May 8 00:32:44.762151 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 8 00:32:44.762182 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Wed May 7 23:24:31 -00 2025 May 8 00:32:44.762190 kernel: efi: EFI v2.70 by EDK II May 8 00:32:44.762196 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 8 00:32:44.762201 kernel: random: crng init done May 8 00:32:44.762207 kernel: ACPI: Early table checksum verification disabled May 8 00:32:44.762213 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 8 00:32:44.762220 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 8 00:32:44.762226 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762231 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762236 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762241 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762247 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762283 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762292 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762298 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762304 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:32:44.762309 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 8 00:32:44.762315 kernel: NUMA: Failed to initialise from firmware May 8 00:32:44.762321 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:32:44.762326 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 8 00:32:44.762332 kernel: Zone ranges: May 8 00:32:44.762338 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:32:44.762345 kernel: DMA32 empty May 8 00:32:44.762350 kernel: Normal empty May 8 00:32:44.762356 kernel: Movable zone start for each node May 8 00:32:44.762361 kernel: Early memory node ranges May 8 00:32:44.762367 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 8 00:32:44.762372 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 8 00:32:44.762378 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 8 00:32:44.762384 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 8 00:32:44.762389 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 8 00:32:44.762395 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 8 00:32:44.762401 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 8 00:32:44.762406 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 8 00:32:44.762414 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 8 00:32:44.762420 kernel: psci: probing for conduit method from ACPI. May 8 00:32:44.762425 kernel: psci: PSCIv1.1 detected in firmware. May 8 00:32:44.762431 kernel: psci: Using standard PSCI v0.2 function IDs May 8 00:32:44.762437 kernel: psci: Trusted OS migration not required May 8 00:32:44.762445 kernel: psci: SMC Calling Convention v1.1 May 8 00:32:44.762451 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 8 00:32:44.762459 kernel: ACPI: SRAT not present May 8 00:32:44.762465 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 8 00:32:44.762471 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 8 00:32:44.762478 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 8 00:32:44.762484 kernel: Detected PIPT I-cache on CPU0 May 8 00:32:44.762490 kernel: CPU features: detected: GIC system register CPU interface May 8 00:32:44.762496 kernel: CPU features: detected: Hardware dirty bit management May 8 00:32:44.762502 kernel: CPU features: detected: Spectre-v4 May 8 00:32:44.762508 kernel: CPU features: detected: Spectre-BHB May 8 00:32:44.762515 kernel: CPU features: kernel page table isolation forced ON by KASLR May 8 00:32:44.762521 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 8 00:32:44.762527 kernel: CPU features: detected: ARM erratum 1418040 May 8 00:32:44.762533 kernel: CPU features: detected: SSBS not fully self-synchronizing May 8 00:32:44.762539 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 8 00:32:44.762545 kernel: Policy zone: DMA May 8 00:32:44.762552 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:32:44.762558 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:32:44.762564 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:32:44.762571 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:32:44.762577 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:32:44.762584 kernel: Memory: 2457404K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114884K reserved, 0K cma-reserved) May 8 00:32:44.762590 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:32:44.762596 kernel: trace event string verifier disabled May 8 00:32:44.762602 kernel: rcu: Preemptible hierarchical RCU implementation. May 8 00:32:44.762609 kernel: rcu: RCU event tracing is enabled. May 8 00:32:44.762615 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:32:44.762622 kernel: Trampoline variant of Tasks RCU enabled. May 8 00:32:44.762628 kernel: Tracing variant of Tasks RCU enabled. May 8 00:32:44.762634 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:32:44.762640 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:32:44.762646 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 8 00:32:44.762653 kernel: GICv3: 256 SPIs implemented May 8 00:32:44.762659 kernel: GICv3: 0 Extended SPIs implemented May 8 00:32:44.762665 kernel: GICv3: Distributor has no Range Selector support May 8 00:32:44.762671 kernel: Root IRQ handler: gic_handle_irq May 8 00:32:44.762677 kernel: GICv3: 16 PPIs implemented May 8 00:32:44.762683 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 8 00:32:44.762689 kernel: ACPI: SRAT not present May 8 00:32:44.762695 kernel: ITS [mem 0x08080000-0x0809ffff] May 8 00:32:44.762701 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 8 00:32:44.762708 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 8 00:32:44.762714 kernel: GICv3: using LPI property table @0x00000000400d0000 May 8 00:32:44.762720 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 8 00:32:44.762727 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:32:44.762734 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 8 00:32:44.762740 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 8 00:32:44.762746 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 8 00:32:44.762752 kernel: arm-pv: using stolen time PV May 8 00:32:44.762758 kernel: Console: colour dummy device 80x25 May 8 00:32:44.762765 kernel: ACPI: Core revision 20210730 May 8 00:32:44.762771 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 8 00:32:44.762778 kernel: pid_max: default: 32768 minimum: 301 May 8 00:32:44.762784 kernel: LSM: Security Framework initializing May 8 00:32:44.762791 kernel: SELinux: Initializing. May 8 00:32:44.762798 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:32:44.762804 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:32:44.762810 kernel: rcu: Hierarchical SRCU implementation. May 8 00:32:44.762816 kernel: Platform MSI: ITS@0x8080000 domain created May 8 00:32:44.762822 kernel: PCI/MSI: ITS@0x8080000 domain created May 8 00:32:44.762828 kernel: Remapping and enabling EFI services. May 8 00:32:44.762835 kernel: smp: Bringing up secondary CPUs ... May 8 00:32:44.762841 kernel: Detected PIPT I-cache on CPU1 May 8 00:32:44.762849 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 8 00:32:44.762855 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 8 00:32:44.762861 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:32:44.762867 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 8 00:32:44.762874 kernel: Detected PIPT I-cache on CPU2 May 8 00:32:44.762880 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 8 00:32:44.762886 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 8 00:32:44.762893 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:32:44.762899 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 8 00:32:44.762905 kernel: Detected PIPT I-cache on CPU3 May 8 00:32:44.762912 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 8 00:32:44.762919 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 8 00:32:44.762925 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 8 00:32:44.762931 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 8 00:32:44.762941 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:32:44.762949 kernel: SMP: Total of 4 processors activated. May 8 00:32:44.762955 kernel: CPU features: detected: 32-bit EL0 Support May 8 00:32:44.762962 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 8 00:32:44.762969 kernel: CPU features: detected: Common not Private translations May 8 00:32:44.762975 kernel: CPU features: detected: CRC32 instructions May 8 00:32:44.762982 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 8 00:32:44.762988 kernel: CPU features: detected: LSE atomic instructions May 8 00:32:44.762996 kernel: CPU features: detected: Privileged Access Never May 8 00:32:44.763003 kernel: CPU features: detected: RAS Extension Support May 8 00:32:44.763009 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 8 00:32:44.763016 kernel: CPU: All CPU(s) started at EL1 May 8 00:32:44.763022 kernel: alternatives: patching kernel code May 8 00:32:44.763030 kernel: devtmpfs: initialized May 8 00:32:44.763036 kernel: KASLR enabled May 8 00:32:44.763043 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:32:44.763049 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:32:44.763056 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:32:44.763062 kernel: SMBIOS 3.0.0 present. May 8 00:32:44.763069 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 8 00:32:44.763075 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:32:44.763082 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 8 00:32:44.763090 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 8 00:32:44.763096 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 8 00:32:44.763103 kernel: audit: initializing netlink subsys (disabled) May 8 00:32:44.763110 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 May 8 00:32:44.763117 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:32:44.763123 kernel: cpuidle: using governor menu May 8 00:32:44.763130 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 8 00:32:44.763136 kernel: ASID allocator initialised with 32768 entries May 8 00:32:44.763143 kernel: ACPI: bus type PCI registered May 8 00:32:44.763150 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:32:44.763157 kernel: Serial: AMBA PL011 UART driver May 8 00:32:44.763169 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:32:44.763177 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 8 00:32:44.763183 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:32:44.763190 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 8 00:32:44.763197 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:32:44.763203 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 8 00:32:44.763210 kernel: ACPI: Added _OSI(Module Device) May 8 00:32:44.763219 kernel: ACPI: Added _OSI(Processor Device) May 8 00:32:44.763225 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:32:44.763232 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:32:44.763238 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:32:44.763245 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:32:44.763256 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:32:44.763263 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:32:44.763278 kernel: ACPI: Interpreter enabled May 8 00:32:44.763286 kernel: ACPI: Using GIC for interrupt routing May 8 00:32:44.763295 kernel: ACPI: MCFG table detected, 1 entries May 8 00:32:44.763301 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 8 00:32:44.763308 kernel: printk: console [ttyAMA0] enabled May 8 00:32:44.763315 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:32:44.763480 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:32:44.763551 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 8 00:32:44.763611 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 8 00:32:44.763673 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 8 00:32:44.763748 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 8 00:32:44.763757 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 8 00:32:44.763763 kernel: PCI host bridge to bus 0000:00 May 8 00:32:44.763837 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 8 00:32:44.763891 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 8 00:32:44.763946 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 8 00:32:44.764002 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:32:44.764078 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 8 00:32:44.764149 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:32:44.764224 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 8 00:32:44.764316 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 8 00:32:44.764380 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:32:44.764440 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 8 00:32:44.764505 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 8 00:32:44.764565 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 8 00:32:44.764619 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 8 00:32:44.764674 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 8 00:32:44.764727 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 8 00:32:44.764735 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 8 00:32:44.764742 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 8 00:32:44.764749 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 8 00:32:44.764757 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 8 00:32:44.764764 kernel: iommu: Default domain type: Translated May 8 00:32:44.764770 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 8 00:32:44.764777 kernel: vgaarb: loaded May 8 00:32:44.764783 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:32:44.764790 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:32:44.764797 kernel: PTP clock support registered May 8 00:32:44.764803 kernel: Registered efivars operations May 8 00:32:44.764810 kernel: clocksource: Switched to clocksource arch_sys_counter May 8 00:32:44.764817 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:32:44.764824 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:32:44.764831 kernel: pnp: PnP ACPI init May 8 00:32:44.764895 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 8 00:32:44.764905 kernel: pnp: PnP ACPI: found 1 devices May 8 00:32:44.764911 kernel: NET: Registered PF_INET protocol family May 8 00:32:44.764918 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:32:44.764924 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:32:44.764935 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:32:44.764942 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:32:44.764949 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:32:44.764955 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:32:44.764962 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:32:44.764968 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:32:44.764975 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:32:44.764981 kernel: PCI: CLS 0 bytes, default 64 May 8 00:32:44.764988 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 8 00:32:44.764996 kernel: kvm [1]: HYP mode not available May 8 00:32:44.765002 kernel: Initialise system trusted keyrings May 8 00:32:44.765009 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:32:44.765015 kernel: Key type asymmetric registered May 8 00:32:44.765022 kernel: Asymmetric key parser 'x509' registered May 8 00:32:44.765028 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:32:44.765035 kernel: io scheduler mq-deadline registered May 8 00:32:44.765041 kernel: io scheduler kyber registered May 8 00:32:44.765048 kernel: io scheduler bfq registered May 8 00:32:44.765056 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 8 00:32:44.765062 kernel: ACPI: button: Power Button [PWRB] May 8 00:32:44.765069 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 8 00:32:44.765127 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 8 00:32:44.765136 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:32:44.765142 kernel: thunder_xcv, ver 1.0 May 8 00:32:44.765149 kernel: thunder_bgx, ver 1.0 May 8 00:32:44.765155 kernel: nicpf, ver 1.0 May 8 00:32:44.765161 kernel: nicvf, ver 1.0 May 8 00:32:44.765259 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 8 00:32:44.765322 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-08T00:32:44 UTC (1746664364) May 8 00:32:44.765331 kernel: hid: raw HID events driver (C) Jiri Kosina May 8 00:32:44.765338 kernel: NET: Registered PF_INET6 protocol family May 8 00:32:44.765344 kernel: Segment Routing with IPv6 May 8 00:32:44.765351 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:32:44.765357 kernel: NET: Registered PF_PACKET protocol family May 8 00:32:44.765364 kernel: Key type dns_resolver registered May 8 00:32:44.765372 kernel: registered taskstats version 1 May 8 00:32:44.765379 kernel: Loading compiled-in X.509 certificates May 8 00:32:44.765386 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: 47302b466ab2df930dd804d2ee9c8ab44de4e2dc' May 8 00:32:44.765392 kernel: Key type .fscrypt registered May 8 00:32:44.765398 kernel: Key type fscrypt-provisioning registered May 8 00:32:44.765405 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:32:44.765412 kernel: ima: Allocated hash algorithm: sha1 May 8 00:32:44.765419 kernel: ima: No architecture policies found May 8 00:32:44.765425 kernel: clk: Disabling unused clocks May 8 00:32:44.765433 kernel: Freeing unused kernel memory: 36416K May 8 00:32:44.765439 kernel: Run /init as init process May 8 00:32:44.765446 kernel: with arguments: May 8 00:32:44.765452 kernel: /init May 8 00:32:44.765459 kernel: with environment: May 8 00:32:44.765465 kernel: HOME=/ May 8 00:32:44.765471 kernel: TERM=linux May 8 00:32:44.765478 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:32:44.765486 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:32:44.765496 systemd[1]: Detected virtualization kvm. May 8 00:32:44.765503 systemd[1]: Detected architecture arm64. May 8 00:32:44.765510 systemd[1]: Running in initrd. May 8 00:32:44.765517 systemd[1]: No hostname configured, using default hostname. May 8 00:32:44.765524 systemd[1]: Hostname set to . May 8 00:32:44.765532 systemd[1]: Initializing machine ID from VM UUID. May 8 00:32:44.765539 systemd[1]: Queued start job for default target initrd.target. May 8 00:32:44.765547 systemd[1]: Started systemd-ask-password-console.path. May 8 00:32:44.765555 systemd[1]: Reached target cryptsetup.target. May 8 00:32:44.765562 systemd[1]: Reached target paths.target. May 8 00:32:44.765569 systemd[1]: Reached target slices.target. May 8 00:32:44.765576 systemd[1]: Reached target swap.target. May 8 00:32:44.765583 systemd[1]: Reached target timers.target. May 8 00:32:44.765590 systemd[1]: Listening on iscsid.socket. May 8 00:32:44.765599 systemd[1]: Listening on iscsiuio.socket. May 8 00:32:44.765606 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:32:44.765613 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:32:44.765620 systemd[1]: Listening on systemd-journald.socket. May 8 00:32:44.765627 systemd[1]: Listening on systemd-networkd.socket. May 8 00:32:44.765634 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:32:44.765641 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:32:44.765648 systemd[1]: Reached target sockets.target. May 8 00:32:44.765655 systemd[1]: Starting kmod-static-nodes.service... May 8 00:32:44.765664 systemd[1]: Finished network-cleanup.service. May 8 00:32:44.765671 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:32:44.765678 systemd[1]: Starting systemd-journald.service... May 8 00:32:44.765685 systemd[1]: Starting systemd-modules-load.service... May 8 00:32:44.765692 systemd[1]: Starting systemd-resolved.service... May 8 00:32:44.765699 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:32:44.765706 systemd[1]: Finished kmod-static-nodes.service. May 8 00:32:44.765712 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:32:44.765719 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:32:44.765727 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:32:44.765734 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:32:44.765741 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:32:44.765749 kernel: audit: type=1130 audit(1746664364.765:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.765759 systemd-journald[290]: Journal started May 8 00:32:44.765800 systemd-journald[290]: Runtime Journal (/run/log/journal/b07f3d8a6f8442f5943edc1349bd76cc) is 6.0M, max 48.7M, 42.6M free. May 8 00:32:44.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.754110 systemd-modules-load[291]: Inserted module 'overlay' May 8 00:32:44.771211 systemd[1]: Started systemd-journald.service. May 8 00:32:44.765993 systemd-resolved[292]: Positive Trust Anchors: May 8 00:32:44.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.766000 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:32:44.782829 kernel: audit: type=1130 audit(1746664364.771:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.782852 kernel: audit: type=1130 audit(1746664364.775:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.782862 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:32:44.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.766027 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:32:44.790295 kernel: Bridge firewalling registered May 8 00:32:44.770447 systemd-resolved[292]: Defaulting to hostname 'linux'. May 8 00:32:44.772156 systemd[1]: Started systemd-resolved.service. May 8 00:32:44.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.775957 systemd[1]: Reached target nss-lookup.target. May 8 00:32:44.796933 kernel: audit: type=1130 audit(1746664364.791:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.789612 systemd-modules-load[291]: Inserted module 'br_netfilter' May 8 00:32:44.790354 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:32:44.792908 systemd[1]: Starting dracut-cmdline.service... May 8 00:32:44.801453 kernel: SCSI subsystem initialized May 8 00:32:44.802097 dracut-cmdline[309]: dracut-dracut-053 May 8 00:32:44.804299 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=3816e7a7ab4f80032c381006006d7d5ba477c6a86a1527e782723d869b29d497 May 8 00:32:44.811532 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:32:44.811571 kernel: device-mapper: uevent: version 1.0.3 May 8 00:32:44.812691 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:32:44.814984 systemd-modules-load[291]: Inserted module 'dm_multipath' May 8 00:32:44.815804 systemd[1]: Finished systemd-modules-load.service. May 8 00:32:44.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.820264 kernel: audit: type=1130 audit(1746664364.816:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.817612 systemd[1]: Starting systemd-sysctl.service... May 8 00:32:44.827578 systemd[1]: Finished systemd-sysctl.service. May 8 00:32:44.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.832279 kernel: audit: type=1130 audit(1746664364.828:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.870274 kernel: Loading iSCSI transport class v2.0-870. May 8 00:32:44.883282 kernel: iscsi: registered transport (tcp) May 8 00:32:44.900283 kernel: iscsi: registered transport (qla4xxx) May 8 00:32:44.900325 kernel: QLogic iSCSI HBA Driver May 8 00:32:44.939457 systemd[1]: Finished dracut-cmdline.service. May 8 00:32:44.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.941231 systemd[1]: Starting dracut-pre-udev.service... May 8 00:32:44.945109 kernel: audit: type=1130 audit(1746664364.940:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:44.994288 kernel: raid6: neonx8 gen() 13746 MB/s May 8 00:32:45.012195 kernel: raid6: neonx8 xor() 5693 MB/s May 8 00:32:45.032175 kernel: raid6: neonx4 gen() 13270 MB/s May 8 00:32:45.048285 kernel: raid6: neonx4 xor() 10351 MB/s May 8 00:32:45.065293 kernel: raid6: neonx2 gen() 12823 MB/s May 8 00:32:45.082293 kernel: raid6: neonx2 xor() 10442 MB/s May 8 00:32:45.099306 kernel: raid6: neonx1 gen() 10316 MB/s May 8 00:32:45.116283 kernel: raid6: neonx1 xor() 8707 MB/s May 8 00:32:45.133292 kernel: raid6: int64x8 gen() 4691 MB/s May 8 00:32:45.150276 kernel: raid6: int64x8 xor() 3520 MB/s May 8 00:32:45.167275 kernel: raid6: int64x4 gen() 7183 MB/s May 8 00:32:45.184272 kernel: raid6: int64x4 xor() 3834 MB/s May 8 00:32:45.201278 kernel: raid6: int64x2 gen() 6145 MB/s May 8 00:32:45.218276 kernel: raid6: int64x2 xor() 3309 MB/s May 8 00:32:45.235277 kernel: raid6: int64x1 gen() 5041 MB/s May 8 00:32:45.252479 kernel: raid6: int64x1 xor() 2633 MB/s May 8 00:32:45.252491 kernel: raid6: using algorithm neonx8 gen() 13746 MB/s May 8 00:32:45.252500 kernel: raid6: .... xor() 5693 MB/s, rmw enabled May 8 00:32:45.253632 kernel: raid6: using neon recovery algorithm May 8 00:32:45.264466 kernel: xor: measuring software checksum speed May 8 00:32:45.264486 kernel: 8regs : 17206 MB/sec May 8 00:32:45.265271 kernel: 32regs : 20676 MB/sec May 8 00:32:45.265282 kernel: arm64_neon : 22639 MB/sec May 8 00:32:45.266476 kernel: xor: using function: arm64_neon (22639 MB/sec) May 8 00:32:45.326280 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 8 00:32:45.336101 systemd[1]: Finished dracut-pre-udev.service. May 8 00:32:45.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:45.338099 systemd[1]: Starting systemd-udevd.service... May 8 00:32:45.342711 kernel: audit: type=1130 audit(1746664365.336:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:45.342732 kernel: audit: type=1334 audit(1746664365.337:10): prog-id=7 op=LOAD May 8 00:32:45.337000 audit: BPF prog-id=7 op=LOAD May 8 00:32:45.337000 audit: BPF prog-id=8 op=LOAD May 8 00:32:45.353100 systemd-udevd[493]: Using default interface naming scheme 'v252'. May 8 00:32:45.356463 systemd[1]: Started systemd-udevd.service. May 8 00:32:45.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:45.358522 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:32:45.369336 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation May 8 00:32:45.397075 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:32:45.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:45.398749 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:32:45.433994 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:32:45.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:45.468259 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) May 8 00:32:45.470370 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:32:45.484762 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:32:45.487688 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (541) May 8 00:32:45.491103 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:32:45.493944 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:32:45.495036 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:32:45.501555 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:32:45.503287 systemd[1]: Starting disk-uuid.service... May 8 00:32:45.510269 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:32:45.521314 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:32:46.529130 disk-uuid[565]: The operation has completed successfully. May 8 00:32:46.530586 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:32:46.580912 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:32:46.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.581006 systemd[1]: Finished disk-uuid.service. May 8 00:32:46.582763 systemd[1]: Starting verity-setup.service... May 8 00:32:46.600310 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 8 00:32:46.628045 systemd[1]: Found device dev-mapper-usr.device. May 8 00:32:46.630110 systemd[1]: Mounting sysusr-usr.mount... May 8 00:32:46.631066 systemd[1]: Finished verity-setup.service. May 8 00:32:46.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.698210 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:32:46.700390 systemd[1]: Mounted sysusr-usr.mount. May 8 00:32:46.701215 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:32:46.701954 systemd[1]: Starting ignition-setup.service... May 8 00:32:46.708453 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:32:46.716340 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:32:46.716383 kernel: BTRFS info (device vda6): using free space tree May 8 00:32:46.716393 kernel: BTRFS info (device vda6): has skinny extents May 8 00:32:46.731657 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:32:46.743095 systemd[1]: Finished ignition-setup.service. May 8 00:32:46.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.744873 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:32:46.802142 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:32:46.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.804000 audit: BPF prog-id=9 op=LOAD May 8 00:32:46.805216 systemd[1]: Starting systemd-networkd.service... May 8 00:32:46.832000 systemd-networkd[734]: lo: Link UP May 8 00:32:46.832012 systemd-networkd[734]: lo: Gained carrier May 8 00:32:46.832398 systemd-networkd[734]: Enumeration completed May 8 00:32:46.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.832614 systemd-networkd[734]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:32:46.836083 systemd[1]: Started systemd-networkd.service. May 8 00:32:46.838371 systemd[1]: Reached target network.target. May 8 00:32:46.841621 systemd[1]: Starting iscsiuio.service... May 8 00:32:46.843277 systemd-networkd[734]: eth0: Link UP May 8 00:32:46.843281 systemd-networkd[734]: eth0: Gained carrier May 8 00:32:46.850804 systemd[1]: Started iscsiuio.service. May 8 00:32:46.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.852503 systemd[1]: Starting iscsid.service... May 8 00:32:46.856914 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:32:46.856914 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:32:46.856914 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:32:46.856914 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:32:46.856914 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:32:46.856914 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:32:46.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.859898 systemd[1]: Started iscsid.service. May 8 00:32:46.868397 systemd[1]: Starting dracut-initqueue.service... May 8 00:32:46.873338 systemd-networkd[734]: eth0: DHCPv4 address 10.0.0.29/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:32:46.879903 systemd[1]: Finished dracut-initqueue.service. May 8 00:32:46.880880 systemd[1]: Reached target remote-fs-pre.target. May 8 00:32:46.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.882244 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:32:46.884047 systemd[1]: Reached target remote-fs.target. May 8 00:32:46.885093 ignition[653]: Ignition 2.14.0 May 8 00:32:46.885100 ignition[653]: Stage: fetch-offline May 8 00:32:46.886665 systemd[1]: Starting dracut-pre-mount.service... May 8 00:32:46.885135 ignition[653]: no configs at "/usr/lib/ignition/base.d" May 8 00:32:46.885144 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:32:46.885288 ignition[653]: parsed url from cmdline: "" May 8 00:32:46.885291 ignition[653]: no config URL provided May 8 00:32:46.885296 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:32:46.885304 ignition[653]: no config at "/usr/lib/ignition/user.ign" May 8 00:32:46.885322 ignition[653]: op(1): [started] loading QEMU firmware config module May 8 00:32:46.885327 ignition[653]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:32:46.895462 systemd[1]: Finished dracut-pre-mount.service. May 8 00:32:46.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.901076 ignition[653]: op(1): [finished] loading QEMU firmware config module May 8 00:32:46.904940 ignition[653]: parsing config with SHA512: 5f86e116ea0e0554698f23ec23111ff46f67505de713d88ac04bbae577565a90c460c1428b89330a8b647ed7ee3f12f3feb03761a034cf15fff714c9a340f5bd May 8 00:32:46.914192 unknown[653]: fetched base config from "system" May 8 00:32:46.914208 unknown[653]: fetched user config from "qemu" May 8 00:32:46.914514 ignition[653]: fetch-offline: fetch-offline passed May 8 00:32:46.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.915856 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:32:46.914599 ignition[653]: Ignition finished successfully May 8 00:32:46.917466 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:32:46.918201 systemd[1]: Starting ignition-kargs.service... May 8 00:32:46.927592 ignition[761]: Ignition 2.14.0 May 8 00:32:46.927601 ignition[761]: Stage: kargs May 8 00:32:46.927694 ignition[761]: no configs at "/usr/lib/ignition/base.d" May 8 00:32:46.927704 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:32:46.929943 systemd[1]: Finished ignition-kargs.service. May 8 00:32:46.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.928354 ignition[761]: kargs: kargs passed May 8 00:32:46.928399 ignition[761]: Ignition finished successfully May 8 00:32:46.932402 systemd[1]: Starting ignition-disks.service... May 8 00:32:46.938749 ignition[767]: Ignition 2.14.0 May 8 00:32:46.938760 ignition[767]: Stage: disks May 8 00:32:46.938844 ignition[767]: no configs at "/usr/lib/ignition/base.d" May 8 00:32:46.940717 systemd[1]: Finished ignition-disks.service. May 8 00:32:46.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.938853 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:32:46.942413 systemd[1]: Reached target initrd-root-device.target. May 8 00:32:46.939789 ignition[767]: disks: disks passed May 8 00:32:46.943755 systemd[1]: Reached target local-fs-pre.target. May 8 00:32:46.939828 ignition[767]: Ignition finished successfully May 8 00:32:46.945428 systemd[1]: Reached target local-fs.target. May 8 00:32:46.946828 systemd[1]: Reached target sysinit.target. May 8 00:32:46.948008 systemd[1]: Reached target basic.target. May 8 00:32:46.950121 systemd[1]: Starting systemd-fsck-root.service... May 8 00:32:46.959053 systemd-resolved[292]: Detected conflict on linux IN A 10.0.0.29 May 8 00:32:46.959066 systemd-resolved[292]: Hostname conflict, changing published hostname from 'linux' to 'linux5'. May 8 00:32:46.961780 systemd-fsck[775]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 8 00:32:46.965195 systemd[1]: Finished systemd-fsck-root.service. May 8 00:32:46.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:46.966749 systemd[1]: Mounting sysroot.mount... May 8 00:32:46.975058 systemd[1]: Mounted sysroot.mount. May 8 00:32:46.976379 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:32:46.975885 systemd[1]: Reached target initrd-root-fs.target. May 8 00:32:46.978548 systemd[1]: Mounting sysroot-usr.mount... May 8 00:32:46.979414 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:32:46.979451 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:32:46.979474 systemd[1]: Reached target ignition-diskful.target. May 8 00:32:46.981228 systemd[1]: Mounted sysroot-usr.mount. May 8 00:32:46.983099 systemd[1]: Starting initrd-setup-root.service... May 8 00:32:46.987027 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:32:46.990449 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory May 8 00:32:46.994273 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:32:46.998197 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:32:47.020772 systemd[1]: Finished initrd-setup-root.service. May 8 00:32:47.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.022232 systemd[1]: Starting ignition-mount.service... May 8 00:32:47.023492 systemd[1]: Starting sysroot-boot.service... May 8 00:32:47.028194 bash[826]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:32:47.036710 ignition[828]: INFO : Ignition 2.14.0 May 8 00:32:47.037591 ignition[828]: INFO : Stage: mount May 8 00:32:47.037591 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:32:47.037591 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:32:47.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.041041 ignition[828]: INFO : mount: mount passed May 8 00:32:47.041041 ignition[828]: INFO : Ignition finished successfully May 8 00:32:47.039042 systemd[1]: Finished ignition-mount.service. May 8 00:32:47.043168 systemd[1]: Finished sysroot-boot.service. May 8 00:32:47.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.650033 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:32:47.659270 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (836) May 8 00:32:47.661457 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 8 00:32:47.661476 kernel: BTRFS info (device vda6): using free space tree May 8 00:32:47.661485 kernel: BTRFS info (device vda6): has skinny extents May 8 00:32:47.664966 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:32:47.666630 systemd[1]: Starting ignition-files.service... May 8 00:32:47.680120 ignition[856]: INFO : Ignition 2.14.0 May 8 00:32:47.680120 ignition[856]: INFO : Stage: files May 8 00:32:47.681867 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:32:47.681867 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:32:47.681867 ignition[856]: DEBUG : files: compiled without relabeling support, skipping May 8 00:32:47.685468 ignition[856]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:32:47.685468 ignition[856]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:32:47.689693 ignition[856]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:32:47.691117 ignition[856]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:32:47.692740 unknown[856]: wrote ssh authorized keys file for user: core May 8 00:32:47.693977 ignition[856]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:32:47.695443 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:32:47.697386 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:32:47.697386 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" May 8 00:32:47.697386 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" May 8 00:32:47.697386 ignition[856]: INFO : files: op(5): [started] processing unit "coreos-metadata.service" May 8 00:32:47.697386 ignition[856]: INFO : files: op(5): op(6): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:32:47.697386 ignition[856]: INFO : files: op(5): op(6): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:32:47.697386 ignition[856]: INFO : files: op(5): [finished] processing unit "coreos-metadata.service" May 8 00:32:47.697386 ignition[856]: INFO : files: op(7): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:32:47.697386 ignition[856]: INFO : files: op(7): op(8): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:32:47.754453 ignition[856]: INFO : files: op(7): op(8): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:32:47.756753 ignition[856]: INFO : files: op(7): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:32:47.756753 ignition[856]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:32:47.756753 ignition[856]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:32:47.756753 ignition[856]: INFO : files: files passed May 8 00:32:47.756753 ignition[856]: INFO : Ignition finished successfully May 8 00:32:47.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.756838 systemd[1]: Finished ignition-files.service. May 8 00:32:47.759802 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:32:47.761418 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:32:47.769182 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:32:47.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.762056 systemd[1]: Starting ignition-quench.service... May 8 00:32:47.772431 initrd-setup-root-after-ignition[882]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:32:47.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.767284 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:32:47.767371 systemd[1]: Finished ignition-quench.service. May 8 00:32:47.771872 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:32:47.773437 systemd[1]: Reached target ignition-complete.target. May 8 00:32:47.776226 systemd[1]: Starting initrd-parse-etc.service... May 8 00:32:47.788358 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:32:47.788447 systemd[1]: Finished initrd-parse-etc.service. May 8 00:32:47.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.790172 systemd[1]: Reached target initrd-fs.target. May 8 00:32:47.791436 systemd[1]: Reached target initrd.target. May 8 00:32:47.792804 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:32:47.793515 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:32:47.803518 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:32:47.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.805099 systemd[1]: Starting initrd-cleanup.service... May 8 00:32:47.813338 systemd[1]: Stopped target nss-lookup.target. May 8 00:32:47.814238 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:32:47.815706 systemd[1]: Stopped target timers.target. May 8 00:32:47.817033 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:32:47.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.817146 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:32:47.818914 systemd[1]: Stopped target initrd.target. May 8 00:32:47.821145 systemd[1]: Stopped target basic.target. May 8 00:32:47.823327 systemd[1]: Stopped target ignition-complete.target. May 8 00:32:47.825820 systemd[1]: Stopped target ignition-diskful.target. May 8 00:32:47.827851 systemd[1]: Stopped target initrd-root-device.target. May 8 00:32:47.830067 systemd[1]: Stopped target remote-fs.target. May 8 00:32:47.831524 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:32:47.833015 systemd[1]: Stopped target sysinit.target. May 8 00:32:47.834354 systemd[1]: Stopped target local-fs.target. May 8 00:32:47.835797 systemd[1]: Stopped target local-fs-pre.target. May 8 00:32:47.837162 systemd[1]: Stopped target swap.target. May 8 00:32:47.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.838414 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:32:47.838537 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:32:47.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.839891 systemd[1]: Stopped target cryptsetup.target. May 8 00:32:47.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.841162 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:32:47.841277 systemd[1]: Stopped dracut-initqueue.service. May 8 00:32:47.842885 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:32:47.842982 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:32:47.844372 systemd[1]: Stopped target paths.target. May 8 00:32:47.845712 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:32:47.851283 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:32:47.852393 systemd[1]: Stopped target slices.target. May 8 00:32:47.853889 systemd[1]: Stopped target sockets.target. May 8 00:32:47.855599 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:32:47.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.855720 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:32:47.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.857126 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:32:47.857230 systemd[1]: Stopped ignition-files.service. May 8 00:32:47.861918 iscsid[745]: iscsid shutting down. May 8 00:32:47.859780 systemd[1]: Stopping ignition-mount.service... May 8 00:32:47.862377 systemd[1]: Stopping iscsid.service... May 8 00:32:47.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.863247 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:32:47.867992 ignition[895]: INFO : Ignition 2.14.0 May 8 00:32:47.867992 ignition[895]: INFO : Stage: umount May 8 00:32:47.867992 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:32:47.867992 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:32:47.867992 ignition[895]: INFO : umount: umount passed May 8 00:32:47.867992 ignition[895]: INFO : Ignition finished successfully May 8 00:32:47.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.863382 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:32:47.865477 systemd[1]: Stopping sysroot-boot.service... May 8 00:32:47.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.866264 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:32:47.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.866409 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:32:47.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.869313 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:32:47.869419 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:32:47.872769 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:32:47.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.872881 systemd[1]: Stopped iscsid.service. May 8 00:32:47.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.875307 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:32:47.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.875393 systemd[1]: Stopped ignition-mount.service. May 8 00:32:47.877674 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:32:47.877748 systemd[1]: Closed iscsid.socket. May 8 00:32:47.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.879000 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:32:47.879042 systemd[1]: Stopped ignition-disks.service. May 8 00:32:47.880732 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:32:47.880771 systemd[1]: Stopped ignition-kargs.service. May 8 00:32:47.882052 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:32:47.882090 systemd[1]: Stopped ignition-setup.service. May 8 00:32:47.884168 systemd[1]: Stopping iscsiuio.service... May 8 00:32:47.885659 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:32:47.886086 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:32:47.886175 systemd[1]: Stopped iscsiuio.service. May 8 00:32:47.887511 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:32:47.887587 systemd[1]: Finished initrd-cleanup.service. May 8 00:32:47.889048 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:32:47.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.889121 systemd[1]: Stopped sysroot-boot.service. May 8 00:32:47.890764 systemd[1]: Stopped target network.target. May 8 00:32:47.909000 audit: BPF prog-id=6 op=UNLOAD May 8 00:32:47.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.891621 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:32:47.891655 systemd[1]: Closed iscsiuio.socket. May 8 00:32:47.892950 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:32:47.892992 systemd[1]: Stopped initrd-setup-root.service. May 8 00:32:47.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.894607 systemd[1]: Stopping systemd-networkd.service... May 8 00:32:47.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.895819 systemd[1]: Stopping systemd-resolved.service... May 8 00:32:47.906053 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:32:47.906145 systemd[1]: Stopped systemd-resolved.service. May 8 00:32:47.907344 systemd-networkd[734]: eth0: DHCPv6 lease lost May 8 00:32:47.922000 audit: BPF prog-id=9 op=UNLOAD May 8 00:32:47.908413 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:32:47.908497 systemd[1]: Stopped systemd-networkd.service. May 8 00:32:47.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.910014 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:32:47.910041 systemd[1]: Closed systemd-networkd.socket. May 8 00:32:47.911772 systemd[1]: Stopping network-cleanup.service... May 8 00:32:47.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.912484 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:32:47.912543 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:32:47.913853 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:32:47.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.913893 systemd[1]: Stopped systemd-sysctl.service. May 8 00:32:47.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.916081 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:32:47.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.916120 systemd[1]: Stopped systemd-modules-load.service. May 8 00:32:47.918715 systemd[1]: Stopping systemd-udevd.service... May 8 00:32:47.921522 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:32:47.924380 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:32:47.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.924477 systemd[1]: Stopped network-cleanup.service. May 8 00:32:47.928032 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:32:47.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:47.928168 systemd[1]: Stopped systemd-udevd.service. May 8 00:32:47.929641 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:32:47.929678 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:32:47.930904 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:32:47.930936 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:32:47.932551 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:32:47.932603 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:32:47.934042 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:32:47.934085 systemd[1]: Stopped dracut-cmdline.service. May 8 00:32:47.935556 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:32:47.935603 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:32:47.937741 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:32:47.938579 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:32:47.938636 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:32:47.943338 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:32:47.943446 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:32:47.945027 systemd[1]: Reached target initrd-switch-root.target. May 8 00:32:47.947490 systemd[1]: Starting initrd-switch-root.service... May 8 00:32:47.955579 systemd[1]: Switching root. May 8 00:32:47.975784 systemd-journald[290]: Journal stopped May 8 00:32:48.506534 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 8 00:32:48.506587 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:32:48.506602 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:32:48.506618 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:32:48.506628 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:32:48.506646 kernel: SELinux: policy capability open_perms=1 May 8 00:32:48.506660 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:32:48.506671 kernel: SELinux: policy capability always_check_network=0 May 8 00:32:48.506680 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:32:48.506690 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:32:48.506699 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:32:48.506708 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:32:48.506718 systemd[1]: Successfully loaded SELinux policy in 34.924ms. May 8 00:32:48.506732 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.398ms. May 8 00:32:48.506743 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:32:48.506755 systemd[1]: Detected virtualization kvm. May 8 00:32:48.506765 systemd[1]: Detected architecture arm64. May 8 00:32:48.506775 systemd[1]: Detected first boot. May 8 00:32:48.506785 systemd[1]: Initializing machine ID from VM UUID. May 8 00:32:48.506795 systemd[1]: Populated /etc with preset unit settings. May 8 00:32:48.506806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:32:48.506817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:32:48.506828 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:32:48.506840 systemd[1]: Stopped initrd-switch-root.service. May 8 00:32:48.506850 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:32:48.506861 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:32:48.506871 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:32:48.506882 systemd[1]: Created slice system-getty.slice. May 8 00:32:48.506895 systemd[1]: Created slice system-modprobe.slice. May 8 00:32:48.506906 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:32:48.506917 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:32:48.506928 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:32:48.506939 systemd[1]: Created slice user.slice. May 8 00:32:48.506949 systemd[1]: Started systemd-ask-password-console.path. May 8 00:32:48.506960 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:32:48.506970 systemd[1]: Set up automount boot.automount. May 8 00:32:48.506980 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:32:48.506994 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:32:48.507004 systemd[1]: Stopped target initrd-fs.target. May 8 00:32:48.507015 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:32:48.507025 systemd[1]: Reached target integritysetup.target. May 8 00:32:48.507037 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:32:48.507047 systemd[1]: Reached target remote-fs.target. May 8 00:32:48.507058 systemd[1]: Reached target slices.target. May 8 00:32:48.507069 systemd[1]: Reached target swap.target. May 8 00:32:48.507080 systemd[1]: Reached target veritysetup.target. May 8 00:32:48.507090 systemd[1]: Listening on systemd-coredump.socket. May 8 00:32:48.507100 systemd[1]: Listening on systemd-initctl.socket. May 8 00:32:48.507112 systemd[1]: Listening on systemd-networkd.socket. May 8 00:32:48.507123 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:32:48.507133 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:32:48.507143 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:32:48.507163 systemd[1]: Mounting dev-hugepages.mount... May 8 00:32:48.507174 systemd[1]: Mounting dev-mqueue.mount... May 8 00:32:48.507184 systemd[1]: Mounting media.mount... May 8 00:32:48.507196 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:32:48.507207 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:32:48.507217 systemd[1]: Mounting tmp.mount... May 8 00:32:48.507227 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:32:48.507238 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:32:48.507260 systemd[1]: Starting kmod-static-nodes.service... May 8 00:32:48.507274 systemd[1]: Starting modprobe@configfs.service... May 8 00:32:48.507285 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:32:48.507295 systemd[1]: Starting modprobe@drm.service... May 8 00:32:48.507307 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:32:48.507319 systemd[1]: Starting modprobe@fuse.service... May 8 00:32:48.507329 systemd[1]: Starting modprobe@loop.service... May 8 00:32:48.507339 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:32:48.507350 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:32:48.507360 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:32:48.507370 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:32:48.507380 kernel: fuse: init (API version 7.34) May 8 00:32:48.507390 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:32:48.507401 systemd[1]: Stopped systemd-journald.service. May 8 00:32:48.507411 kernel: loop: module loaded May 8 00:32:48.507421 systemd[1]: Starting systemd-journald.service... May 8 00:32:48.507431 systemd[1]: Starting systemd-modules-load.service... May 8 00:32:48.507441 systemd[1]: Starting systemd-network-generator.service... May 8 00:32:48.507452 systemd[1]: Starting systemd-remount-fs.service... May 8 00:32:48.507463 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:32:48.507473 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:32:48.507483 systemd[1]: Stopped verity-setup.service. May 8 00:32:48.507495 systemd[1]: Mounted dev-hugepages.mount. May 8 00:32:48.507506 systemd[1]: Mounted dev-mqueue.mount. May 8 00:32:48.507516 systemd[1]: Mounted media.mount. May 8 00:32:48.507529 systemd-journald[997]: Journal started May 8 00:32:48.507567 systemd-journald[997]: Runtime Journal (/run/log/journal/b07f3d8a6f8442f5943edc1349bd76cc) is 6.0M, max 48.7M, 42.6M free. May 8 00:32:48.036000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:32:48.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:32:48.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:32:48.074000 audit: BPF prog-id=10 op=LOAD May 8 00:32:48.074000 audit: BPF prog-id=10 op=UNLOAD May 8 00:32:48.074000 audit: BPF prog-id=11 op=LOAD May 8 00:32:48.074000 audit: BPF prog-id=11 op=UNLOAD May 8 00:32:48.379000 audit: BPF prog-id=12 op=LOAD May 8 00:32:48.379000 audit: BPF prog-id=3 op=UNLOAD May 8 00:32:48.379000 audit: BPF prog-id=13 op=LOAD May 8 00:32:48.379000 audit: BPF prog-id=14 op=LOAD May 8 00:32:48.379000 audit: BPF prog-id=4 op=UNLOAD May 8 00:32:48.379000 audit: BPF prog-id=5 op=UNLOAD May 8 00:32:48.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.387000 audit: BPF prog-id=12 op=UNLOAD May 8 00:32:48.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.482000 audit: BPF prog-id=15 op=LOAD May 8 00:32:48.483000 audit: BPF prog-id=16 op=LOAD May 8 00:32:48.483000 audit: BPF prog-id=17 op=LOAD May 8 00:32:48.483000 audit: BPF prog-id=13 op=UNLOAD May 8 00:32:48.483000 audit: BPF prog-id=14 op=UNLOAD May 8 00:32:48.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.504000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:32:48.504000 audit[997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffff87fac00 a2=4000 a3=1 items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:48.504000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:32:48.378283 systemd[1]: Queued start job for default target multi-user.target. May 8 00:32:48.378297 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:32:48.380754 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:32:48.509262 systemd[1]: Started systemd-journald.service. May 8 00:32:48.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.509780 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:32:48.510736 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:32:48.511669 systemd[1]: Mounted tmp.mount. May 8 00:32:48.512625 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:32:48.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.513760 systemd[1]: Finished kmod-static-nodes.service. May 8 00:32:48.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.514892 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:32:48.515057 systemd[1]: Finished modprobe@configfs.service. May 8 00:32:48.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.516177 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:32:48.516356 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:32:48.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.517430 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:32:48.517582 systemd[1]: Finished modprobe@drm.service. May 8 00:32:48.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.518636 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:32:48.518788 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:32:48.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.519901 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:32:48.520049 systemd[1]: Finished modprobe@fuse.service. May 8 00:32:48.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.521112 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:32:48.521305 systemd[1]: Finished modprobe@loop.service. May 8 00:32:48.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.522404 systemd[1]: Finished systemd-modules-load.service. May 8 00:32:48.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.523761 systemd[1]: Finished systemd-network-generator.service. May 8 00:32:48.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.525005 systemd[1]: Finished systemd-remount-fs.service. May 8 00:32:48.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.526371 systemd[1]: Reached target network-pre.target. May 8 00:32:48.528507 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:32:48.530385 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:32:48.531136 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:32:48.534316 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:32:48.536450 systemd[1]: Starting systemd-journal-flush.service... May 8 00:32:48.537362 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:32:48.538416 systemd[1]: Starting systemd-random-seed.service... May 8 00:32:48.539356 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:32:48.540592 systemd[1]: Starting systemd-sysctl.service... May 8 00:32:48.543223 systemd[1]: Starting systemd-sysusers.service... May 8 00:32:48.546756 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:32:48.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.553452 systemd-journald[997]: Time spent on flushing to /var/log/journal/b07f3d8a6f8442f5943edc1349bd76cc is 12.805ms for 915 entries. May 8 00:32:48.553452 systemd-journald[997]: System Journal (/var/log/journal/b07f3d8a6f8442f5943edc1349bd76cc) is 8.0M, max 195.6M, 187.6M free. May 8 00:32:48.584582 systemd-journald[997]: Received client request to flush runtime journal. May 8 00:32:48.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.547984 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:32:48.588793 udevadm[1023]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:32:48.549398 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:32:48.551291 systemd[1]: Starting systemd-udev-settle.service... May 8 00:32:48.552980 systemd[1]: Finished systemd-random-seed.service. May 8 00:32:48.555095 systemd[1]: Reached target first-boot-complete.target. May 8 00:32:48.569555 systemd[1]: Finished systemd-sysctl.service. May 8 00:32:48.585734 systemd[1]: Finished systemd-journal-flush.service. May 8 00:32:48.588671 systemd[1]: Finished systemd-sysusers.service. May 8 00:32:48.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.936357 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:32:48.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.937000 audit: BPF prog-id=18 op=LOAD May 8 00:32:48.937000 audit: BPF prog-id=19 op=LOAD May 8 00:32:48.937000 audit: BPF prog-id=7 op=UNLOAD May 8 00:32:48.937000 audit: BPF prog-id=8 op=UNLOAD May 8 00:32:48.938622 systemd[1]: Starting systemd-udevd.service... May 8 00:32:48.953707 systemd-udevd[1026]: Using default interface naming scheme 'v252'. May 8 00:32:48.965654 systemd[1]: Started systemd-udevd.service. May 8 00:32:48.971026 kernel: kauditd_printk_skb: 121 callbacks suppressed May 8 00:32:48.971127 kernel: audit: type=1130 audit(1746664368.966:130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.971163 kernel: audit: type=1334 audit(1746664368.970:131): prog-id=20 op=LOAD May 8 00:32:48.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:48.970000 audit: BPF prog-id=20 op=LOAD May 8 00:32:48.970839 systemd[1]: Starting systemd-networkd.service... May 8 00:32:48.975000 audit: BPF prog-id=21 op=LOAD May 8 00:32:48.976000 audit: BPF prog-id=22 op=LOAD May 8 00:32:48.977779 kernel: audit: type=1334 audit(1746664368.975:132): prog-id=21 op=LOAD May 8 00:32:48.977839 kernel: audit: type=1334 audit(1746664368.976:133): prog-id=22 op=LOAD May 8 00:32:48.977862 kernel: audit: type=1334 audit(1746664368.976:134): prog-id=23 op=LOAD May 8 00:32:48.976000 audit: BPF prog-id=23 op=LOAD May 8 00:32:48.978497 systemd[1]: Starting systemd-userdbd.service... May 8 00:32:48.992911 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 8 00:32:49.017878 systemd[1]: Started systemd-userdbd.service. May 8 00:32:49.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.022271 kernel: audit: type=1130 audit(1746664369.018:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.028154 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:32:49.075169 systemd-networkd[1042]: lo: Link UP May 8 00:32:49.075177 systemd-networkd[1042]: lo: Gained carrier May 8 00:32:49.075552 systemd-networkd[1042]: Enumeration completed May 8 00:32:49.075662 systemd[1]: Started systemd-networkd.service. May 8 00:32:49.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.076871 systemd-networkd[1042]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:32:49.079821 systemd-networkd[1042]: eth0: Link UP May 8 00:32:49.079832 systemd-networkd[1042]: eth0: Gained carrier May 8 00:32:49.080272 kernel: audit: type=1130 audit(1746664369.076:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.092663 systemd[1]: Finished systemd-udev-settle.service. May 8 00:32:49.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.094854 systemd[1]: Starting lvm2-activation-early.service... May 8 00:32:49.097743 kernel: audit: type=1130 audit(1746664369.093:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.103402 lvm[1060]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:32:49.103780 systemd-networkd[1042]: eth0: DHCPv4 address 10.0.0.29/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:32:49.130136 systemd[1]: Finished lvm2-activation-early.service. May 8 00:32:49.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.131233 systemd[1]: Reached target cryptsetup.target. May 8 00:32:49.134283 kernel: audit: type=1130 audit(1746664369.130:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.135879 systemd[1]: Starting lvm2-activation.service... May 8 00:32:49.139615 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:32:49.168187 systemd[1]: Finished lvm2-activation.service. May 8 00:32:49.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.169225 systemd[1]: Reached target local-fs-pre.target. May 8 00:32:49.172284 kernel: audit: type=1130 audit(1746664369.168:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.172667 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:32:49.172704 systemd[1]: Reached target local-fs.target. May 8 00:32:49.173570 systemd[1]: Reached target machines.target. May 8 00:32:49.175535 systemd[1]: Starting ldconfig.service... May 8 00:32:49.176627 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:32:49.176677 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.177628 systemd[1]: Starting systemd-boot-update.service... May 8 00:32:49.179556 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:32:49.181792 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:32:49.183890 systemd[1]: Starting systemd-sysext.service... May 8 00:32:49.185186 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1063 (bootctl) May 8 00:32:49.186198 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:32:49.192788 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:32:49.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.195717 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:32:49.204694 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:32:49.204882 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:32:49.208572 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:32:49.209100 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:32:49.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.220118 (sd-sysext)[1073]: No suitable extensions found (2 ignored due to incompatible version). May 8 00:32:49.234200 systemd-fsck[1071]: fsck.fat 4.2 (2021-01-31) May 8 00:32:49.234200 systemd-fsck[1071]: /dev/vda1: 236 files, 117182/258078 clusters May 8 00:32:49.236556 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:32:49.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.239532 systemd[1]: Mounting boot.mount... May 8 00:32:49.246383 systemd[1]: Mounting usr-share-oem.mount... May 8 00:32:49.247759 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:32:49.249052 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:32:49.251241 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:32:49.253332 systemd[1]: Starting modprobe@loop.service... May 8 00:32:49.254313 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:32:49.254449 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.256869 systemd[1]: Mounted boot.mount. May 8 00:32:49.257991 systemd[1]: Mounted usr-share-oem.mount. May 8 00:32:49.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.259429 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:32:49.259566 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:32:49.261084 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:32:49.261217 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:32:49.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.263195 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:32:49.263336 systemd[1]: Finished modprobe@loop.service. May 8 00:32:49.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.265225 systemd[1]: Finished systemd-boot-update.service. May 8 00:32:49.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.267840 systemd[1]: Finished systemd-sysext.service. May 8 00:32:49.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.270815 systemd[1]: Starting ensure-sysext.service... May 8 00:32:49.272061 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:32:49.272116 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:32:49.273081 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:32:49.277543 systemd[1]: Reloading. May 8 00:32:49.284871 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:32:49.286620 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:32:49.290031 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:32:49.348042 ldconfig[1062]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:32:49.377765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:32:49.377785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:32:49.437000 audit: BPF prog-id=24 op=LOAD May 8 00:32:49.437000 audit: BPF prog-id=15 op=UNLOAD May 8 00:32:49.437000 audit: BPF prog-id=25 op=LOAD May 8 00:32:49.437000 audit: BPF prog-id=26 op=LOAD May 8 00:32:49.437000 audit: BPF prog-id=16 op=UNLOAD May 8 00:32:49.437000 audit: BPF prog-id=17 op=UNLOAD May 8 00:32:49.439000 audit: BPF prog-id=27 op=LOAD May 8 00:32:49.439000 audit: BPF prog-id=20 op=UNLOAD May 8 00:32:49.440000 audit: BPF prog-id=28 op=LOAD May 8 00:32:49.440000 audit: BPF prog-id=21 op=UNLOAD May 8 00:32:49.440000 audit: BPF prog-id=29 op=LOAD May 8 00:32:49.440000 audit: BPF prog-id=30 op=LOAD May 8 00:32:49.440000 audit: BPF prog-id=22 op=UNLOAD May 8 00:32:49.440000 audit: BPF prog-id=23 op=UNLOAD May 8 00:32:49.440000 audit: BPF prog-id=31 op=LOAD May 8 00:32:49.441000 audit: BPF prog-id=32 op=LOAD May 8 00:32:49.441000 audit: BPF prog-id=18 op=UNLOAD May 8 00:32:49.441000 audit: BPF prog-id=19 op=UNLOAD May 8 00:32:49.443481 systemd[1]: Finished ldconfig.service. May 8 00:32:49.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.445613 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:32:49.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.450617 systemd[1]: Starting audit-rules.service... May 8 00:32:49.452570 systemd[1]: Starting clean-ca-certificates.service... May 8 00:32:49.454962 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:32:49.458000 audit: BPF prog-id=33 op=LOAD May 8 00:32:49.459554 systemd[1]: Starting systemd-resolved.service... May 8 00:32:49.463000 audit: BPF prog-id=34 op=LOAD May 8 00:32:49.465134 systemd[1]: Starting systemd-timesyncd.service... May 8 00:32:49.467610 systemd[1]: Starting systemd-update-utmp.service... May 8 00:32:49.472365 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:32:49.473905 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:32:49.476000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:32:49.477627 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:32:49.480396 systemd[1]: Starting modprobe@loop.service... May 8 00:32:49.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.482465 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:32:49.482703 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.484047 systemd[1]: Finished clean-ca-certificates.service. May 8 00:32:49.485600 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:32:49.485733 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:32:49.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.487155 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:32:49.487327 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:32:49.488685 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:32:49.488817 systemd[1]: Finished modprobe@loop.service. May 8 00:32:49.492585 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:32:49.492755 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:32:49.492866 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:32:49.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.497247 systemd[1]: Finished systemd-update-utmp.service. May 8 00:32:49.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.499501 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:32:49.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.500955 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:32:49.502427 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:32:49.504522 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:32:49.506754 systemd[1]: Starting modprobe@loop.service... May 8 00:32:49.507626 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:32:49.507784 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.509116 systemd[1]: Starting systemd-update-done.service... May 8 00:32:49.510081 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:32:49.512107 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:32:49.512275 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:32:49.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.513715 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:32:49.513845 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:32:49.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.515221 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:32:49.515494 systemd[1]: Finished modprobe@loop.service. May 8 00:32:49.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.516901 systemd[1]: Finished systemd-update-done.service. May 8 00:32:49.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.518379 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:32:49.518471 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:32:49.520666 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:32:49.522802 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:32:49.525353 systemd[1]: Starting modprobe@drm.service... May 8 00:32:49.527661 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:32:49.530011 systemd[1]: Starting modprobe@loop.service... May 8 00:32:49.530931 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:32:49.531071 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.531195 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:32:49.532211 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:32:49.532396 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:32:49.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.533778 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:32:49.533905 systemd[1]: Finished modprobe@drm.service. May 8 00:32:49.535113 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:32:49.535240 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:32:49.536575 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:32:49.536693 systemd[1]: Finished modprobe@loop.service. May 8 00:32:49.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.538102 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:32:49.538214 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:32:49.539809 systemd[1]: Finished ensure-sysext.service. May 8 00:32:49.548215 systemd[1]: Started systemd-timesyncd.service. May 8 00:32:49.549052 systemd-timesyncd[1143]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:32:49.549115 systemd-timesyncd[1143]: Initial clock synchronization to Thu 2025-05-08 00:32:49.421350 UTC. May 8 00:32:49.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:49.549594 systemd[1]: Reached target time-set.target. May 8 00:32:49.549595 systemd-resolved[1139]: Positive Trust Anchors: May 8 00:32:49.549826 systemd-resolved[1139]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:32:49.549899 systemd-resolved[1139]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:32:49.549000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:32:49.549000 audit[1166]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcb4dc140 a2=420 a3=0 items=0 ppid=1135 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:49.549000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:32:49.550579 augenrules[1166]: No rules May 8 00:32:49.551533 systemd[1]: Finished audit-rules.service. May 8 00:32:49.562976 systemd-resolved[1139]: Defaulting to hostname 'linux'. May 8 00:32:49.566314 systemd[1]: Started systemd-resolved.service. May 8 00:32:49.567219 systemd[1]: Reached target network.target. May 8 00:32:49.568006 systemd[1]: Reached target nss-lookup.target. May 8 00:32:49.568858 systemd[1]: Reached target sysinit.target. May 8 00:32:49.569776 systemd[1]: Started motdgen.path. May 8 00:32:49.570519 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:32:49.571782 systemd[1]: Started logrotate.timer. May 8 00:32:49.572693 systemd[1]: Started mdadm.timer. May 8 00:32:49.573473 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:32:49.574376 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:32:49.574411 systemd[1]: Reached target paths.target. May 8 00:32:49.575200 systemd[1]: Reached target timers.target. May 8 00:32:49.576546 systemd[1]: Listening on dbus.socket. May 8 00:32:49.579859 systemd[1]: Listening on sshd.socket. May 8 00:32:49.580646 systemd[1]: Reached target sockets.target. May 8 00:32:49.581540 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.581572 systemd[1]: Reached target basic.target. May 8 00:32:49.582361 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:32:49.582396 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:32:49.583530 systemd[1]: Starting dbus.service... May 8 00:32:49.585224 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:32:49.587292 systemd[1]: Starting extend-filesystems.service... May 8 00:32:49.588272 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:32:49.589287 systemd[1]: Starting motdgen.service... May 8 00:32:49.590978 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:32:49.592777 jq[1174]: false May 8 00:32:49.593580 systemd[1]: Starting sshd-keygen.service... May 8 00:32:49.596325 systemd[1]: Starting systemd-logind.service... May 8 00:32:49.597114 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:32:49.597237 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:32:49.597669 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:32:49.598348 systemd[1]: Starting update-engine.service... May 8 00:32:49.600077 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:32:49.602230 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:32:49.602406 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:32:49.603692 jq[1188]: true May 8 00:32:49.603857 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:32:49.603995 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:32:49.613704 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:32:49.613892 systemd[1]: Finished motdgen.service. May 8 00:32:49.618813 extend-filesystems[1175]: Found vda May 8 00:32:49.620091 extend-filesystems[1175]: Found vda1 May 8 00:32:49.621507 jq[1192]: true May 8 00:32:49.622124 extend-filesystems[1175]: Found vda2 May 8 00:32:49.622124 extend-filesystems[1175]: Found vda3 May 8 00:32:49.622124 extend-filesystems[1175]: Found usr May 8 00:32:49.622124 extend-filesystems[1175]: Found vda4 May 8 00:32:49.622124 extend-filesystems[1175]: Found vda6 May 8 00:32:49.622124 extend-filesystems[1175]: Found vda7 May 8 00:32:49.622124 extend-filesystems[1175]: Found vda9 May 8 00:32:49.622124 extend-filesystems[1175]: Checking size of /dev/vda9 May 8 00:32:49.624070 dbus-daemon[1173]: [system] SELinux support is enabled May 8 00:32:49.624655 systemd[1]: Started dbus.service. May 8 00:32:49.627682 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:32:49.627718 systemd[1]: Reached target system-config.target. May 8 00:32:49.628711 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:32:49.628731 systemd[1]: Reached target user-config.target. May 8 00:32:49.655030 systemd-logind[1184]: Watching system buttons on /dev/input/event0 (Power Button) May 8 00:32:49.655860 systemd-logind[1184]: New seat seat0. May 8 00:32:49.664629 extend-filesystems[1175]: Old size kept for /dev/vda9 May 8 00:32:49.657220 systemd[1]: Started systemd-logind.service. May 8 00:32:49.662919 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:32:49.663078 systemd[1]: Finished extend-filesystems.service. May 8 00:32:49.676894 bash[1213]: Updated "/home/core/.ssh/authorized_keys" May 8 00:32:49.677781 update_engine[1186]: I0508 00:32:49.677345 1186 main.cc:92] Flatcar Update Engine starting May 8 00:32:49.679001 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:32:49.681519 systemd[1]: Started update-engine.service. May 8 00:32:49.682369 update_engine[1186]: I0508 00:32:49.681542 1186 update_check_scheduler.cc:74] Next update check in 11m31s May 8 00:32:49.684028 systemd[1]: Started locksmithd.service. May 8 00:32:49.718410 locksmithd[1214]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:32:50.861422 systemd-networkd[1042]: eth0: Gained IPv6LL May 8 00:32:51.135041 sshd_keygen[1193]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:32:51.152443 systemd[1]: Finished sshd-keygen.service. May 8 00:32:51.154714 systemd[1]: Starting issuegen.service... May 8 00:32:51.159218 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:32:51.159376 systemd[1]: Finished issuegen.service. May 8 00:32:51.161491 systemd[1]: Starting systemd-user-sessions.service... May 8 00:32:51.167104 systemd[1]: Finished systemd-user-sessions.service. May 8 00:32:51.169497 systemd[1]: Started getty@tty1.service. May 8 00:32:51.171530 systemd[1]: Started serial-getty@ttyAMA0.service. May 8 00:32:51.172613 systemd[1]: Reached target getty.target. May 8 00:32:51.173496 systemd[1]: Reached target multi-user.target. May 8 00:32:51.175693 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:32:51.182323 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:32:51.182479 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:32:51.183576 systemd[1]: Startup finished in 661ms (kernel) + 3.419s (initrd) + 3.184s (userspace) = 7.265s. May 8 00:32:57.538353 systemd[1]: Created slice system-sshd.slice. May 8 00:32:57.539356 systemd[1]: Started sshd@0-10.0.0.29:22-10.0.0.1:52930.service. May 8 00:32:57.589652 sshd[1236]: Accepted publickey for core from 10.0.0.1 port 52930 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:57.591692 sshd[1236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:57.600535 systemd-logind[1184]: New session 1 of user core. May 8 00:32:57.601477 systemd[1]: Created slice user-500.slice. May 8 00:32:57.602572 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:32:57.610736 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:32:57.612095 systemd[1]: Starting user@500.service... May 8 00:32:57.615120 (systemd)[1239]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:57.673409 systemd[1239]: Queued start job for default target default.target. May 8 00:32:57.673902 systemd[1239]: Reached target paths.target. May 8 00:32:57.673922 systemd[1239]: Reached target sockets.target. May 8 00:32:57.673933 systemd[1239]: Reached target timers.target. May 8 00:32:57.673943 systemd[1239]: Reached target basic.target. May 8 00:32:57.673980 systemd[1239]: Reached target default.target. May 8 00:32:57.674004 systemd[1239]: Startup finished in 53ms. May 8 00:32:57.674239 systemd[1]: Started user@500.service. May 8 00:32:57.675189 systemd[1]: Started session-1.scope. May 8 00:32:57.727023 systemd[1]: Started sshd@1-10.0.0.29:22-10.0.0.1:52944.service. May 8 00:32:57.771361 sshd[1248]: Accepted publickey for core from 10.0.0.1 port 52944 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:57.772979 sshd[1248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:57.776428 systemd-logind[1184]: New session 2 of user core. May 8 00:32:57.777225 systemd[1]: Started session-2.scope. May 8 00:32:57.830044 sshd[1248]: pam_unix(sshd:session): session closed for user core May 8 00:32:57.833885 systemd[1]: Started sshd@2-10.0.0.29:22-10.0.0.1:52960.service. May 8 00:32:57.834476 systemd[1]: sshd@1-10.0.0.29:22-10.0.0.1:52944.service: Deactivated successfully. May 8 00:32:57.835209 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:32:57.835794 systemd-logind[1184]: Session 2 logged out. Waiting for processes to exit. May 8 00:32:57.836606 systemd-logind[1184]: Removed session 2. May 8 00:32:57.875265 sshd[1253]: Accepted publickey for core from 10.0.0.1 port 52960 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:57.876385 sshd[1253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:57.880136 systemd-logind[1184]: New session 3 of user core. May 8 00:32:57.880547 systemd[1]: Started session-3.scope. May 8 00:32:57.929389 sshd[1253]: pam_unix(sshd:session): session closed for user core May 8 00:32:57.933003 systemd[1]: sshd@2-10.0.0.29:22-10.0.0.1:52960.service: Deactivated successfully. May 8 00:32:57.933593 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:32:57.934121 systemd-logind[1184]: Session 3 logged out. Waiting for processes to exit. May 8 00:32:57.935113 systemd[1]: Started sshd@3-10.0.0.29:22-10.0.0.1:52966.service. May 8 00:32:57.935785 systemd-logind[1184]: Removed session 3. May 8 00:32:57.976142 sshd[1260]: Accepted publickey for core from 10.0.0.1 port 52966 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:57.977164 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:57.980164 systemd-logind[1184]: New session 4 of user core. May 8 00:32:57.980913 systemd[1]: Started session-4.scope. May 8 00:32:58.033833 sshd[1260]: pam_unix(sshd:session): session closed for user core May 8 00:32:58.037113 systemd[1]: sshd@3-10.0.0.29:22-10.0.0.1:52966.service: Deactivated successfully. May 8 00:32:58.037784 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:32:58.038374 systemd-logind[1184]: Session 4 logged out. Waiting for processes to exit. May 8 00:32:58.040017 systemd[1]: Started sshd@4-10.0.0.29:22-10.0.0.1:52972.service. May 8 00:32:58.040760 systemd-logind[1184]: Removed session 4. May 8 00:32:58.080869 sshd[1266]: Accepted publickey for core from 10.0.0.1 port 52972 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:58.082084 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:58.085325 systemd-logind[1184]: New session 5 of user core. May 8 00:32:58.086672 systemd[1]: Started session-5.scope. May 8 00:32:58.145435 sudo[1269]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:32:58.145652 sudo[1269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:32:58.159475 dbus-daemon[1173]: avc: received setenforce notice (enforcing=1) May 8 00:32:58.161132 sudo[1269]: pam_unix(sudo:session): session closed for user root May 8 00:32:58.162904 sshd[1266]: pam_unix(sshd:session): session closed for user core May 8 00:32:58.167327 systemd[1]: sshd@4-10.0.0.29:22-10.0.0.1:52972.service: Deactivated successfully. May 8 00:32:58.168106 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:32:58.168857 systemd-logind[1184]: Session 5 logged out. Waiting for processes to exit. May 8 00:32:58.170904 systemd[1]: Started sshd@5-10.0.0.29:22-10.0.0.1:52974.service. May 8 00:32:58.171760 systemd-logind[1184]: Removed session 5. May 8 00:32:58.212020 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 52974 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:58.213351 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:58.216648 systemd-logind[1184]: New session 6 of user core. May 8 00:32:58.218094 systemd[1]: Started session-6.scope. May 8 00:32:58.271381 sudo[1277]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:32:58.271903 sudo[1277]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:32:58.274732 sudo[1277]: pam_unix(sudo:session): session closed for user root May 8 00:32:58.279533 sudo[1276]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:32:58.279755 sudo[1276]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:32:58.288919 systemd[1]: Stopping audit-rules.service... May 8 00:32:58.288000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:32:58.290817 kernel: kauditd_printk_skb: 63 callbacks suppressed May 8 00:32:58.290870 kernel: audit: type=1305 audit(1746664378.288:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:32:58.291192 auditctl[1280]: No rules May 8 00:32:58.291647 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:32:58.291805 systemd[1]: Stopped audit-rules.service. May 8 00:32:58.288000 audit[1280]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff5720a90 a2=420 a3=0 items=0 ppid=1 pid=1280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:58.293661 systemd[1]: Starting audit-rules.service... May 8 00:32:58.297466 kernel: audit: type=1300 audit(1746664378.288:201): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff5720a90 a2=420 a3=0 items=0 ppid=1 pid=1280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:58.297549 kernel: audit: type=1327 audit(1746664378.288:201): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:32:58.288000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:32:58.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.300584 kernel: audit: type=1131 audit(1746664378.290:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.312882 augenrules[1297]: No rules May 8 00:32:58.313612 systemd[1]: Finished audit-rules.service. May 8 00:32:58.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.314543 sudo[1276]: pam_unix(sudo:session): session closed for user root May 8 00:32:58.313000 audit[1276]: USER_END pid=1276 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:32:58.317634 sshd[1273]: pam_unix(sshd:session): session closed for user core May 8 00:32:58.320036 kernel: audit: type=1130 audit(1746664378.312:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.320083 kernel: audit: type=1106 audit(1746664378.313:204): pid=1276 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:32:58.320102 kernel: audit: type=1104 audit(1746664378.313:205): pid=1276 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:32:58.313000 audit[1276]: CRED_DISP pid=1276 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:32:58.321493 systemd[1]: Started sshd@6-10.0.0.29:22-10.0.0.1:52980.service. May 8 00:32:58.322029 systemd[1]: sshd@5-10.0.0.29:22-10.0.0.1:52974.service: Deactivated successfully. May 8 00:32:58.322801 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:32:58.317000 audit[1273]: USER_END pid=1273 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.323420 systemd-logind[1184]: Session 6 logged out. Waiting for processes to exit. May 8 00:32:58.324409 systemd-logind[1184]: Removed session 6. May 8 00:32:58.326830 kernel: audit: type=1106 audit(1746664378.317:206): pid=1273 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.326881 kernel: audit: type=1104 audit(1746664378.317:207): pid=1273 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.317000 audit[1273]: CRED_DISP pid=1273 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:52980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.332720 kernel: audit: type=1130 audit(1746664378.320:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:52980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.29:22-10.0.0.1:52974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.364000 audit[1302]: USER_ACCT pid=1302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.365209 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 52980 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:58.365000 audit[1302]: CRED_ACQ pid=1302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.365000 audit[1302]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde7d3750 a2=3 a3=1 items=0 ppid=1 pid=1302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:58.365000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:32:58.366344 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:58.369941 systemd-logind[1184]: New session 7 of user core. May 8 00:32:58.370391 systemd[1]: Started session-7.scope. May 8 00:32:58.373000 audit[1302]: USER_START pid=1302 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.374000 audit[1305]: CRED_ACQ pid=1305 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.420538 sshd[1302]: pam_unix(sshd:session): session closed for user core May 8 00:32:58.424407 systemd[1]: Started sshd@7-10.0.0.29:22-10.0.0.1:52984.service. May 8 00:32:58.423000 audit[1302]: USER_END pid=1302 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.29:22-10.0.0.1:52984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.423000 audit[1302]: CRED_DISP pid=1302 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.425809 systemd[1]: sshd@6-10.0.0.29:22-10.0.0.1:52980.service: Deactivated successfully. May 8 00:32:58.426409 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:32:58.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:52980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:58.427021 systemd-logind[1184]: Session 7 logged out. Waiting for processes to exit. May 8 00:32:58.427842 systemd-logind[1184]: Removed session 7. May 8 00:32:58.463000 audit[1309]: USER_ACCT pid=1309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.465319 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 52984 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:58.464000 audit[1309]: CRED_ACQ pid=1309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.464000 audit[1309]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcb14210 a2=3 a3=1 items=0 ppid=1 pid=1309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:58.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:32:58.466512 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:58.469871 systemd-logind[1184]: New session 8 of user core. May 8 00:32:58.470732 systemd[1]: Started session-8.scope. May 8 00:32:58.473000 audit[1309]: USER_START pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:58.475000 audit[1312]: CRED_ACQ pid=1312 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:59.016552 sshd[1309]: pam_unix(sshd:session): session closed for user core May 8 00:32:59.016000 audit[1309]: USER_END pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:59.016000 audit[1309]: CRED_DISP pid=1309 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:59.020044 systemd[1]: Started sshd@8-10.0.0.29:22-10.0.0.1:52994.service. May 8 00:32:59.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.29:22-10.0.0.1:52994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:59.020686 systemd[1]: sshd@7-10.0.0.29:22-10.0.0.1:52984.service: Deactivated successfully. May 8 00:32:59.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.29:22-10.0.0.1:52984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:32:59.021279 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:32:59.021798 systemd-logind[1184]: Session 8 logged out. Waiting for processes to exit. May 8 00:32:59.024719 systemd-logind[1184]: Removed session 8. May 8 00:32:59.060000 audit[1324]: USER_ACCT pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:59.061089 sshd[1324]: Accepted publickey for core from 10.0.0.1 port 52994 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:32:59.061000 audit[1324]: CRED_ACQ pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:59.061000 audit[1324]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6ae5170 a2=3 a3=1 items=0 ppid=1 pid=1324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:32:59.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:32:59.062209 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:32:59.066962 systemd-logind[1184]: New session 9 of user core. May 8 00:32:59.067750 systemd[1]: Started session-9.scope. May 8 00:32:59.076000 audit[1324]: USER_START pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:32:59.077000 audit[1327]: CRED_ACQ pid=1327 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.749477 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ May 8 00:33:04.749919 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:33:04.745000 audit[1328]: USER_ACCT pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.751459 kernel: kauditd_printk_skb: 30 callbacks suppressed May 8 00:33:04.751507 kernel: audit: type=1101 audit(1746664384.745:233): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.748000 audit[1328]: CRED_REFR pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.756891 kernel: audit: type=1110 audit(1746664384.748:234): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.756000 audit[1328]: USER_START pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.761458 sudo[1328]: pam_unix(sudo:session): session closed for user root May 8 00:33:04.762366 kernel: audit: type=1105 audit(1746664384.756:235): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.762404 kernel: audit: type=1106 audit(1746664384.760:236): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.760000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.763439 sshd[1324]: pam_unix(sshd:session): session closed for user core May 8 00:33:04.760000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.771207 systemd[1]: Started sshd@9-10.0.0.29:22-10.0.0.1:41766.service. May 8 00:33:04.771731 systemd[1]: sshd@8-10.0.0.29:22-10.0.0.1:52994.service: Deactivated successfully. May 8 00:33:04.772583 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:33:04.772752 systemd[1]: session-9.scope: Consumed 3.671s CPU time. May 8 00:33:04.773194 systemd-logind[1184]: Session 9 logged out. Waiting for processes to exit. May 8 00:33:04.776978 kernel: audit: type=1104 audit(1746664384.760:237): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.777031 kernel: audit: type=1106 audit(1746664384.764:238): pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.764000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.777536 systemd-logind[1184]: Removed session 9. May 8 00:33:04.764000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.784150 kernel: audit: type=1104 audit(1746664384.764:239): pid=1324 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.29:22-10.0.0.1:41766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:04.788776 kernel: audit: type=1130 audit(1746664384.770:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.29:22-10.0.0.1:41766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:04.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.29:22-10.0.0.1:52994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:04.791709 kernel: audit: type=1131 audit(1746664384.770:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.29:22-10.0.0.1:52994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:04.811000 audit[1384]: USER_ACCT pid=1384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.812818 sshd[1384]: Accepted publickey for core from 10.0.0.1 port 41766 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:33:04.814104 sshd[1384]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:33:04.812000 audit[1384]: CRED_ACQ pid=1384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.812000 audit[1384]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea7891a0 a2=3 a3=1 items=0 ppid=1 pid=1384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:04.812000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:33:04.816279 kernel: audit: type=1101 audit(1746664384.811:242): pid=1384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.818150 systemd[1]: Started session-10.scope. May 8 00:33:04.818421 systemd-logind[1184]: New session 10 of user core. May 8 00:33:04.821000 audit[1384]: USER_START pid=1384 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.822000 audit[1387]: CRED_ACQ pid=1387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:04.870000 audit[1388]: USER_ACCT pid=1388 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.871513 sudo[1388]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext May 8 00:33:04.870000 audit[1388]: CRED_REFR pid=1388 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.871972 sudo[1388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:33:04.872000 audit[1388]: USER_START pid=1388 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:04.880016 systemd[1]: ensure-sysext.service: Deactivated successfully. May 8 00:33:04.880178 systemd[1]: Stopped ensure-sysext.service. May 8 00:33:04.880243 systemd[1]: Stopping ensure-sysext.service... May 8 00:33:04.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:04.881440 systemd[1]: Stopping systemd-sysext.service... May 8 00:33:04.893658 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:04.894057 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:04.895670 systemd[1]: systemd-sysext.service: Deactivated successfully. May 8 00:33:04.895972 systemd[1]: Stopped systemd-sysext.service. May 8 00:33:04.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:04.898024 systemd[1]: Starting systemd-sysext.service... May 8 00:33:04.906075 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:33:04.909163 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:33:04.909349 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:33:04.917278 kernel: loop0: detected capacity change from 0 to 315088 May 8 00:33:04.922271 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:04.942269 kernel: loop1: detected capacity change from 0 to 301296 May 8 00:33:04.947274 kernel: EXT4-fs (loop1): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:04.969282 kernel: loop2: detected capacity change from 0 to 315088 May 8 00:33:04.974927 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:04.974980 kernel: loop3: detected capacity change from 0 to 301296 May 8 00:33:04.978750 (sd-sysext)[1401]: Using extensions 'containerd', 'docker'. May 8 00:33:04.979272 kernel: EXT4-fs (loop3): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:04.979957 (sd-sysext)[1401]: Merged extensions into '/usr'. May 8 00:33:04.998537 systemd[1]: Mounting usr-share-oem.mount... May 8 00:33:05.004647 systemd[1]: Mounted usr-share-oem.mount. May 8 00:33:05.004984 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:05.005161 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:05.006706 systemd[1]: Finished systemd-sysext.service. May 8 00:33:05.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.007000 audit[1388]: USER_END pid=1388 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:05.007000 audit[1388]: CRED_DISP pid=1388 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:05.007430 sudo[1388]: pam_unix(sudo:session): session closed for user root May 8 00:33:05.008830 sshd[1384]: pam_unix(sshd:session): session closed for user core May 8 00:33:05.009084 systemd[1]: Starting ensure-sysext.service... May 8 00:33:05.009000 audit[1384]: USER_END pid=1384 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:05.009000 audit[1384]: CRED_DISP pid=1384 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:05.012071 systemd[1]: sshd@9-10.0.0.29:22-10.0.0.1:41766.service: Deactivated successfully. May 8 00:33:05.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.29:22-10.0.0.1:41766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.012699 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:33:05.013209 systemd-logind[1184]: Session 10 logged out. Waiting for processes to exit. May 8 00:33:05.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.29:22-10.0.0.1:41772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.014295 systemd[1]: Started sshd@10-10.0.0.29:22-10.0.0.1:41772.service. May 8 00:33:05.016374 systemd[1]: Reloading. May 8 00:33:05.016404 systemd-logind[1184]: Removed session 10. May 8 00:33:05.114969 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:33:05.114991 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:33:05.129619 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:33:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.177000 audit: BPF prog-id=40 op=LOAD May 8 00:33:05.177000 audit: BPF prog-id=34 op=UNLOAD May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit: BPF prog-id=41 op=LOAD May 8 00:33:05.178000 audit: BPF prog-id=24 op=UNLOAD May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit: BPF prog-id=42 op=LOAD May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.178000 audit: BPF prog-id=43 op=LOAD May 8 00:33:05.178000 audit: BPF prog-id=25 op=UNLOAD May 8 00:33:05.178000 audit: BPF prog-id=26 op=UNLOAD May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit: BPF prog-id=44 op=LOAD May 8 00:33:05.179000 audit: BPF prog-id=35 op=UNLOAD May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit: BPF prog-id=45 op=LOAD May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.179000 audit: BPF prog-id=46 op=LOAD May 8 00:33:05.180000 audit: BPF prog-id=36 op=UNLOAD May 8 00:33:05.180000 audit: BPF prog-id=37 op=UNLOAD May 8 00:33:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.181000 audit: BPF prog-id=47 op=LOAD May 8 00:33:05.181000 audit: BPF prog-id=27 op=UNLOAD May 8 00:33:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit: BPF prog-id=48 op=LOAD May 8 00:33:05.183000 audit: BPF prog-id=28 op=UNLOAD May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit: BPF prog-id=49 op=LOAD May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit: BPF prog-id=50 op=LOAD May 8 00:33:05.183000 audit: BPF prog-id=29 op=UNLOAD May 8 00:33:05.183000 audit: BPF prog-id=30 op=UNLOAD May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit: BPF prog-id=51 op=LOAD May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.183000 audit: BPF prog-id=52 op=LOAD May 8 00:33:05.183000 audit: BPF prog-id=31 op=UNLOAD May 8 00:33:05.183000 audit: BPF prog-id=32 op=UNLOAD May 8 00:33:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit: BPF prog-id=53 op=LOAD May 8 00:33:05.184000 audit: BPF prog-id=33 op=UNLOAD May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:05.184000 audit: BPF prog-id=54 op=LOAD May 8 00:33:05.184000 audit: BPF prog-id=38 op=UNLOAD May 8 00:33:05.193872 systemd[1]: Starting docker.socket... May 8 00:33:05.195239 systemd[1]: Starting containerd.service... May 8 00:33:05.195560 systemd[1]: Listening on docker.socket. May 8 00:33:05.199133 systemd[1]: Stopped target sockets.target. May 8 00:33:05.199152 systemd[1]: Stopping sockets.target... May 8 00:33:05.199218 systemd[1]: Reached target sockets.target. May 8 00:33:05.200169 systemd[1]: Started containerd.service. May 8 00:33:05.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.201709 systemd[1]: Stopped target timers.target. May 8 00:33:05.201725 systemd[1]: Stopping timers.target... May 8 00:33:05.201791 systemd[1]: Reached target timers.target. May 8 00:33:05.205942 systemd[1]: Stopped target multi-user.target. May 8 00:33:05.205961 systemd[1]: Stopping multi-user.target... May 8 00:33:05.205980 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:33:05.207328 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:33:05.211594 jq[1469]: false May 8 00:33:05.208739 systemd[1]: Starting extend-filesystems.service... May 8 00:33:05.211509 systemd[1]: Starting issuegen.service... May 8 00:33:05.212688 systemd[1]: Starting motdgen.service... May 8 00:33:05.213901 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:33:05.213953 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:33:05.215184 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:33:05.217396 extend-filesystems[1470]: Found loop2 May 8 00:33:05.218372 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:33:05.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.219356 extend-filesystems[1470]: Found loop3 May 8 00:33:05.219356 extend-filesystems[1470]: Found vda May 8 00:33:05.219356 extend-filesystems[1470]: Found vda1 May 8 00:33:05.219356 extend-filesystems[1470]: Found vda2 May 8 00:33:05.219356 extend-filesystems[1470]: Found vda3 May 8 00:33:05.219356 extend-filesystems[1470]: Found usr May 8 00:33:05.219356 extend-filesystems[1470]: Found vda4 May 8 00:33:05.219356 extend-filesystems[1470]: Found vda6 May 8 00:33:05.219356 extend-filesystems[1470]: Found vda7 May 8 00:33:05.219356 extend-filesystems[1470]: Found vda9 May 8 00:33:05.219356 extend-filesystems[1470]: Checking size of /dev/vda9 May 8 00:33:05.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.219223 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:33:05.219375 systemd[1]: Finished issuegen.service. May 8 00:33:05.220862 systemd[1]: Finished ensure-sysext.service. May 8 00:33:05.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.221630 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:33:05.221772 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:33:05.229626 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:33:05.229767 systemd[1]: Finished motdgen.service. May 8 00:33:05.231322 extend-filesystems[1470]: Old size kept for /dev/vda9 May 8 00:33:05.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.232506 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:33:05.232727 systemd[1]: Finished extend-filesystems.service. May 8 00:33:05.233043 systemd[1]: Reached target multi-user.target. May 8 00:33:05.234578 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:33:05.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.245917 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:33:05.246090 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:33:05.325000 audit[1409]: USER_ACCT pid=1409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:05.327503 sshd[1409]: Accepted publickey for core from 10.0.0.1 port 41772 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:33:05.330000 audit[1409]: CRED_ACQ pid=1409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:05.330000 audit[1409]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9c737e0 a2=3 a3=1 items=0 ppid=1 pid=1409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:33:05.332320 sshd[1409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:33:05.335860 systemd-logind[1184]: New session 11 of user core. May 8 00:33:05.336762 systemd[1]: Started session-11.scope. May 8 00:33:05.339000 audit[1409]: USER_START pid=1409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:05.341000 audit[1501]: CRED_ACQ pid=1501 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:05.359303 containerd[1468]: time="2025-05-08T00:33:05.359223715Z" level=info msg="starting containerd" revision=1c90a442489720eec95342e1789ee8a5e1b9536f version=v1.6.9 May 8 00:33:05.378017 containerd[1468]: time="2025-05-08T00:33:05.377954667Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:33:05.378122 containerd[1468]: time="2025-05-08T00:33:05.378112367Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:05.379545 containerd[1468]: time="2025-05-08T00:33:05.379499615Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:33:05.379545 containerd[1468]: time="2025-05-08T00:33:05.379540367Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:05.379800 containerd[1468]: time="2025-05-08T00:33:05.379765920Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:33:05.379800 containerd[1468]: time="2025-05-08T00:33:05.379790188Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:33:05.379857 containerd[1468]: time="2025-05-08T00:33:05.379803679Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:33:05.379857 containerd[1468]: time="2025-05-08T00:33:05.379813378Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:33:05.379902 containerd[1468]: time="2025-05-08T00:33:05.379889174Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:05.380769 containerd[1468]: time="2025-05-08T00:33:05.380737544Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:05.380911 containerd[1468]: time="2025-05-08T00:33:05.380882831Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:33:05.380911 containerd[1468]: time="2025-05-08T00:33:05.380904424Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:33:05.380977 containerd[1468]: time="2025-05-08T00:33:05.380961701Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:33:05.381006 containerd[1468]: time="2025-05-08T00:33:05.380980021Z" level=info msg="metadata content store policy set" policy=shared May 8 00:33:05.385782 containerd[1468]: time="2025-05-08T00:33:05.385744702Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:33:05.385867 containerd[1468]: time="2025-05-08T00:33:05.385784536Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:33:05.385867 containerd[1468]: time="2025-05-08T00:33:05.385800023Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:33:05.385867 containerd[1468]: time="2025-05-08T00:33:05.385854186Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:33:05.385933 containerd[1468]: time="2025-05-08T00:33:05.385868875Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:33:05.385933 containerd[1468]: time="2025-05-08T00:33:05.385883483Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:33:05.385933 containerd[1468]: time="2025-05-08T00:33:05.385896255Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:33:05.386266 containerd[1468]: time="2025-05-08T00:33:05.386228818Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:33:05.386301 containerd[1468]: time="2025-05-08T00:33:05.386271127Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:33:05.386301 containerd[1468]: time="2025-05-08T00:33:05.386288250Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:33:05.386340 containerd[1468]: time="2025-05-08T00:33:05.386300184Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:33:05.386340 containerd[1468]: time="2025-05-08T00:33:05.386313036Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:33:05.386451 containerd[1468]: time="2025-05-08T00:33:05.386421722Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:33:05.386551 containerd[1468]: time="2025-05-08T00:33:05.386524780Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:33:05.387018 containerd[1468]: time="2025-05-08T00:33:05.386987541Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:33:05.387047 containerd[1468]: time="2025-05-08T00:33:05.387025739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387047 containerd[1468]: time="2025-05-08T00:33:05.387041106Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:33:05.387252 containerd[1468]: time="2025-05-08T00:33:05.387230178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387287 containerd[1468]: time="2025-05-08T00:33:05.387263227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387287 containerd[1468]: time="2025-05-08T00:33:05.387279032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387330 containerd[1468]: time="2025-05-08T00:33:05.387291965Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387351 containerd[1468]: time="2025-05-08T00:33:05.387325133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387351 containerd[1468]: time="2025-05-08T00:33:05.387341857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387389 containerd[1468]: time="2025-05-08T00:33:05.387353392Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387389 containerd[1468]: time="2025-05-08T00:33:05.387365326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387430 containerd[1468]: time="2025-05-08T00:33:05.387396060Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:33:05.387595 containerd[1468]: time="2025-05-08T00:33:05.387548571Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387621 containerd[1468]: time="2025-05-08T00:33:05.387607524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387643 containerd[1468]: time="2025-05-08T00:33:05.387625964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387643 containerd[1468]: time="2025-05-08T00:33:05.387638856Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:33:05.387686 containerd[1468]: time="2025-05-08T00:33:05.387657696Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:33:05.387686 containerd[1468]: time="2025-05-08T00:33:05.387670348Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:33:05.387730 containerd[1468]: time="2025-05-08T00:33:05.387687192Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:33:05.387730 containerd[1468]: time="2025-05-08T00:33:05.387721119Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:33:05.387987 containerd[1468]: time="2025-05-08T00:33:05.387923921Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:33:05.388875 containerd[1468]: time="2025-05-08T00:33:05.387985748Z" level=info msg="Connect containerd service" May 8 00:33:05.388875 containerd[1468]: time="2025-05-08T00:33:05.388022269Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:33:05.389094 containerd[1468]: time="2025-05-08T00:33:05.389040113Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:33:05.389624 containerd[1468]: time="2025-05-08T00:33:05.389580907Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.389572525Z" level=info msg="Start subscribing containerd event" May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.389787142Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.389877108Z" level=info msg="containerd successfully booted in 0.032163s" May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.389902892Z" level=info msg="Start recovering state" May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.389995452Z" level=info msg="Start event monitor" May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.390069453Z" level=info msg="Start snapshots syncer" May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.390084660Z" level=info msg="Start cni network conf syncer for default" May 8 00:33:05.390154 containerd[1468]: time="2025-05-08T00:33:05.390092683Z" level=info msg="Start streaming server" May 8 00:33:05.492680 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:33:05.507046 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:33:05.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:05.507388 systemd[1]: Reached target network-online.target. May 8 00:33:05.508755 systemd[1]: Starting docker.service... May 8 00:33:05.668658 dockerd[1515]: time="2025-05-08T00:33:05.666642655Z" level=info msg="Starting up" May 8 00:33:05.673484 dockerd[1515]: time="2025-05-08T00:33:05.673450289Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:33:05.673484 dockerd[1515]: time="2025-05-08T00:33:05.673479027Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:33:05.673579 dockerd[1515]: time="2025-05-08T00:33:05.673502736Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc May 8 00:33:05.673579 dockerd[1515]: time="2025-05-08T00:33:05.673513313Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:33:05.679781 dockerd[1515]: time="2025-05-08T00:33:05.679756525Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:33:05.679781 dockerd[1515]: time="2025-05-08T00:33:05.679777799Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:33:05.679889 dockerd[1515]: time="2025-05-08T00:33:05.679792447Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc May 8 00:33:05.679889 dockerd[1515]: time="2025-05-08T00:33:05.679814041Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:33:05.684726 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2935218060-merged.mount: Deactivated successfully. May 8 00:33:05.704399 dockerd[1515]: time="2025-05-08T00:33:05.704357375Z" level=info msg="Loading containers: start." May 8 00:33:05.767000 audit[1548]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.767000 audit[1548]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffec15d590 a2=0 a3=1 items=0 ppid=1515 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:33:05.771000 audit[1550]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.771000 audit[1550]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd13ca6c0 a2=0 a3=1 items=0 ppid=1515 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:33:05.776000 audit[1552]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.776000 audit[1552]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd818c700 a2=0 a3=1 items=0 ppid=1515 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:05.778000 audit[1554]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.778000 audit[1554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe044f240 a2=0 a3=1 items=0 ppid=1515 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:05.783000 audit[1556]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.783000 audit[1556]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe67093f0 a2=0 a3=1 items=0 ppid=1515 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:33:05.816000 audit[1561]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.816000 audit[1561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff3f2c5d0 a2=0 a3=1 items=0 ppid=1515 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:33:05.827000 audit[1563]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.827000 audit[1563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe3715ab0 a2=0 a3=1 items=0 ppid=1515 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:33:05.828000 audit[1565]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.828000 audit[1565]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff830c1a0 a2=0 a3=1 items=0 ppid=1515 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:33:05.830000 audit[1567]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.830000 audit[1567]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffeec2fe50 a2=0 a3=1 items=0 ppid=1515 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:05.836000 audit[1571]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.836000 audit[1571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd5931790 a2=0 a3=1 items=0 ppid=1515 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.836000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:05.844000 audit[1572]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.844000 audit[1572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdebc1a20 a2=0 a3=1 items=0 ppid=1515 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:05.854276 kernel: Initializing XFRM netlink socket May 8 00:33:05.877482 dockerd[1515]: time="2025-05-08T00:33:05.877428497Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:33:05.890000 audit[1579]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.890000 audit[1579]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc896a560 a2=0 a3=1 items=0 ppid=1515 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.890000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:33:05.906000 audit[1582]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.906000 audit[1582]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd37c9280 a2=0 a3=1 items=0 ppid=1515 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:33:05.909000 audit[1585]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.909000 audit[1585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffee707a80 a2=0 a3=1 items=0 ppid=1515 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:33:05.911000 audit[1587]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.911000 audit[1587]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff6f2b470 a2=0 a3=1 items=0 ppid=1515 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.911000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:33:05.913000 audit[1589]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.913000 audit[1589]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdcf80b00 a2=0 a3=1 items=0 ppid=1515 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.913000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:33:05.915000 audit[1591]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.915000 audit[1591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffde1baa50 a2=0 a3=1 items=0 ppid=1515 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:33:05.917000 audit[1593]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.917000 audit[1593]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd6cd5d70 a2=0 a3=1 items=0 ppid=1515 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:33:05.923000 audit[1596]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1596 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.923000 audit[1596]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffda8146d0 a2=0 a3=1 items=0 ppid=1515 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.923000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:33:05.926000 audit[1598]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1598 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.926000 audit[1598]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffcccd87f0 a2=0 a3=1 items=0 ppid=1515 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:05.928000 audit[1600]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1600 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.928000 audit[1600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff65b54a0 a2=0 a3=1 items=0 ppid=1515 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:05.930000 audit[1602]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.930000 audit[1602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff1b72840 a2=0 a3=1 items=0 ppid=1515 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.930000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:33:05.932005 systemd-networkd[1042]: docker0: Link UP May 8 00:33:05.938000 audit[1606]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1606 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.938000 audit[1606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe7259f00 a2=0 a3=1 items=0 ppid=1515 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.938000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:05.945000 audit[1607]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:05.945000 audit[1607]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffecbfbb80 a2=0 a3=1 items=0 ppid=1515 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:05.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:05.946614 dockerd[1515]: time="2025-05-08T00:33:05.946574811Z" level=info msg="Loading containers: done." May 8 00:33:05.983193 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1042936479-merged.mount: Deactivated successfully. May 8 00:33:05.988442 dockerd[1515]: time="2025-05-08T00:33:05.988409523Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:33:05.988776 dockerd[1515]: time="2025-05-08T00:33:05.988754379Z" level=info msg="Docker daemon" commit=3056208 graphdriver(s)=overlay2 version=20.10.21 May 8 00:33:05.988933 dockerd[1515]: time="2025-05-08T00:33:05.988917188Z" level=info msg="Daemon has completed initialization" May 8 00:33:06.003098 systemd[1]: Started docker.service. May 8 00:33:06.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:06.011343 dockerd[1515]: time="2025-05-08T00:33:06.011287631Z" level=info msg="API listen on /run/docker.sock" May 8 00:33:07.007601 systemd[1]: var-lib-docker-overlay2-0bceb6771021e0410580948fccadfdcbfb5b45debedf737919bcbd13e5f215e6\x2dinit-merged.mount: Deactivated successfully. May 8 00:33:07.025122 systemd[1]: var-lib-docker-overlay2-0bceb6771021e0410580948fccadfdcbfb5b45debedf737919bcbd13e5f215e6-merged.mount: Deactivated successfully. May 8 00:33:07.041841 kernel: docker0: port 1(vethdfdec6b) entered blocking state May 8 00:33:07.041942 kernel: docker0: port 1(vethdfdec6b) entered disabled state May 8 00:33:07.042789 kernel: device vethdfdec6b entered promiscuous mode May 8 00:33:07.039000 audit: ANOM_PROMISCUOUS dev=vethdfdec6b prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 May 8 00:33:07.039000 audit[1515]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=40 a0=f a1=4000056450 a2=28 a3=0 items=0 ppid=1 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.039000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 May 8 00:33:07.043475 systemd-networkd[1042]: vethdfdec6b: Link UP May 8 00:33:07.103790 containerd[1468]: time="2025-05-08T00:33:07.103711098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:33:07.103790 containerd[1468]: time="2025-05-08T00:33:07.103761015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:33:07.104149 containerd[1468]: time="2025-05-08T00:33:07.103801349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:33:07.104149 containerd[1468]: time="2025-05-08T00:33:07.104079250Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166 pid=1646 runtime=io.containerd.runc.v2 May 8 00:33:07.115994 systemd[1]: Started docker-c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166.scope. May 8 00:33:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit: BPF prog-id=55 op=LOAD May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63376237626433623433363366613939636462333237306434 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63376237626433623433363366613939636462333237306434 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit: BPF prog-id=56 op=LOAD May 8 00:33:07.126000 audit[1655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63376237626433623433363366613939636462333237306434 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit: BPF prog-id=57 op=LOAD May 8 00:33:07.126000 audit[1655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63376237626433623433363366613939636462333237306434 May 8 00:33:07.126000 audit: BPF prog-id=57 op=UNLOAD May 8 00:33:07.126000 audit: BPF prog-id=56 op=UNLOAD May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:07.126000 audit: BPF prog-id=58 op=LOAD May 8 00:33:07.126000 audit[1655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F63376237626433623433363366613939636462333237306434 May 8 00:33:07.191277 kernel: eth0: renamed from veth9c1691d May 8 00:33:07.201723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vethdfdec6b: link becomes ready May 8 00:33:07.201806 kernel: docker0: port 1(vethdfdec6b) entered blocking state May 8 00:33:07.201827 kernel: docker0: port 1(vethdfdec6b) entered forwarding state May 8 00:33:07.201853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready May 8 00:33:07.202155 systemd-networkd[1042]: vethdfdec6b: Gained carrier May 8 00:33:07.202791 systemd-networkd[1042]: docker0: Gained carrier May 8 00:33:07.204655 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:33:07.223507 systemd[1]: docker-c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166.scope: Deactivated successfully. May 8 00:33:07.222000 audit: BPF prog-id=55 op=UNLOAD May 8 00:33:07.224928 containerd[1468]: time="2025-05-08T00:33:07.224811065Z" level=warning msg="error from *cgroupsv2.Manager.EventChan" error="failed to add inotify watch for \"/sys/fs/cgroup/system.slice/docker-c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166.scope/memory.events\": no such file or directory" May 8 00:33:07.236411 containerd[1468]: time="2025-05-08T00:33:07.236350256Z" level=info msg="shim disconnected" id=c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166 May 8 00:33:07.236489 containerd[1468]: time="2025-05-08T00:33:07.236410716Z" level=warning msg="cleaning up after shim disconnected" id=c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166 namespace=moby May 8 00:33:07.236489 containerd[1468]: time="2025-05-08T00:33:07.236422337Z" level=info msg="cleaning up dead shim" May 8 00:33:07.237048 dockerd[1515]: time="2025-05-08T00:33:07.237007451Z" level=info msg="ignoring event" container=c7b7bd3b4363fa99cdb3270d43cb9797c5c77ae48e2c53c65633e349661ad166 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" May 8 00:33:07.243434 containerd[1468]: time="2025-05-08T00:33:07.243391352Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:33:07Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1703 runtime=io.containerd.runc.v2\n" May 8 00:33:07.247791 kernel: docker0: port 1(vethdfdec6b) entered disabled state May 8 00:33:07.247855 kernel: veth9c1691d: renamed from eth0 May 8 00:33:07.247332 systemd-networkd[1042]: vethdfdec6b: Lost carrier May 8 00:33:07.269347 systemd-networkd[1042]: vethdfdec6b: Link DOWN May 8 00:33:07.270296 kernel: docker0: port 1(vethdfdec6b) entered disabled state May 8 00:33:07.267000 audit: ANOM_PROMISCUOUS dev=vethdfdec6b prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 May 8 00:33:07.272868 kernel: device vethdfdec6b left promiscuous mode May 8 00:33:07.272919 kernel: docker0: port 1(vethdfdec6b) entered disabled state May 8 00:33:07.267000 audit[1515]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=32 a0=f a1=4000059000 a2=20 a3=0 items=0 ppid=1 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.267000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 May 8 00:33:07.318173 sshd[1409]: pam_unix(sshd:session): session closed for user core May 8 00:33:07.317000 audit[1409]: USER_END pid=1409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.317000 audit[1409]: CRED_DISP pid=1409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.320860 systemd[1]: sshd@10-10.0.0.29:22-10.0.0.1:41772.service: Deactivated successfully. May 8 00:33:07.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.29:22-10.0.0.1:41772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:07.321428 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:33:07.322081 systemd-logind[1184]: Session 11 logged out. Waiting for processes to exit. May 8 00:33:07.323184 systemd[1]: Started sshd@11-10.0.0.29:22-10.0.0.1:41782.service. May 8 00:33:07.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.29:22-10.0.0.1:41782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:07.323949 systemd-logind[1184]: Removed session 11. May 8 00:33:07.356000 audit: BPF prog-id=58 op=UNLOAD May 8 00:33:07.363000 audit[1718]: USER_ACCT pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.364608 sshd[1718]: Accepted publickey for core from 10.0.0.1 port 41782 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:33:07.364000 audit[1718]: CRED_ACQ pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.364000 audit[1718]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff56f85d0 a2=3 a3=1 items=0 ppid=1 pid=1718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.364000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:33:07.366145 sshd[1718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:33:07.369373 systemd-logind[1184]: New session 12 of user core. May 8 00:33:07.370154 systemd[1]: Started session-12.scope. May 8 00:33:07.372000 audit[1718]: USER_START pid=1718 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.373000 audit[1720]: CRED_ACQ pid=1720 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.436999 sshd[1718]: pam_unix(sshd:session): session closed for user core May 8 00:33:07.437000 audit[1718]: USER_END pid=1718 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.437000 audit[1718]: CRED_DISP pid=1718 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.440334 systemd[1]: Started sshd@12-10.0.0.29:22-10.0.0.1:41788.service. May 8 00:33:07.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.29:22-10.0.0.1:41788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:07.440921 systemd[1]: sshd@11-10.0.0.29:22-10.0.0.1:41782.service: Deactivated successfully. May 8 00:33:07.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.29:22-10.0.0.1:41782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:07.441764 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:33:07.442315 systemd-logind[1184]: Session 12 logged out. Waiting for processes to exit. May 8 00:33:07.443039 systemd-logind[1184]: Removed session 12. May 8 00:33:07.482000 audit[1726]: USER_ACCT pid=1726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.483960 sshd[1726]: Accepted publickey for core from 10.0.0.1 port 41788 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:33:07.483000 audit[1726]: CRED_ACQ pid=1726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.483000 audit[1726]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2216b60 a2=3 a3=1 items=0 ppid=1 pid=1726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:07.483000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:33:07.485322 sshd[1726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:33:07.488657 systemd-logind[1184]: New session 13 of user core. May 8 00:33:07.489457 systemd[1]: Started session-13.scope. May 8 00:33:07.491000 audit[1726]: USER_START pid=1726 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:07.493000 audit[1729]: CRED_ACQ pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:08.005091 systemd[1]: var-lib-docker-overlay2-0bceb6771021e0410580948fccadfdcbfb5b45debedf737919bcbd13e5f215e6-merged.mount: Deactivated successfully. May 8 00:33:08.077493 systemd-networkd[1042]: docker0: Lost carrier May 8 00:33:08.717370 systemd-networkd[1042]: docker0: Gained IPv6LL May 8 00:33:14.916000 audit[1730]: USER_ACCT pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.917509 sudo[1730]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ May 8 00:33:14.917732 sudo[1730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:33:14.920751 kernel: kauditd_printk_skb: 372 callbacks suppressed May 8 00:33:14.920821 kernel: audit: type=1101 audit(1746664394.916:516): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.916000 audit[1730]: CRED_REFR pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.923740 kernel: audit: type=1110 audit(1746664394.916:517): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.924312 kernel: audit: type=1105 audit(1746664394.922:518): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.922000 audit[1730]: USER_START pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.925486 sudo[1730]: pam_unix(sudo:session): session closed for user root May 8 00:33:14.926994 sshd[1726]: pam_unix(sshd:session): session closed for user core May 8 00:33:14.924000 audit[1730]: USER_END pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.930526 kernel: audit: type=1106 audit(1746664394.924:519): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.930963 systemd[1]: Started sshd@13-10.0.0.29:22-10.0.0.1:39510.service. May 8 00:33:14.924000 audit[1730]: CRED_DISP pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.933179 systemd[1]: sshd@12-10.0.0.29:22-10.0.0.1:41788.service: Deactivated successfully. May 8 00:33:14.933891 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:33:14.934035 systemd[1]: session-13.scope: Consumed 3.663s CPU time. May 8 00:33:14.934343 kernel: audit: type=1104 audit(1746664394.924:520): pid=1730 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:14.938284 kernel: audit: type=1130 audit(1746664394.929:521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.29:22-10.0.0.1:39510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:14.938320 kernel: audit: type=1106 audit(1746664394.930:522): pid=1726 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.29:22-10.0.0.1:39510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:14.930000 audit[1726]: USER_END pid=1726 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.930000 audit[1726]: CRED_DISP pid=1726 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.941423 systemd-logind[1184]: Session 13 logged out. Waiting for processes to exit. May 8 00:33:14.942126 systemd-logind[1184]: Removed session 13. May 8 00:33:14.943777 kernel: audit: type=1104 audit(1746664394.930:523): pid=1726 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.943824 kernel: audit: type=1131 audit(1746664394.932:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.29:22-10.0.0.1:41788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:14.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.29:22-10.0.0.1:41788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:14.971000 audit[1786]: USER_ACCT pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.973313 sshd[1786]: Accepted publickey for core from 10.0.0.1 port 39510 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:33:14.974183 sshd[1786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:33:14.972000 audit[1786]: CRED_ACQ pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.972000 audit[1786]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6aa1360 a2=3 a3=1 items=0 ppid=1 pid=1786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:14.976291 kernel: audit: type=1101 audit(1746664394.971:525): pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:33:14.977497 systemd-logind[1184]: New session 14 of user core. May 8 00:33:14.978274 systemd[1]: Started session-14.scope. May 8 00:33:14.980000 audit[1786]: USER_START pid=1786 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:14.981000 audit[1789]: CRED_ACQ pid=1789 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:15.028000 audit[1791]: USER_ACCT pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.030012 sudo[1791]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext May 8 00:33:15.028000 audit[1791]: CRED_REFR pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.030226 sudo[1791]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:33:15.030000 audit[1791]: USER_START pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.036898 systemd[1]: ensure-sysext.service: Deactivated successfully. May 8 00:33:15.037051 systemd[1]: Stopped ensure-sysext.service. May 8 00:33:15.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.037110 systemd[1]: Stopping ensure-sysext.service... May 8 00:33:15.038321 systemd[1]: Stopping systemd-sysext.service... May 8 00:33:15.042029 systemd-sysext[1793]: Unmerged '/usr'. May 8 00:33:15.045817 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:33:15.056089 systemd[1]: Mounting usr-share-oem.mount... May 8 00:33:15.060653 systemd[1]: Mounted usr-share-oem.mount. May 8 00:33:15.061751 systemd[1]: systemd-sysext.service: Deactivated successfully. May 8 00:33:15.061934 systemd[1]: Stopped systemd-sysext.service. May 8 00:33:15.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.062199 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:15.062330 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:15.063780 systemd[1]: Starting systemd-sysext.service... May 8 00:33:15.069921 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:33:15.072762 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:33:15.072951 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:33:15.081263 kernel: loop4: detected capacity change from 0 to 315112 May 8 00:33:15.085263 kernel: EXT4-fs (loop4): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:15.112280 kernel: loop5: detected capacity change from 0 to 301296 May 8 00:33:15.116259 kernel: EXT4-fs (loop5): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:15.147279 kernel: loop6: detected capacity change from 0 to 315112 May 8 00:33:15.152729 kernel: EXT4-fs (loop6): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:15.152761 kernel: loop7: detected capacity change from 0 to 301296 May 8 00:33:15.156265 kernel: EXT4-fs (loop7): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:33:15.156377 (sd-sysext)[1805]: Using extensions 'containerd', 'docker'. May 8 00:33:15.157506 (sd-sysext)[1805]: Merged extensions into '/usr'. May 8 00:33:15.175986 systemd[1]: Mounting usr-share-oem.mount... May 8 00:33:15.182088 systemd[1]: Mounted usr-share-oem.mount. May 8 00:33:15.183389 systemd[1]: Finished systemd-sysext.service. May 8 00:33:15.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.182000 audit[1791]: USER_END pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.183000 audit[1791]: CRED_DISP pid=1791 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.184360 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:15.184136 sudo[1791]: pam_unix(sudo:session): session closed for user root May 8 00:33:15.184488 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:33:15.185814 systemd[1]: Starting ensure-sysext.service... May 8 00:33:15.187000 audit[1790]: USER_ACCT pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.188988 sudo[1790]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart docker containerd May 8 00:33:15.187000 audit[1790]: CRED_REFR pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.189220 sudo[1790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:33:15.189000 audit[1790]: USER_START pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.191527 systemd[1]: Reloading. May 8 00:33:15.290004 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:33:15.290206 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:33:15.305479 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:33:15.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.356000 audit: BPF prog-id=59 op=LOAD May 8 00:33:15.356000 audit: BPF prog-id=40 op=UNLOAD May 8 00:33:15.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.357000 audit: BPF prog-id=60 op=LOAD May 8 00:33:15.357000 audit: BPF prog-id=41 op=UNLOAD May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit: BPF prog-id=61 op=LOAD May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.358000 audit: BPF prog-id=62 op=LOAD May 8 00:33:15.358000 audit: BPF prog-id=42 op=UNLOAD May 8 00:33:15.358000 audit: BPF prog-id=43 op=UNLOAD May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit: BPF prog-id=63 op=LOAD May 8 00:33:15.359000 audit: BPF prog-id=44 op=UNLOAD May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit: BPF prog-id=64 op=LOAD May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.359000 audit: BPF prog-id=65 op=LOAD May 8 00:33:15.359000 audit: BPF prog-id=45 op=UNLOAD May 8 00:33:15.359000 audit: BPF prog-id=46 op=UNLOAD May 8 00:33:15.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.361000 audit: BPF prog-id=66 op=LOAD May 8 00:33:15.361000 audit: BPF prog-id=47 op=UNLOAD May 8 00:33:15.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit: BPF prog-id=67 op=LOAD May 8 00:33:15.363000 audit: BPF prog-id=48 op=UNLOAD May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit: BPF prog-id=68 op=LOAD May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit: BPF prog-id=69 op=LOAD May 8 00:33:15.363000 audit: BPF prog-id=49 op=UNLOAD May 8 00:33:15.363000 audit: BPF prog-id=50 op=UNLOAD May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit: BPF prog-id=70 op=LOAD May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.363000 audit: BPF prog-id=71 op=LOAD May 8 00:33:15.363000 audit: BPF prog-id=51 op=UNLOAD May 8 00:33:15.363000 audit: BPF prog-id=52 op=UNLOAD May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit: BPF prog-id=72 op=LOAD May 8 00:33:15.364000 audit: BPF prog-id=53 op=UNLOAD May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:15.364000 audit: BPF prog-id=73 op=LOAD May 8 00:33:15.364000 audit: BPF prog-id=54 op=UNLOAD May 8 00:33:15.374486 dockerd[1515]: time="2025-05-08T00:33:15.374423089Z" level=info msg="Processing signal 'terminated'" May 8 00:33:15.374465 systemd[1]: Stopping docker.service... May 8 00:33:15.377094 dockerd[1515]: time="2025-05-08T00:33:15.374997203Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby May 8 00:33:15.377094 dockerd[1515]: time="2025-05-08T00:33:15.375172224Z" level=info msg="Daemon shutdown complete" May 8 00:33:15.377144 systemd[1]: docker.service: Deactivated successfully. May 8 00:33:15.377378 systemd[1]: Stopped docker.service. May 8 00:33:15.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.382723 systemd[1]: Finished ensure-sysext.service. May 8 00:33:15.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.383678 systemd[1]: Stopped target multi-user.target. May 8 00:33:15.383697 systemd[1]: Stopping multi-user.target... May 8 00:33:15.383766 systemd[1]: Stopped target sockets.target. May 8 00:33:15.383775 systemd[1]: Stopping sockets.target... May 8 00:33:15.383840 systemd[1]: Stopped target timers.target. May 8 00:33:15.383847 systemd[1]: Stopping timers.target... May 8 00:33:15.383868 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:33:15.384017 systemd[1]: Reached target timers.target. May 8 00:33:15.384218 systemd[1]: docker.socket: Deactivated successfully. May 8 00:33:15.384505 systemd[1]: Closed docker.socket. May 8 00:33:15.384537 systemd[1]: Stopping docker.socket... May 8 00:33:15.385849 systemd[1]: Starting docker.socket... May 8 00:33:15.386153 containerd[1468]: time="2025-05-08T00:33:15.386121180Z" level=info msg="Stop CRI service" May 8 00:33:15.386189 systemd[1]: Stopping containerd.service... May 8 00:33:15.387489 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:33:15.390113 jq[1866]: false May 8 00:33:15.388814 systemd[1]: Starting extend-filesystems.service... May 8 00:33:15.390503 systemd[1]: Starting issuegen.service... May 8 00:33:15.391916 systemd[1]: Starting motdgen.service... May 8 00:33:15.393282 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:33:15.393355 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:33:15.394972 systemd[1]: containerd.service: Deactivated successfully. May 8 00:33:15.395171 systemd[1]: Stopped containerd.service. May 8 00:33:15.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.395523 systemd[1]: Listening on docker.socket. May 8 00:33:15.395870 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:33:15.396026 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:33:15.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.396539 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:33:15.397055 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:33:15.397634 systemd[1]: Reached target sockets.target. May 8 00:33:15.401145 extend-filesystems[1867]: Found loop2 May 8 00:33:15.401145 extend-filesystems[1867]: Found loop3 May 8 00:33:15.401145 extend-filesystems[1867]: Found loop6 May 8 00:33:15.401145 extend-filesystems[1867]: Found loop7 May 8 00:33:15.401145 extend-filesystems[1867]: Found vda May 8 00:33:15.401145 extend-filesystems[1867]: Found vda1 May 8 00:33:15.401145 extend-filesystems[1867]: Found vda2 May 8 00:33:15.401145 extend-filesystems[1867]: Found vda3 May 8 00:33:15.401145 extend-filesystems[1867]: Found usr May 8 00:33:15.401145 extend-filesystems[1867]: Found vda4 May 8 00:33:15.401145 extend-filesystems[1867]: Found vda6 May 8 00:33:15.401145 extend-filesystems[1867]: Found vda7 May 8 00:33:15.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.399149 systemd[1]: Starting containerd.service... May 8 00:33:15.410298 extend-filesystems[1867]: Found vda9 May 8 00:33:15.410298 extend-filesystems[1867]: Checking size of /dev/vda9 May 8 00:33:15.410298 extend-filesystems[1867]: Old size kept for /dev/vda9 May 8 00:33:15.401855 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:33:15.402021 systemd[1]: Finished issuegen.service. May 8 00:33:15.404778 systemd[1]: Started containerd.service. May 8 00:33:15.405674 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:33:15.406372 systemd[1]: Finished motdgen.service. May 8 00:33:15.408188 systemd[1]: Starting docker.service... May 8 00:33:15.415521 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:33:15.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.415700 systemd[1]: Finished extend-filesystems.service. May 8 00:33:15.417643 systemd[1]: Reached target multi-user.target. May 8 00:33:15.419296 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:33:15.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.431052 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:33:15.431226 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:33:15.575739 containerd[1886]: time="2025-05-08T00:33:15.575653548Z" level=info msg="starting containerd" revision=5b842e528e99d4d4c1686467debf2bd4b88ecd86 version=v1.6.15 May 8 00:33:15.593231 containerd[1886]: time="2025-05-08T00:33:15.593175659Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:33:15.593345 containerd[1886]: time="2025-05-08T00:33:15.593260371Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:15.594763 containerd[1886]: time="2025-05-08T00:33:15.594722783Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:33:15.594763 containerd[1886]: time="2025-05-08T00:33:15.594752486Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:15.594925 containerd[1886]: time="2025-05-08T00:33:15.594906359Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:33:15.594955 containerd[1886]: time="2025-05-08T00:33:15.594925228Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:33:15.594955 containerd[1886]: time="2025-05-08T00:33:15.594938181Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:33:15.594955 containerd[1886]: time="2025-05-08T00:33:15.594948935Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:33:15.595013 containerd[1886]: time="2025-05-08T00:33:15.594972721Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:15.595574 containerd[1886]: time="2025-05-08T00:33:15.595559029Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:33:15.595697 containerd[1886]: time="2025-05-08T00:33:15.595679840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:33:15.595723 containerd[1886]: time="2025-05-08T00:33:15.595697510Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:33:15.595723 containerd[1886]: time="2025-05-08T00:33:15.595714181Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:33:15.595764 containerd[1886]: time="2025-05-08T00:33:15.595724135Z" level=info msg="metadata content store policy set" policy=shared May 8 00:33:15.596056 containerd[1886]: time="2025-05-08T00:33:15.596030282Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:33:15.596056 containerd[1886]: time="2025-05-08T00:33:15.596052229Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:33:15.596105 containerd[1886]: time="2025-05-08T00:33:15.596065422Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:33:15.596105 containerd[1886]: time="2025-05-08T00:33:15.596093606Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596144 containerd[1886]: time="2025-05-08T00:33:15.596106679Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596144 containerd[1886]: time="2025-05-08T00:33:15.596120511Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596144 containerd[1886]: time="2025-05-08T00:33:15.596133343Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596496 containerd[1886]: time="2025-05-08T00:33:15.596477948Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596534 containerd[1886]: time="2025-05-08T00:33:15.596502294Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596534 containerd[1886]: time="2025-05-08T00:33:15.596517046Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596534 containerd[1886]: time="2025-05-08T00:33:15.596529999Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:33:15.596600 containerd[1886]: time="2025-05-08T00:33:15.596542592Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:33:15.596600 containerd[1886]: time="2025-05-08T00:33:15.596582689Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:33:15.596668 containerd[1886]: time="2025-05-08T00:33:15.596654728Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:33:15.597048 containerd[1886]: time="2025-05-08T00:33:15.597011646Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:33:15.597076 containerd[1886]: time="2025-05-08T00:33:15.597064936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597118 containerd[1886]: time="2025-05-08T00:33:15.597080607Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:33:15.597215 containerd[1886]: time="2025-05-08T00:33:15.597199939Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597253 containerd[1886]: time="2025-05-08T00:33:15.597220847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597311 containerd[1886]: time="2025-05-08T00:33:15.597243155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597338 containerd[1886]: time="2025-05-08T00:33:15.597317313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597338 containerd[1886]: time="2025-05-08T00:33:15.597330785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597413 containerd[1886]: time="2025-05-08T00:33:15.597342978Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597622 containerd[1886]: time="2025-05-08T00:33:15.597605589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597651 containerd[1886]: time="2025-05-08T00:33:15.597627057Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597680 containerd[1886]: time="2025-05-08T00:33:15.597641929Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:33:15.597722 containerd[1886]: time="2025-05-08T00:33:15.597700895Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597722 containerd[1886]: time="2025-05-08T00:33:15.597715927Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597767 containerd[1886]: time="2025-05-08T00:33:15.597728320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:33:15.597767 containerd[1886]: time="2025-05-08T00:33:15.597740313Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:33:15.597825 containerd[1886]: time="2025-05-08T00:33:15.597753905Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:33:15.597825 containerd[1886]: time="2025-05-08T00:33:15.597789605Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:33:15.597873 containerd[1886]: time="2025-05-08T00:33:15.597825425Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:33:15.597873 containerd[1886]: time="2025-05-08T00:33:15.597859685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:33:15.598121 containerd[1886]: time="2025-05-08T00:33:15.598075443Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:33:15.598224 containerd[1886]: time="2025-05-08T00:33:15.598132131Z" level=info msg="Connect containerd service" May 8 00:33:15.598224 containerd[1886]: time="2025-05-08T00:33:15.598160475Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:33:15.598803 containerd[1886]: time="2025-05-08T00:33:15.598781443Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:33:15.599370 containerd[1886]: time="2025-05-08T00:33:15.599349641Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:33:15.599416 containerd[1886]: time="2025-05-08T00:33:15.599404810Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:33:15.599457 containerd[1886]: time="2025-05-08T00:33:15.599422680Z" level=info msg="containerd successfully booted in 0.024782s" May 8 00:33:15.599483 containerd[1886]: time="2025-05-08T00:33:15.599332251Z" level=info msg="Start subscribing containerd event" May 8 00:33:15.599506 containerd[1886]: time="2025-05-08T00:33:15.599488602Z" level=info msg="Start recovering state" May 8 00:33:15.599563 containerd[1886]: time="2025-05-08T00:33:15.599550287Z" level=info msg="Start event monitor" May 8 00:33:15.599834 containerd[1886]: time="2025-05-08T00:33:15.599814498Z" level=info msg="Start snapshots syncer" May 8 00:33:15.599869 containerd[1886]: time="2025-05-08T00:33:15.599838404Z" level=info msg="Start cni network conf syncer for default" May 8 00:33:15.599869 containerd[1886]: time="2025-05-08T00:33:15.599852436Z" level=info msg="Start streaming server" May 8 00:33:15.628809 dockerd[1888]: time="2025-05-08T00:33:15.628769291Z" level=info msg="Starting up" May 8 00:33:15.630581 dockerd[1888]: time="2025-05-08T00:33:15.630557438Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:33:15.630581 dockerd[1888]: time="2025-05-08T00:33:15.630575788Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:33:15.630677 dockerd[1888]: time="2025-05-08T00:33:15.630594457Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc May 8 00:33:15.630677 dockerd[1888]: time="2025-05-08T00:33:15.630604531Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:33:15.637424 dockerd[1888]: time="2025-05-08T00:33:15.637389127Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:33:15.637424 dockerd[1888]: time="2025-05-08T00:33:15.637416432Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:33:15.637492 dockerd[1888]: time="2025-05-08T00:33:15.637433142Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc May 8 00:33:15.637492 dockerd[1888]: time="2025-05-08T00:33:15.637442617Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:33:15.646837 dockerd[1888]: time="2025-05-08T00:33:15.646801474Z" level=info msg="[graphdriver] using prior storage driver: overlay2" May 8 00:33:15.654567 dockerd[1888]: time="2025-05-08T00:33:15.654547005Z" level=info msg="Loading containers: start." May 8 00:33:15.659000 audit[1916]: NETFILTER_CFG table=nat:26 family=2 entries=1 op=nft_unregister_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.659000 audit[1916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=268 a0=3 a1=ffffd6096220 a2=0 a3=1 items=0 ppid=1888 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:33:15.674000 audit[1917]: NETFILTER_CFG table=nat:27 family=2 entries=1 op=nft_unregister_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.674000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=360 a0=3 a1=ffffd55c4e20 a2=0 a3=1 items=0 ppid=1888 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D44004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C0000002D2D647374003132372E302E302E302F38002D6A00444F434B4552 May 8 00:33:15.688000 audit[1921]: NETFILTER_CFG table=nat:28 family=2 entries=1 op=nft_unregister_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.688000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=88 a0=3 a1=fffff27aab00 a2=0 a3=1 items=0 ppid=1888 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4600444F434B4552 May 8 00:33:15.695000 audit[1922]: NETFILTER_CFG table=nat:29 family=2 entries=1 op=nft_unregister_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.695000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd7fc21d0 a2=0 a3=1 items=0 ppid=1888 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D5800444F434B4552 May 8 00:33:15.711000 audit[1926]: NETFILTER_CFG table=filter:30 family=2 entries=2 op=nft_unregister_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.711000 audit[1926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffff297880 a2=0 a3=1 items=0 ppid=1888 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.711000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:15.730000 audit[1928]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_unregister_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.730000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdc593a00 a2=0 a3=1 items=0 ppid=1888 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:15.736000 audit[1929]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_unregister_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.736000 audit[1929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=120 a0=3 a1=ffffe80d2e20 a2=0 a3=1 items=0 ppid=1888 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D5800444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:15.746000 audit[1933]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.746000 audit[1933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=88 a0=3 a1=ffffedeeb070 a2=0 a3=1 items=0 ppid=1888 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:33:15.750000 audit[1937]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.750000 audit[1937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc520d2e0 a2=0 a3=1 items=0 ppid=1888 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:15.751000 audit[1939]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.751000 audit[1939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe650070 a2=0 a3=1 items=0 ppid=1888 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:33:15.753000 audit[1941]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.753000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffebb0c0e0 a2=0 a3=1 items=0 ppid=1888 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:33:15.758000 audit[1946]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.758000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe78efe80 a2=0 a3=1 items=0 ppid=1888 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:33:15.762000 audit[1951]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.762000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=276 a0=3 a1=fffff775bcb0 a2=0 a3=1 items=0 ppid=1888 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:33:15.764000 audit[1953]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.764000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=368 a0=3 a1=fffff3348360 a2=0 a3=1 items=0 ppid=1888 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:33:15.769000 audit[1959]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_unregister_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.769000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=244 a0=3 a1=ffffe3666af0 a2=0 a3=1 items=0 ppid=1888 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:15.777000 audit[1960]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.777000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffd06e850 a2=0 a3=1 items=0 ppid=1888 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:15.779000 audit[1962]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1962 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.779000 audit[1962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffcdc82340 a2=0 a3=1 items=0 ppid=1888 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:15.781000 audit[1964]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_rule pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.781000 audit[1964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffea2663b0 a2=0 a3=1 items=0 ppid=1888 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:33:15.787000 audit[1966]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_unregister_rule pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.787000 audit[1966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=404 a0=3 a1=fffff2ed20c0 a2=0 a3=1 items=0 ppid=1888 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:33:15.798000 audit[1968]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_unregister_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.798000 audit[1968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=280 a0=3 a1=fffff8a04180 a2=0 a3=1 items=0 ppid=1888 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:33:15.809000 audit[1970]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_unregister_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.809000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=380 a0=3 a1=ffffebb17920 a2=0 a3=1 items=0 ppid=1888 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:33:15.817000 audit[1972]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_unregister_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.817000 audit[1972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=380 a0=3 a1=ffffef5c2350 a2=0 a3=1 items=0 ppid=1888 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:33:15.828000 audit[1975]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_unregister_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.828000 audit[1975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc5a5da70 a2=0 a3=1 items=0 ppid=1888 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:33:15.838000 audit[1978]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_unregister_rule pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.838000 audit[1978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=512 a0=3 a1=fffff4c5f9a0 a2=0 a3=1 items=0 ppid=1888 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:33:15.849000 audit[1980]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_unregister_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.849000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=420 a0=3 a1=ffffd810aa60 a2=0 a3=1 items=0 ppid=1888 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:15.858000 audit[1982]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_unregister_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.858000 audit[1982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc511feb0 a2=0 a3=1 items=0 ppid=1888 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.858000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:33:15.867628 dockerd[1888]: time="2025-05-08T00:33:15.867587532Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:33:15.869000 audit[1984]: NETFILTER_CFG table=nat:52 family=2 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.869000 audit[1984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=412 a0=3 a1=ffffce08f570 a2=0 a3=1 items=0 ppid=1888 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.869000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:33:15.870000 audit[1986]: NETFILTER_CFG table=nat:53 family=2 entries=1 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.870000 audit[1986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd76c1890 a2=0 a3=1 items=0 ppid=1888 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:33:15.873000 audit[1989]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.873000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc4e4a830 a2=0 a3=1 items=0 ppid=1888 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:33:15.874000 audit[1991]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.874000 audit[1991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe61ae5c0 a2=0 a3=1 items=0 ppid=1888 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.874000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:33:15.879000 audit[1997]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.879000 audit[1997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcea7a9c0 a2=0 a3=1 items=0 ppid=1888 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:33:15.881000 audit[1999]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.881000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd14a4ce0 a2=0 a3=1 items=0 ppid=1888 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.881000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:33:15.883000 audit[2001]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_unregister_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.883000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=244 a0=3 a1=ffffda16e280 a2=0 a3=1 items=0 ppid=1888 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:15.898000 audit[2002]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2002 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.898000 audit[2002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd61b14a0 a2=0 a3=1 items=0 ppid=1888 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.898000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:33:15.900000 audit[2004]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.900000 audit[2004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd6860cd0 a2=0 a3=1 items=0 ppid=1888 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:33:15.901000 audit[2006]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.901000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd0ca3a80 a2=0 a3=1 items=0 ppid=1888 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.901000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:33:15.907000 audit[2010]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_unregister_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.907000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc7cebc60 a2=0 a3=1 items=0 ppid=1888 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.907000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:15.917000 audit[2011]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:33:15.917000 audit[2011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffc1667b0 a2=0 a3=1 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:15.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:33:15.918397 dockerd[1888]: time="2025-05-08T00:33:15.918361563Z" level=info msg="Loading containers: done." May 8 00:33:15.952318 dockerd[1888]: time="2025-05-08T00:33:15.952213901Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:33:15.953296 dockerd[1888]: time="2025-05-08T00:33:15.953216013Z" level=info msg="Docker daemon" commit=6051f14 graphdriver(s)=overlay2 version=20.10.23 May 8 00:33:15.953590 dockerd[1888]: time="2025-05-08T00:33:15.953545867Z" level=info msg="Daemon has completed initialization" May 8 00:33:15.964801 systemd[1]: Started docker.service. May 8 00:33:15.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.965788 sudo[1790]: pam_unix(sudo:session): session closed for user root May 8 00:33:15.965000 audit[1790]: USER_END pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.965000 audit[1790]: CRED_DISP pid=1790 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:33:15.967116 sshd[1786]: pam_unix(sshd:session): session closed for user core May 8 00:33:15.967000 audit[1786]: USER_END pid=1786 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:15.967000 audit[1786]: CRED_DISP pid=1786 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:15.970078 systemd-logind[1184]: Session 14 logged out. Waiting for processes to exit. May 8 00:33:15.971092 systemd[1]: Started sshd@14-10.0.0.29:22-10.0.0.1:39526.service. May 8 00:33:15.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.29:22-10.0.0.1:39526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:15.974442 dockerd[1888]: time="2025-05-08T00:33:15.974398171Z" level=info msg="API listen on /run/docker.sock" May 8 00:33:16.012000 audit[2031]: USER_ACCT pid=2031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:16.014450 sshd[2031]: Accepted publickey for core from 10.0.0.1 port 39526 ssh2: RSA SHA256:bNzqUoNIi+loVoVjyqrqS2pcdituzSfXJGlDy1FbsUU May 8 00:33:16.014000 audit[2031]: CRED_ACQ pid=2031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:16.014000 audit[2031]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe085b8b0 a2=3 a3=1 items=0 ppid=1 pid=2031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.014000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:33:16.016022 sshd[2031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:33:16.019800 systemd-logind[1184]: New session 15 of user core. May 8 00:33:16.020359 systemd[1]: Started session-15.scope. May 8 00:33:16.022223 systemd[1]: sshd@13-10.0.0.29:22-10.0.0.1:39510.service: Deactivated successfully. May 8 00:33:16.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.29:22-10.0.0.1:39510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:16.022920 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:33:16.024000 audit[2031]: USER_START pid=2031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:16.026327 systemd-logind[1184]: Removed session 14. May 8 00:33:16.025000 audit[2034]: CRED_ACQ pid=2034 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:16.150141 systemd[1]: var-lib-docker-overlay2-1d16934363d9dab0a5f1c8b718ccec12f93ebae99c1d0f3a9cb19450bb28d70b\x2dinit-merged.mount: Deactivated successfully. May 8 00:33:16.171874 kernel: docker0: port 1(veth27fa944) entered blocking state May 8 00:33:16.171979 kernel: docker0: port 1(veth27fa944) entered disabled state May 8 00:33:16.172007 kernel: device veth27fa944 entered promiscuous mode May 8 00:33:16.168000 audit: ANOM_PROMISCUOUS dev=veth27fa944 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 May 8 00:33:16.168000 audit[1888]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=40 a0=e a1=4000ace4e0 a2=28 a3=0 items=0 ppid=1 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.168000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 May 8 00:33:16.172678 systemd-networkd[1042]: veth27fa944: Link UP May 8 00:33:16.207667 containerd[1886]: time="2025-05-08T00:33:16.207316198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:33:16.207667 containerd[1886]: time="2025-05-08T00:33:16.207348502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:33:16.207667 containerd[1886]: time="2025-05-08T00:33:16.207358497Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:33:16.207850 containerd[1886]: time="2025-05-08T00:33:16.207548643Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/512a5fa39ca4c906fbe685cd66dd552ec5dbdbe63c1df5cf809aeb80a63c9934 pid=2057 runtime=io.containerd.runc.v2 May 8 00:33:16.219351 systemd[1]: Started docker-512a5fa39ca4c906fbe685cd66dd552ec5dbdbe63c1df5cf809aeb80a63c9934.scope. May 8 00:33:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.225000 audit: BPF prog-id=74 op=LOAD May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000143b38 a2=10 a3=0 items=0 ppid=2057 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35313261356661333963613463393036666265363835636436 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001435a0 a2=3c a3=0 items=0 ppid=2057 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35313261356661333963613463393036666265363835636436 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit: BPF prog-id=75 op=LOAD May 8 00:33:16.226000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001438e0 a2=78 a3=0 items=0 ppid=2057 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35313261356661333963613463393036666265363835636436 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit: BPF prog-id=76 op=LOAD May 8 00:33:16.226000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000143670 a2=78 a3=0 items=0 ppid=2057 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35313261356661333963613463393036666265363835636436 May 8 00:33:16.226000 audit: BPF prog-id=76 op=UNLOAD May 8 00:33:16.226000 audit: BPF prog-id=75 op=UNLOAD May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:33:16.226000 audit: BPF prog-id=77 op=LOAD May 8 00:33:16.226000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000143b40 a2=78 a3=0 items=0 ppid=2057 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F35313261356661333963613463393036666265363835636436 May 8 00:33:16.288287 kernel: eth0: renamed from veth061c027 May 8 00:33:16.298707 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth27fa944: link becomes ready May 8 00:33:16.298762 kernel: docker0: port 1(veth27fa944) entered blocking state May 8 00:33:16.298788 kernel: docker0: port 1(veth27fa944) entered forwarding state May 8 00:33:16.298776 systemd-networkd[1042]: veth27fa944: Gained carrier May 8 00:33:16.298969 systemd-networkd[1042]: docker0: Gained carrier May 8 00:33:16.301867 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:33:16.316998 systemd[1]: docker-512a5fa39ca4c906fbe685cd66dd552ec5dbdbe63c1df5cf809aeb80a63c9934.scope: Deactivated successfully. May 8 00:33:16.315000 audit: BPF prog-id=74 op=UNLOAD May 8 00:33:16.329208 containerd[1886]: time="2025-05-08T00:33:16.329152077Z" level=info msg="shim disconnected" id=512a5fa39ca4c906fbe685cd66dd552ec5dbdbe63c1df5cf809aeb80a63c9934 May 8 00:33:16.329291 containerd[1886]: time="2025-05-08T00:33:16.329218044Z" level=warning msg="cleaning up after shim disconnected" id=512a5fa39ca4c906fbe685cd66dd552ec5dbdbe63c1df5cf809aeb80a63c9934 namespace=moby May 8 00:33:16.329291 containerd[1886]: time="2025-05-08T00:33:16.329229598Z" level=info msg="cleaning up dead shim" May 8 00:33:16.329359 dockerd[1888]: time="2025-05-08T00:33:16.329323552Z" level=info msg="ignoring event" container=512a5fa39ca4c906fbe685cd66dd552ec5dbdbe63c1df5cf809aeb80a63c9934 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" May 8 00:33:16.334344 containerd[1886]: time="2025-05-08T00:33:16.334316556Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:33:16Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2111 runtime=io.containerd.runc.v2\n" May 8 00:33:16.338074 systemd-networkd[1042]: veth27fa944: Lost carrier May 8 00:33:16.338305 kernel: docker0: port 1(veth27fa944) entered disabled state May 8 00:33:16.338344 kernel: veth061c027: renamed from eth0 May 8 00:33:16.366349 systemd-networkd[1042]: veth27fa944: Link DOWN May 8 00:33:16.368563 kernel: docker0: port 1(veth27fa944) entered disabled state May 8 00:33:16.368610 kernel: device veth27fa944 left promiscuous mode May 8 00:33:16.368635 kernel: docker0: port 1(veth27fa944) entered disabled state May 8 00:33:16.364000 audit: ANOM_PROMISCUOUS dev=veth27fa944 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 May 8 00:33:16.364000 audit[1888]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=32 a0=e a1=4000eb2a00 a2=20 a3=0 items=0 ppid=1 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:33:16.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 May 8 00:33:16.416550 sshd[2031]: pam_unix(sshd:session): session closed for user core May 8 00:33:16.416000 audit[2031]: USER_END pid=2031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:16.416000 audit[2031]: CRED_DISP pid=2031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:33:16.418839 systemd[1]: sshd@14-10.0.0.29:22-10.0.0.1:39526.service: Deactivated successfully. May 8 00:33:16.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.29:22-10.0.0.1:39526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:33:16.419547 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:33:16.420018 systemd-logind[1184]: Session 15 logged out. Waiting for processes to exit. May 8 00:33:16.420705 systemd-logind[1184]: Removed session 15. May 8 00:33:16.430000 audit: BPF prog-id=77 op=UNLOAD May 8 00:33:17.043293 systemd[1]: var-lib-docker-overlay2-1d16934363d9dab0a5f1c8b718ccec12f93ebae99c1d0f3a9cb19450bb28d70b-merged.mount: Deactivated successfully. May 8 00:33:17.229470 systemd-networkd[1042]: docker0: Lost carrier