284 containerd[1868]: time="2024-07-02T00:40:16.290244791Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290284 containerd[1868]: time="2024-07-02T00:40:16.290259246Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290284 containerd[1868]: time="2024-07-02T00:40:16.290273740Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290683 containerd[1868]: time="2024-07-02T00:40:16.290659559Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290720 containerd[1868]: time="2024-07-02T00:40:16.290690710Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290720 containerd[1868]: time="2024-07-02T00:40:16.290705324Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290720 containerd[1868]: time="2024-07-02T00:40:16.290717536Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.290789 containerd[1868]: time="2024-07-02T00:40:16.290729268Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 00:40:16.290789 containerd[1868]: time="2024-07-02T00:40:16.290772871Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 00:40:16.291046 containerd[1868]: time="2024-07-02T00:40:16.291010745Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 00:40:16.291337 containerd[1868]: time="2024-07-02T00:40:16.291312681Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 00:40:16.291431 containerd[1868]: time="2024-07-02T00:40:16.291416223Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.291492 containerd[1868]: time="2024-07-02T00:40:16.291478765Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 00:40:16.291657 containerd[1868]: time="2024-07-02T00:40:16.291639082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.291768 containerd[1868]: time="2024-07-02T00:40:16.291753074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.291839 containerd[1868]: time="2024-07-02T00:40:16.291825986Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.291898 containerd[1868]: time="2024-07-02T00:40:16.291885244Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.291979 containerd[1868]: time="2024-07-02T00:40:16.291965363Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292036 containerd[1868]: time="2024-07-02T00:40:16.292023660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292090 containerd[1868]: time="2024-07-02T00:40:16.292077433Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292172 containerd[1868]: time="2024-07-02T00:40:16.292157272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292246 containerd[1868]: time="2024-07-02T00:40:16.292231225Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 00:40:16.292324 containerd[1868]: time="2024-07-02T00:40:16.292311343Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292387 containerd[1868]: time="2024-07-02T00:40:16.292372363Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292445 containerd[1868]: time="2024-07-02T00:40:16.292432903Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.292534 containerd[1868]: time="2024-07-02T00:40:16.292502852Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 00:40:16.292613 containerd[1868]: time="2024-07-02T00:40:16.292594862Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 00:40:16.292668 containerd[1868]: time="2024-07-02T00:40:16.292655402Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 00:40:16.292768 containerd[1868]: time="2024-07-02T00:40:16.292754339Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 00:40:16.292847 containerd[1868]: time="2024-07-02T00:40:16.292833697Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 00:40:16.293153 containerd[1868]: time="2024-07-02T00:40:16.293086626Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 00:40:16.293301 containerd[1868]: time="2024-07-02T00:40:16.293283859Z" level=info msg="Connect containerd service" Jul 2 00:40:16.294017 containerd[1868]: time="2024-07-02T00:40:16.293992196Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 00:40:16.294685 containerd[1868]: time="2024-07-02T00:40:16.294658011Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:40:16.295288 containerd[1868]: time="2024-07-02T00:40:16.295266369Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 00:40:16.295437 containerd[1868]: time="2024-07-02T00:40:16.295420560Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 00:40:16.295513 containerd[1868]: time="2024-07-02T00:40:16.295499838Z" level=info msg="containerd successfully booted in 0.033076s" Jul 2 00:40:16.295621 containerd[1868]: time="2024-07-02T00:40:16.295405586Z" level=info msg="Start subscribing containerd event" Jul 2 00:40:16.295697 containerd[1868]: time="2024-07-02T00:40:16.295682698Z" level=info msg="Start recovering state" Jul 2 00:40:16.295800 containerd[1868]: time="2024-07-02T00:40:16.295786480Z" level=info msg="Start event monitor" Jul 2 00:40:16.295930 containerd[1868]: time="2024-07-02T00:40:16.295916088Z" level=info msg="Start snapshots syncer" Jul 2 00:40:16.295983 containerd[1868]: time="2024-07-02T00:40:16.295971902Z" level=info msg="Start cni network conf syncer for default" Jul 2 00:40:16.296031 containerd[1868]: time="2024-07-02T00:40:16.296019629Z" level=info msg="Start streaming server" Jul 2 00:40:16.296508 dockerd[1869]: time="2024-07-02T00:40:16.296470913Z" level=info msg="Starting up" Jul 2 00:40:16.299299 dockerd[1869]: time="2024-07-02T00:40:16.299182259Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:40:16.299299 dockerd[1869]: time="2024-07-02T00:40:16.299203079Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:40:16.299299 dockerd[1869]: time="2024-07-02T00:40:16.299268784Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 00:40:16.299299 dockerd[1869]: time="2024-07-02T00:40:16.299286882Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:40:16.306865 dockerd[1869]: time="2024-07-02T00:40:16.306837506Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:40:16.306865 dockerd[1869]: time="2024-07-02T00:40:16.306861449Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:40:16.306963 dockerd[1869]: time="2024-07-02T00:40:16.306877425Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 2 00:40:16.306963 dockerd[1869]: time="2024-07-02T00:40:16.306887355Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:40:16.318559 dockerd[1869]: time="2024-07-02T00:40:16.316906726Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jul 2 00:40:16.326059 dockerd[1869]: time="2024-07-02T00:40:16.326021808Z" level=info msg="Loading containers: start." Jul 2 00:40:16.330000 audit[1916]: NETFILTER_CFG table=nat:26 family=2 entries=1 op=nft_unregister_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.330000 audit[1916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=268 a0=3 a1=ffffedf66a80 a2=0 a3=1 items=0 ppid=1869 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 00:40:16.331000 audit[1917]: NETFILTER_CFG table=nat:27 family=2 entries=1 op=nft_unregister_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.331000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=360 a0=3 a1=ffffe58e6560 a2=0 a3=1 items=0 ppid=1869 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D44004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C0000002D2D647374003132372E302E302E302F38002D6A00444F434B4552 Jul 2 00:40:16.347000 audit[1921]: NETFILTER_CFG table=nat:28 family=2 entries=1 op=nft_unregister_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.347000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=88 a0=3 a1=ffffc6d086a0 a2=0 a3=1 items=0 ppid=1869 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4600444F434B4552 Jul 2 00:40:16.349000 audit[1922]: NETFILTER_CFG table=nat:29 family=2 entries=1 op=nft_unregister_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.349000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff46b0250 a2=0 a3=1 items=0 ppid=1869 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.349000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D5800444F434B4552 Jul 2 00:40:16.376000 audit[1925]: NETFILTER_CFG table=filter:30 family=2 entries=2 op=nft_unregister_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.376000 audit[1925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff55516e0 a2=0 a3=1 items=0 ppid=1869 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:16.391000 audit[1927]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_unregister_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.391000 audit[1927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc635b4d0 a2=0 a3=1 items=0 ppid=1869 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:16.395000 audit[1928]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_unregister_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.395000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=120 a0=3 a1=ffffe5f2fa50 a2=0 a3=1 items=0 ppid=1869 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D5800444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:16.410000 audit[1932]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.410000 audit[1932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=88 a0=3 a1=ffffe80e1660 a2=0 a3=1 items=0 ppid=1869 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.410000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 00:40:16.413000 audit[1936]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.413000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdac03d90 a2=0 a3=1 items=0 ppid=1869 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.413000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:16.415000 audit[1938]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.415000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff630b4c0 a2=0 a3=1 items=0 ppid=1869 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.415000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 00:40:16.418000 audit[1940]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.418000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc558e7e0 a2=0 a3=1 items=0 ppid=1869 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 00:40:16.424000 audit[1945]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.424000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe6150470 a2=0 a3=1 items=0 ppid=1869 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:40:16.429000 audit[1950]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.429000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=276 a0=3 a1=ffffe4819f50 a2=0 a3=1 items=0 ppid=1869 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 00:40:16.431000 audit[1952]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.431000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=368 a0=3 a1=ffffc57b6b70 a2=0 a3=1 items=0 ppid=1869 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 00:40:16.437000 audit[1958]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_unregister_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.437000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=244 a0=3 a1=ffffcb68c230 a2=0 a3=1 items=0 ppid=1869 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.437000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:16.438000 audit[1959]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.438000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd83b6a90 a2=0 a3=1 items=0 ppid=1869 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:16.439000 audit[1961]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.439000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc7451940 a2=0 a3=1 items=0 ppid=1869 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:16.441000 audit[1963]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.441000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd0a46a0 a2=0 a3=1 items=0 ppid=1869 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.441000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:40:16.449000 audit[1965]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_unregister_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.449000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=404 a0=3 a1=fffff29ee5d0 a2=0 a3=1 items=0 ppid=1869 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 00:40:16.451000 audit[1967]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_unregister_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.451000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=280 a0=3 a1=ffffc7d71900 a2=0 a3=1 items=0 ppid=1869 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.451000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:40:16.472000 audit[1969]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_unregister_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.472000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=380 a0=3 a1=fffffbbff190 a2=0 a3=1 items=0 ppid=1869 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 00:40:16.474000 audit[1971]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_unregister_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.474000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=380 a0=3 a1=ffffec208ab0 a2=0 a3=1 items=0 ppid=1869 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 00:40:16.491000 audit[1974]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_unregister_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.491000 audit[1974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff25c52b0 a2=0 a3=1 items=0 ppid=1869 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 00:40:16.493000 audit[1977]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_unregister_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.493000 audit[1977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=512 a0=3 a1=ffffe9174e20 a2=0 a3=1 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.493000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 00:40:16.511000 audit[1979]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_unregister_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.511000 audit[1979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=420 a0=3 a1=ffffdd44ff80 a2=0 a3=1 items=0 ppid=1869 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.511000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:16.513000 audit[1981]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_unregister_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.513000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffee552b60 a2=0 a3=1 items=0 ppid=1869 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.513000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:40:16.534011 dockerd[1869]: time="2024-07-02T00:40:16.533978195Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 00:40:16.535000 audit[1983]: NETFILTER_CFG table=nat:52 family=2 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.535000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=412 a0=3 a1=ffffccc9f370 a2=0 a3=1 items=0 ppid=1869 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 00:40:16.537000 audit[1985]: NETFILTER_CFG table=nat:53 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.537000 audit[1985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd68f5f30 a2=0 a3=1 items=0 ppid=1869 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:40:16.540000 audit[1988]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.540000 audit[1988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcf2ea800 a2=0 a3=1 items=0 ppid=1869 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 00:40:16.541000 audit[1990]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.541000 audit[1990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe6d86ef0 a2=0 a3=1 items=0 ppid=1869 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.541000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 00:40:16.547000 audit[1996]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.547000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff63e3af0 a2=0 a3=1 items=0 ppid=1869 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.547000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 00:40:16.549000 audit[1998]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.549000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcaedad70 a2=0 a3=1 items=0 ppid=1869 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.549000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 00:40:16.551000 audit[2000]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_unregister_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.551000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=244 a0=3 a1=ffffcf3dd3f0 a2=0 a3=1 items=0 ppid=1869 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.551000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:16.552000 audit[2001]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.552000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff8a18f10 a2=0 a3=1 items=0 ppid=1869 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.552000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:40:16.554000 audit[2003]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.554000 audit[2003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffdf6e1160 a2=0 a3=1 items=0 ppid=1869 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.554000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:40:16.556000 audit[2005]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.556000 audit[2005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff058ed30 a2=0 a3=1 items=0 ppid=1869 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:40:16.562000 audit[2009]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_unregister_rule pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.562000 audit[2009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd6615020 a2=0 a3=1 items=0 ppid=1869 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:16.562000 audit[2010]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:40:16.562000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd6f8b550 a2=0 a3=1 items=0 ppid=1869 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:40:16.563792 dockerd[1869]: time="2024-07-02T00:40:16.563755953Z" level=info msg="Loading containers: done." Jul 2 00:40:16.600890 dockerd[1869]: time="2024-07-02T00:40:16.600764981Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 00:40:16.601051 dockerd[1869]: time="2024-07-02T00:40:16.601034406Z" level=info msg="Docker daemon" commit=6051f14 graphdriver(s)=overlay2 version=20.10.23 Jul 2 00:40:16.601083 dockerd[1869]: time="2024-07-02T00:40:16.601072844Z" level=info msg="Daemon has completed initialization" Jul 2 00:40:16.611411 systemd[1]: Started docker.service. Jul 2 00:40:16.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.612277 sudo[1790]: pam_unix(sudo:session): session closed for user root Jul 2 00:40:16.611000 audit[1790]: USER_END pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.611000 audit[1790]: CRED_DISP pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.613618 sshd[1786]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:16.614000 audit[1786]: USER_END pid=1786 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:16.614000 audit[1786]: CRED_DISP pid=1786 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:16.618881 systemd-logind[1186]: Session 14 logged out. Waiting for processes to exit. Jul 2 00:40:16.620371 systemd[1]: Started sshd@14-10.0.0.20:22-10.0.0.1:36402.service. Jul 2 00:40:16.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.20:22-10.0.0.1:36402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.625790 dockerd[1869]: time="2024-07-02T00:40:16.625682800Z" level=info msg="API listen on /run/docker.sock" Jul 2 00:40:16.660000 audit[2030]: USER_ACCT pid=2030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:16.661315 sshd[2030]: Accepted publickey for core from 10.0.0.1 port 36402 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:40:16.661000 audit[2030]: CRED_ACQ pid=2030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:16.661000 audit[2030]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce2e9b60 a2=3 a3=1 items=0 ppid=1 pid=2030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:40:16.662415 sshd[2030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:40:16.665958 systemd-logind[1186]: New session 15 of user core. Jul 2 00:40:16.666899 systemd[1]: Started session-15.scope. Jul 2 00:40:16.670000 audit[2030]: USER_START pid=2030 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:16.671000 audit[2032]: CRED_ACQ pid=2032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:16.676937 systemd[1]: sshd@13-10.0.0.20:22-10.0.0.1:36400.service: Deactivated successfully. Jul 2 00:40:16.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.20:22-10.0.0.1:36400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:16.677676 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 00:40:16.678362 systemd-logind[1186]: Removed session 14. Jul 2 00:40:16.794051 systemd[1]: var-lib-docker-overlay2-c9622f3c976a84b63c88ae4013d051551615e9887db2d415162783bb34ab87ed\x2dinit-merged.mount: Deactivated successfully. Jul 2 00:40:16.819535 kernel: docker0: port 1(veth4e63044) entered blocking state Jul 2 00:40:16.819660 kernel: docker0: port 1(veth4e63044) entered disabled state Jul 2 00:40:16.816000 audit: ANOM_PROMISCUOUS dev=veth4e63044 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 00:40:16.816000 audit[1869]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=40 a0=e a1=4000d82450 a2=28 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.820614 kernel: device veth4e63044 entered promiscuous mode Jul 2 00:40:16.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 00:40:16.821716 systemd-networkd[1037]: veth4e63044: Link UP Jul 2 00:40:16.868940 containerd[1868]: time="2024-07-02T00:40:16.868782901Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:40:16.869289 containerd[1868]: time="2024-07-02T00:40:16.868824862Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:40:16.869289 containerd[1868]: time="2024-07-02T00:40:16.868851449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:40:16.869891 containerd[1868]: time="2024-07-02T00:40:16.869850951Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d pid=2055 runtime=io.containerd.runc.v2 Jul 2 00:40:16.885023 systemd[1]: Started docker-0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d.scope. Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.892000 audit: BPF prog-id=77 op=LOAD Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2055 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30653963396163376463366239373064653235373264656265 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2055 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30653963396163376463366239373064653235373264656265 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit: BPF prog-id=78 op=LOAD Jul 2 00:40:16.893000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2055 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30653963396163376463366239373064653235373264656265 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit: BPF prog-id=79 op=LOAD Jul 2 00:40:16.893000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2055 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30653963396163376463366239373064653235373264656265 Jul 2 00:40:16.893000 audit: BPF prog-id=79 op=UNLOAD Jul 2 00:40:16.893000 audit: BPF prog-id=78 op=UNLOAD Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:40:16.893000 audit: BPF prog-id=80 op=LOAD Jul 2 00:40:16.893000 audit[2065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2055 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30653963396163376463366239373064653235373264656265 Jul 2 00:40:16.964573 kernel: eth0: renamed from veth0c35310 Jul 2 00:40:16.974945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth4e63044: link becomes ready Jul 2 00:40:16.975044 kernel: docker0: port 1(veth4e63044) entered blocking state Jul 2 00:40:16.975069 kernel: docker0: port 1(veth4e63044) entered forwarding state Jul 2 00:40:16.975573 systemd-networkd[1037]: veth4e63044: Gained carrier Jul 2 00:40:16.975813 systemd-networkd[1037]: docker0: Gained carrier Jul 2 00:40:16.992959 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:40:17.010000 audit: BPF prog-id=77 op=UNLOAD Jul 2 00:40:17.010509 systemd[1]: docker-0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d.scope: Deactivated successfully. Jul 2 00:40:17.013047 containerd[1868]: time="2024-07-02T00:40:17.012812968Z" level=warning msg="error from *cgroupsv2.Manager.EventChan" error="failed to add inotify watch for \"/sys/fs/cgroup/system.slice/docker-0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d.scope/memory.events\": no such file or directory" Jul 2 00:40:17.039269 containerd[1868]: time="2024-07-02T00:40:17.039200473Z" level=info msg="shim disconnected" id=0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d Jul 2 00:40:17.039371 dockerd[1869]: time="2024-07-02T00:40:17.039245552Z" level=info msg="ignoring event" container=0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 00:40:17.040119 containerd[1868]: time="2024-07-02T00:40:17.040091119Z" level=warning msg="cleaning up after shim disconnected" id=0e9c9ac7dc6b970de2572debe4d8185cc0b86c00564173a8c42fafee56f8b22d namespace=moby Jul 2 00:40:17.040230 containerd[1868]: time="2024-07-02T00:40:17.040213424Z" level=info msg="cleaning up dead shim" Jul 2 00:40:17.046174 containerd[1868]: time="2024-07-02T00:40:17.046141045Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:40:17Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2109 runtime=io.containerd.runc.v2\n" Jul 2 00:40:17.050058 systemd-networkd[1037]: veth4e63044: Lost carrier Jul 2 00:40:17.050896 kernel: docker0: port 1(veth4e63044) entered disabled state Jul 2 00:40:17.050955 kernel: veth0c35310: renamed from eth0 Jul 2 00:40:17.072528 systemd-networkd[1037]: veth4e63044: Link DOWN Jul 2 00:40:17.074707 kernel: docker0: port 1(veth4e63044) entered disabled state Jul 2 00:40:17.074782 kernel: device veth4e63044 left promiscuous mode Jul 2 00:40:17.070000 audit: ANOM_PROMISCUOUS dev=veth4e63044 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 2 00:40:17.075814 kernel: docker0: port 1(veth4e63044) entered disabled state Jul 2 00:40:17.070000 audit[1869]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=32 a0=e a1=4000c06a20 a2=20 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:40:17.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 2 00:40:17.125427 sshd[2030]: pam_unix(sshd:session): session closed for user core Jul 2 00:40:17.126000 audit[2030]: USER_END pid=2030 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:17.126000 audit[2030]: CRED_DISP pid=2030 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:40:17.129951 systemd[1]: sshd@14-10.0.0.20:22-10.0.0.1:36402.service: Deactivated successfully. Jul 2 00:40:17.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.20:22-10.0.0.1:36402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:40:17.130622 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 00:40:17.132027 systemd-logind[1186]: Session 15 logged out. Waiting for processes to exit. Jul 2 00:40:17.132900 systemd-logind[1186]: Removed session 15. Jul 2 00:40:17.148000 audit: BPF prog-id=80 op=UNLOAD Jul 2 00:40:17.860802 systemd-networkd[1037]: docker0: Lost carrier