Jul 10 00:34:55.853754 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed Jul 9 23:09:45 -00 2025 Jul 10 00:34:55.853773 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:34:55.853781 kernel: BIOS-provided physical RAM map: Jul 10 00:34:55.853786 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 10 00:34:55.853791 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 10 00:34:55.853797 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 10 00:34:55.853803 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jul 10 00:34:55.853809 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jul 10 00:34:55.853815 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 10 00:34:55.853820 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 10 00:34:55.853826 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 10 00:34:55.853831 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 10 00:34:55.853836 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jul 10 00:34:55.853842 kernel: NX (Execute Disable) protection: active Jul 10 00:34:55.853850 kernel: SMBIOS 2.8 present. Jul 10 00:34:55.853856 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jul 10 00:34:55.853862 kernel: Hypervisor detected: KVM Jul 10 00:34:55.853867 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 10 00:34:55.853873 kernel: kvm-clock: cpu 0, msr 6819a001, primary cpu clock Jul 10 00:34:55.853879 kernel: kvm-clock: using sched offset of 2396661765 cycles Jul 10 00:34:55.853886 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 10 00:34:55.853891 kernel: tsc: Detected 2794.748 MHz processor Jul 10 00:34:55.853898 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 10 00:34:55.853905 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 10 00:34:55.853911 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jul 10 00:34:55.853917 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 10 00:34:55.853923 kernel: Using GB pages for direct mapping Jul 10 00:34:55.853929 kernel: ACPI: Early table checksum verification disabled Jul 10 00:34:55.853935 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jul 10 00:34:55.853941 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853947 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853953 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853960 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jul 10 00:34:55.853966 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853972 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853978 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853984 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:34:55.853990 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jul 10 00:34:55.853996 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jul 10 00:34:55.854002 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jul 10 00:34:55.854011 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jul 10 00:34:55.854018 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jul 10 00:34:55.854024 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jul 10 00:34:55.854031 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jul 10 00:34:55.854037 kernel: No NUMA configuration found Jul 10 00:34:55.854043 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jul 10 00:34:55.854051 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jul 10 00:34:55.854057 kernel: Zone ranges: Jul 10 00:34:55.854064 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 10 00:34:55.854070 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jul 10 00:34:55.854076 kernel: Normal empty Jul 10 00:34:55.854083 kernel: Movable zone start for each node Jul 10 00:34:55.854089 kernel: Early memory node ranges Jul 10 00:34:55.854095 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 10 00:34:55.854101 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jul 10 00:34:55.854108 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jul 10 00:34:55.854116 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 10 00:34:55.854122 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 10 00:34:55.854128 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jul 10 00:34:55.854135 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 10 00:34:55.854141 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 10 00:34:55.854147 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 10 00:34:55.854154 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 10 00:34:55.854160 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 10 00:34:55.854167 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 10 00:34:55.854174 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 10 00:34:55.854181 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 10 00:34:55.854187 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 10 00:34:55.854194 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 10 00:34:55.854200 kernel: TSC deadline timer available Jul 10 00:34:55.854206 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 10 00:34:55.854213 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 10 00:34:55.854219 kernel: kvm-guest: setup PV sched yield Jul 10 00:34:55.854225 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 10 00:34:55.854233 kernel: Booting paravirtualized kernel on KVM Jul 10 00:34:55.854239 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 10 00:34:55.854257 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 10 00:34:55.854264 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 10 00:34:55.854270 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 10 00:34:55.854276 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 10 00:34:55.854282 kernel: kvm-guest: setup async PF for cpu 0 Jul 10 00:34:55.854289 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Jul 10 00:34:55.854295 kernel: kvm-guest: PV spinlocks enabled Jul 10 00:34:55.854303 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 10 00:34:55.854309 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Jul 10 00:34:55.854315 kernel: Policy zone: DMA32 Jul 10 00:34:55.854323 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:34:55.854330 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:34:55.854336 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 10 00:34:55.854343 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:34:55.854349 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:34:55.854357 kernel: Memory: 2436696K/2571752K available (12295K kernel code, 2275K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) Jul 10 00:34:55.854364 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 10 00:34:55.854370 kernel: ftrace: allocating 34602 entries in 136 pages Jul 10 00:34:55.854377 kernel: ftrace: allocated 136 pages with 2 groups Jul 10 00:34:55.854383 kernel: rcu: Hierarchical RCU implementation. Jul 10 00:34:55.854390 kernel: rcu: RCU event tracing is enabled. Jul 10 00:34:55.854397 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 10 00:34:55.854403 kernel: Rude variant of Tasks RCU enabled. Jul 10 00:34:55.854409 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:34:55.854417 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:34:55.854424 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 10 00:34:55.854430 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 10 00:34:55.854436 kernel: random: crng init done Jul 10 00:34:55.854442 kernel: Console: colour VGA+ 80x25 Jul 10 00:34:55.854449 kernel: printk: console [ttyS0] enabled Jul 10 00:34:55.854455 kernel: ACPI: Core revision 20210730 Jul 10 00:34:55.854462 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 10 00:34:55.854468 kernel: APIC: Switch to symmetric I/O mode setup Jul 10 00:34:55.854476 kernel: x2apic enabled Jul 10 00:34:55.854482 kernel: Switched APIC routing to physical x2apic. Jul 10 00:34:55.854488 kernel: kvm-guest: setup PV IPIs Jul 10 00:34:55.854495 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 10 00:34:55.854501 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 10 00:34:55.854508 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Jul 10 00:34:55.854514 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 10 00:34:55.854520 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 10 00:34:55.854527 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 10 00:34:55.854539 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 10 00:34:55.854554 kernel: Spectre V2 : Mitigation: Retpolines Jul 10 00:34:55.854561 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 10 00:34:55.854569 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 10 00:34:55.854576 kernel: RETBleed: Mitigation: untrained return thunk Jul 10 00:34:55.854582 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 10 00:34:55.854590 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 10 00:34:55.854597 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 10 00:34:55.854604 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 10 00:34:55.854612 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 10 00:34:55.854618 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 10 00:34:55.854625 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 10 00:34:55.854632 kernel: Freeing SMP alternatives memory: 32K Jul 10 00:34:55.854639 kernel: pid_max: default: 32768 minimum: 301 Jul 10 00:34:55.854645 kernel: LSM: Security Framework initializing Jul 10 00:34:55.854652 kernel: SELinux: Initializing. Jul 10 00:34:55.854659 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:34:55.854667 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:34:55.854674 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 10 00:34:55.854681 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 10 00:34:55.854688 kernel: ... version: 0 Jul 10 00:34:55.854694 kernel: ... bit width: 48 Jul 10 00:34:55.854701 kernel: ... generic registers: 6 Jul 10 00:34:55.854708 kernel: ... value mask: 0000ffffffffffff Jul 10 00:34:55.854714 kernel: ... max period: 00007fffffffffff Jul 10 00:34:55.854721 kernel: ... fixed-purpose events: 0 Jul 10 00:34:55.854729 kernel: ... event mask: 000000000000003f Jul 10 00:34:55.854736 kernel: signal: max sigframe size: 1776 Jul 10 00:34:55.854742 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:34:55.854749 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:34:55.854756 kernel: x86: Booting SMP configuration: Jul 10 00:34:55.854762 kernel: .... node #0, CPUs: #1 Jul 10 00:34:55.854769 kernel: kvm-clock: cpu 1, msr 6819a041, secondary cpu clock Jul 10 00:34:55.854776 kernel: kvm-guest: setup async PF for cpu 1 Jul 10 00:34:55.854782 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Jul 10 00:34:55.854790 kernel: #2 Jul 10 00:34:55.854797 kernel: kvm-clock: cpu 2, msr 6819a081, secondary cpu clock Jul 10 00:34:55.854804 kernel: kvm-guest: setup async PF for cpu 2 Jul 10 00:34:55.854810 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Jul 10 00:34:55.854817 kernel: #3 Jul 10 00:34:55.854824 kernel: kvm-clock: cpu 3, msr 6819a0c1, secondary cpu clock Jul 10 00:34:55.854830 kernel: kvm-guest: setup async PF for cpu 3 Jul 10 00:34:55.854837 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Jul 10 00:34:55.854844 kernel: smp: Brought up 1 node, 4 CPUs Jul 10 00:34:55.854851 kernel: smpboot: Max logical packages: 1 Jul 10 00:34:55.854858 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Jul 10 00:34:55.854865 kernel: devtmpfs: initialized Jul 10 00:34:55.854872 kernel: x86/mm: Memory block size: 128MB Jul 10 00:34:55.854879 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:34:55.854886 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 10 00:34:55.854892 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:34:55.854899 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:34:55.854906 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:34:55.854913 kernel: audit: type=2000 audit(1752107696.400:1): state=initialized audit_enabled=0 res=1 Jul 10 00:34:55.854920 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:34:55.854927 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 10 00:34:55.854934 kernel: cpuidle: using governor menu Jul 10 00:34:55.854941 kernel: ACPI: bus type PCI registered Jul 10 00:34:55.854947 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:34:55.854954 kernel: dca service started, version 1.12.1 Jul 10 00:34:55.854961 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 10 00:34:55.854968 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 10 00:34:55.854975 kernel: PCI: Using configuration type 1 for base access Jul 10 00:34:55.854983 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 10 00:34:55.854990 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:34:55.854997 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:34:55.855004 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:34:55.855010 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:34:55.855017 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:34:55.855024 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:34:55.855031 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:34:55.855037 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:34:55.855045 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:34:55.855052 kernel: ACPI: Interpreter enabled Jul 10 00:34:55.855058 kernel: ACPI: PM: (supports S0 S3 S5) Jul 10 00:34:55.855065 kernel: ACPI: Using IOAPIC for interrupt routing Jul 10 00:34:55.855072 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 10 00:34:55.855079 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 10 00:34:55.855086 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 10 00:34:55.855191 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:34:55.855278 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 10 00:34:55.855346 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 10 00:34:55.855355 kernel: PCI host bridge to bus 0000:00 Jul 10 00:34:55.855427 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 10 00:34:55.855489 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 10 00:34:55.855559 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 10 00:34:55.855621 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 10 00:34:55.855684 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 10 00:34:55.855743 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jul 10 00:34:55.855802 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 10 00:34:55.855883 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 10 00:34:55.855960 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 10 00:34:55.856029 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jul 10 00:34:55.856099 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jul 10 00:34:55.856167 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jul 10 00:34:55.856234 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 10 00:34:55.856329 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 10 00:34:55.856398 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 10 00:34:55.856469 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jul 10 00:34:55.856538 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jul 10 00:34:55.856626 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 10 00:34:55.856695 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jul 10 00:34:55.856762 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jul 10 00:34:55.856829 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jul 10 00:34:55.856902 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 10 00:34:55.856972 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jul 10 00:34:55.857038 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jul 10 00:34:55.857108 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jul 10 00:34:55.857175 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jul 10 00:34:55.857261 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 10 00:34:55.857331 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 10 00:34:55.857404 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 10 00:34:55.857471 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jul 10 00:34:55.857540 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jul 10 00:34:55.857625 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 10 00:34:55.857693 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 10 00:34:55.857702 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 10 00:34:55.857709 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 10 00:34:55.857716 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 10 00:34:55.857723 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 10 00:34:55.857730 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 10 00:34:55.857739 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 10 00:34:55.857746 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 10 00:34:55.857753 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 10 00:34:55.857759 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 10 00:34:55.857766 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 10 00:34:55.857773 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 10 00:34:55.857780 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 10 00:34:55.857787 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 10 00:34:55.857793 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 10 00:34:55.857801 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 10 00:34:55.857808 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 10 00:34:55.857815 kernel: iommu: Default domain type: Translated Jul 10 00:34:55.857822 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 10 00:34:55.857890 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 10 00:34:55.857956 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 10 00:34:55.858022 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 10 00:34:55.858031 kernel: vgaarb: loaded Jul 10 00:34:55.858038 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:34:55.858047 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:34:55.858053 kernel: PTP clock support registered Jul 10 00:34:55.858060 kernel: PCI: Using ACPI for IRQ routing Jul 10 00:34:55.858067 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 10 00:34:55.858074 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 10 00:34:55.858081 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jul 10 00:34:55.858087 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 10 00:34:55.858094 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 10 00:34:55.858101 kernel: clocksource: Switched to clocksource kvm-clock Jul 10 00:34:55.858109 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:34:55.858115 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:34:55.858122 kernel: pnp: PnP ACPI init Jul 10 00:34:55.858195 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 10 00:34:55.858205 kernel: pnp: PnP ACPI: found 6 devices Jul 10 00:34:55.858212 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 10 00:34:55.858219 kernel: NET: Registered PF_INET protocol family Jul 10 00:34:55.858225 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 10 00:34:55.858234 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 10 00:34:55.858241 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:34:55.858260 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:34:55.858267 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 10 00:34:55.858274 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 10 00:34:55.858281 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:34:55.858288 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:34:55.858295 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:34:55.858303 kernel: NET: Registered PF_XDP protocol family Jul 10 00:34:55.858368 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 10 00:34:55.858429 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 10 00:34:55.858488 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 10 00:34:55.858558 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 10 00:34:55.858619 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 10 00:34:55.858679 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jul 10 00:34:55.858687 kernel: PCI: CLS 0 bytes, default 64 Jul 10 00:34:55.858694 kernel: Initialise system trusted keyrings Jul 10 00:34:55.858703 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 10 00:34:55.858710 kernel: Key type asymmetric registered Jul 10 00:34:55.858717 kernel: Asymmetric key parser 'x509' registered Jul 10 00:34:55.858723 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:34:55.858730 kernel: io scheduler mq-deadline registered Jul 10 00:34:55.858737 kernel: io scheduler kyber registered Jul 10 00:34:55.858744 kernel: io scheduler bfq registered Jul 10 00:34:55.858750 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 10 00:34:55.858757 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 10 00:34:55.858765 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 10 00:34:55.858772 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 10 00:34:55.858779 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:34:55.858786 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 10 00:34:55.858793 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 10 00:34:55.858800 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 10 00:34:55.858806 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 10 00:34:55.858914 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 10 00:34:55.858925 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 10 00:34:55.858989 kernel: rtc_cmos 00:04: registered as rtc0 Jul 10 00:34:55.859105 kernel: rtc_cmos 00:04: setting system clock to 2025-07-10T00:34:55 UTC (1752107695) Jul 10 00:34:55.859186 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 10 00:34:55.859196 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:34:55.859203 kernel: Segment Routing with IPv6 Jul 10 00:34:55.859210 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:34:55.859217 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:34:55.859224 kernel: Key type dns_resolver registered Jul 10 00:34:55.859233 kernel: IPI shorthand broadcast: enabled Jul 10 00:34:55.859239 kernel: sched_clock: Marking stable (453525702, 97674486)->(565102950, -13902762) Jul 10 00:34:55.859259 kernel: registered taskstats version 1 Jul 10 00:34:55.859266 kernel: Loading compiled-in X.509 certificates Jul 10 00:34:55.859273 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 6ebecdd7757c0df63fc51731f0b99957f4e4af16' Jul 10 00:34:55.859280 kernel: Key type .fscrypt registered Jul 10 00:34:55.859286 kernel: Key type fscrypt-provisioning registered Jul 10 00:34:55.859293 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:34:55.859300 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:34:55.859308 kernel: ima: No architecture policies found Jul 10 00:34:55.859315 kernel: clk: Disabling unused clocks Jul 10 00:34:55.859322 kernel: Freeing unused kernel image (initmem) memory: 47472K Jul 10 00:34:55.859329 kernel: Write protecting the kernel read-only data: 28672k Jul 10 00:34:55.859336 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 10 00:34:55.859342 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Jul 10 00:34:55.859349 kernel: Run /init as init process Jul 10 00:34:55.859356 kernel: with arguments: Jul 10 00:34:55.859363 kernel: /init Jul 10 00:34:55.859370 kernel: with environment: Jul 10 00:34:55.859377 kernel: HOME=/ Jul 10 00:34:55.859384 kernel: TERM=linux Jul 10 00:34:55.859390 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:34:55.859399 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:34:55.859408 systemd[1]: Detected virtualization kvm. Jul 10 00:34:55.859416 systemd[1]: Detected architecture x86-64. Jul 10 00:34:55.859423 systemd[1]: Running in initrd. Jul 10 00:34:55.859431 systemd[1]: No hostname configured, using default hostname. Jul 10 00:34:55.859438 systemd[1]: Hostname set to . Jul 10 00:34:55.859446 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:34:55.859453 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:34:55.859460 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:34:55.859467 systemd[1]: Reached target cryptsetup.target. Jul 10 00:34:55.859474 systemd[1]: Reached target paths.target. Jul 10 00:34:55.859495 systemd[1]: Reached target slices.target. Jul 10 00:34:55.859504 systemd[1]: Reached target swap.target. Jul 10 00:34:55.859517 systemd[1]: Reached target timers.target. Jul 10 00:34:55.859526 systemd[1]: Listening on iscsid.socket. Jul 10 00:34:55.859533 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:34:55.859540 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:34:55.859558 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:34:55.859565 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:34:55.859573 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:34:55.859581 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:34:55.859588 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:34:55.859596 systemd[1]: Reached target sockets.target. Jul 10 00:34:55.859603 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:34:55.859611 systemd[1]: Finished network-cleanup.service. Jul 10 00:34:55.859618 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:34:55.859627 systemd[1]: Starting systemd-journald.service... Jul 10 00:34:55.859634 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:34:55.859642 systemd[1]: Starting systemd-resolved.service... Jul 10 00:34:55.859649 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:34:55.859657 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:34:55.859667 systemd-journald[196]: Journal started Jul 10 00:34:55.859704 systemd-journald[196]: Runtime Journal (/run/log/journal/03d07cb6f67445cf8a596c1fe711b6bf) is 6.0M, max 48.5M, 42.5M free. Jul 10 00:34:55.859145 systemd-modules-load[197]: Inserted module 'overlay' Jul 10 00:34:55.889918 kernel: audit: type=1130 audit(1752107695.884:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.889948 systemd[1]: Started systemd-journald.service. Jul 10 00:34:55.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.872953 systemd-resolved[198]: Positive Trust Anchors: Jul 10 00:34:55.894663 kernel: audit: type=1130 audit(1752107695.890:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.872964 systemd-resolved[198]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:34:55.899595 kernel: audit: type=1130 audit(1752107695.894:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.872991 systemd-resolved[198]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:34:55.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.875090 systemd-resolved[198]: Defaulting to hostname 'linux'. Jul 10 00:34:55.913329 kernel: audit: type=1130 audit(1752107695.899:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.913345 kernel: audit: type=1130 audit(1752107695.903:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.890821 systemd[1]: Started systemd-resolved.service. Jul 10 00:34:55.895196 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:34:55.900106 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:34:55.903385 systemd[1]: Reached target nss-lookup.target. Jul 10 00:34:55.914301 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:34:55.915754 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:34:55.925465 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:34:55.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.929065 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:34:55.933352 kernel: audit: type=1130 audit(1752107695.925:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.933372 kernel: audit: type=1130 audit(1752107695.929:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.930342 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:34:55.937272 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:34:55.938554 dracut-cmdline[214]: dracut-dracut-053 Jul 10 00:34:55.940739 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:34:55.949143 systemd-modules-load[197]: Inserted module 'br_netfilter' Jul 10 00:34:55.950220 kernel: Bridge firewalling registered Jul 10 00:34:55.970275 kernel: SCSI subsystem initialized Jul 10 00:34:55.983398 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:34:55.983436 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:34:55.983451 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:34:55.986414 systemd-modules-load[197]: Inserted module 'dm_multipath' Jul 10 00:34:55.987204 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:34:55.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:55.990923 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:34:55.993334 kernel: audit: type=1130 audit(1752107695.987:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.000313 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:34:56.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.005271 kernel: audit: type=1130 audit(1752107696.001:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.008270 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:34:56.026268 kernel: iscsi: registered transport (tcp) Jul 10 00:34:56.047278 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:34:56.047297 kernel: QLogic iSCSI HBA Driver Jul 10 00:34:56.075667 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:34:56.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.076955 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:34:56.122288 kernel: raid6: avx2x4 gen() 29834 MB/s Jul 10 00:34:56.139285 kernel: raid6: avx2x4 xor() 7125 MB/s Jul 10 00:34:56.156278 kernel: raid6: avx2x2 gen() 26428 MB/s Jul 10 00:34:56.173274 kernel: raid6: avx2x2 xor() 18906 MB/s Jul 10 00:34:56.190285 kernel: raid6: avx2x1 gen() 25945 MB/s Jul 10 00:34:56.230291 kernel: raid6: avx2x1 xor() 15028 MB/s Jul 10 00:34:56.247276 kernel: raid6: sse2x4 gen() 14506 MB/s Jul 10 00:34:56.264274 kernel: raid6: sse2x4 xor() 7499 MB/s Jul 10 00:34:56.281272 kernel: raid6: sse2x2 gen() 16126 MB/s Jul 10 00:34:56.298284 kernel: raid6: sse2x2 xor() 9618 MB/s Jul 10 00:34:56.315279 kernel: raid6: sse2x1 gen() 12017 MB/s Jul 10 00:34:56.332675 kernel: raid6: sse2x1 xor() 7678 MB/s Jul 10 00:34:56.332688 kernel: raid6: using algorithm avx2x4 gen() 29834 MB/s Jul 10 00:34:56.332696 kernel: raid6: .... xor() 7125 MB/s, rmw enabled Jul 10 00:34:56.333344 kernel: raid6: using avx2x2 recovery algorithm Jul 10 00:34:56.346275 kernel: xor: automatically using best checksumming function avx Jul 10 00:34:56.442277 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 10 00:34:56.450938 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:34:56.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.452000 audit: BPF prog-id=7 op=LOAD Jul 10 00:34:56.452000 audit: BPF prog-id=8 op=LOAD Jul 10 00:34:56.452992 systemd[1]: Starting systemd-udevd.service... Jul 10 00:34:56.466143 systemd-udevd[399]: Using default interface naming scheme 'v252'. Jul 10 00:34:56.471116 systemd[1]: Started systemd-udevd.service. Jul 10 00:34:56.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.473864 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:34:56.483982 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Jul 10 00:34:56.509741 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:34:56.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.512214 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:34:56.543195 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:34:56.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:56.570279 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jul 10 00:34:56.571964 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:34:56.584309 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:34:56.594886 kernel: AVX2 version of gcm_enc/dec engaged. Jul 10 00:34:56.594924 kernel: libata version 3.00 loaded. Jul 10 00:34:56.594937 kernel: AES CTR mode by8 optimization enabled Jul 10 00:34:56.606279 kernel: ahci 0000:00:1f.2: version 3.0 Jul 10 00:34:56.621927 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 10 00:34:56.621948 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 10 00:34:56.622059 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 10 00:34:56.622153 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (441) Jul 10 00:34:56.622166 kernel: scsi host0: ahci Jul 10 00:34:56.622318 kernel: scsi host1: ahci Jul 10 00:34:56.622424 kernel: scsi host2: ahci Jul 10 00:34:56.622544 kernel: scsi host3: ahci Jul 10 00:34:56.622653 kernel: scsi host4: ahci Jul 10 00:34:56.622762 kernel: scsi host5: ahci Jul 10 00:34:56.622883 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jul 10 00:34:56.622897 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jul 10 00:34:56.622908 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jul 10 00:34:56.622920 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jul 10 00:34:56.622933 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jul 10 00:34:56.622944 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jul 10 00:34:56.613741 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:34:56.663272 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:34:56.663709 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:34:56.667440 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:34:56.671325 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:34:56.672536 systemd[1]: Starting disk-uuid.service... Jul 10 00:34:56.680273 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:34:56.684274 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:34:56.927295 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 10 00:34:56.927368 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 10 00:34:56.928278 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 10 00:34:56.931163 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 10 00:34:56.931296 kernel: ata3.00: applying bridge limits Jul 10 00:34:56.931318 kernel: ata3.00: configured for UDMA/100 Jul 10 00:34:56.931328 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 10 00:34:56.937279 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 10 00:34:56.937300 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 10 00:34:56.938276 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 10 00:34:56.970452 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 10 00:34:56.988002 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 10 00:34:56.988014 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 10 00:34:57.812871 disk-uuid[526]: The operation has completed successfully. Jul 10 00:34:57.814006 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:34:57.835850 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:34:57.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:57.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:57.835940 systemd[1]: Finished disk-uuid.service. Jul 10 00:34:57.856162 systemd[1]: Starting verity-setup.service... Jul 10 00:34:57.868266 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 10 00:34:57.888008 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:34:57.889636 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:34:57.891925 systemd[1]: Finished verity-setup.service. Jul 10 00:34:57.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:57.952270 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:34:57.952452 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:34:57.952846 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 10 00:34:57.953571 systemd[1]: Starting ignition-setup.service... Jul 10 00:34:57.954635 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:34:57.966054 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:34:57.966084 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:34:57.966096 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:34:57.973675 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:34:58.019950 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:34:58.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.021000 audit: BPF prog-id=9 op=LOAD Jul 10 00:34:58.022185 systemd[1]: Starting systemd-networkd.service... Jul 10 00:34:58.041603 systemd-networkd[710]: lo: Link UP Jul 10 00:34:58.041612 systemd-networkd[710]: lo: Gained carrier Jul 10 00:34:58.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.042015 systemd-networkd[710]: Enumeration completed Jul 10 00:34:58.042097 systemd[1]: Started systemd-networkd.service. Jul 10 00:34:58.042261 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:34:58.042723 systemd[1]: Reached target network.target. Jul 10 00:34:58.043411 systemd-networkd[710]: eth0: Link UP Jul 10 00:34:58.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.043416 systemd-networkd[710]: eth0: Gained carrier Jul 10 00:34:58.045594 systemd[1]: Starting iscsiuio.service... Jul 10 00:34:58.050148 systemd[1]: Started iscsiuio.service. Jul 10 00:34:58.051321 systemd[1]: Starting iscsid.service... Jul 10 00:34:58.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.063135 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:34:58.063135 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:34:58.063135 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:34:58.063135 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:34:58.063135 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:34:58.063135 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:34:58.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.060398 systemd[1]: Started iscsid.service. Jul 10 00:34:58.061817 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:34:58.071727 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:34:58.072349 systemd-networkd[710]: eth0: DHCPv4 address 10.0.0.24/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:34:58.075885 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:34:58.077467 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:34:58.079138 systemd[1]: Reached target remote-fs.target. Jul 10 00:34:58.084904 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:34:58.092381 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:34:58.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.174341 systemd[1]: Finished ignition-setup.service. Jul 10 00:34:58.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.177023 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:34:58.214167 ignition[730]: Ignition 2.14.0 Jul 10 00:34:58.214176 ignition[730]: Stage: fetch-offline Jul 10 00:34:58.214228 ignition[730]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:34:58.214235 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:34:58.214340 ignition[730]: parsed url from cmdline: "" Jul 10 00:34:58.214343 ignition[730]: no config URL provided Jul 10 00:34:58.214347 ignition[730]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:34:58.214354 ignition[730]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:34:58.214370 ignition[730]: op(1): [started] loading QEMU firmware config module Jul 10 00:34:58.214374 ignition[730]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 10 00:34:58.223099 ignition[730]: op(1): [finished] loading QEMU firmware config module Jul 10 00:34:58.224400 ignition[730]: parsing config with SHA512: b86473e2f6872b38e9cfe254ea0aee1831f2f3cf73713d5263157600ae7b2fea2bab5e0bd15896d56944cd96619b250451634c52ef38fc7bb67e43c8c36ab958 Jul 10 00:34:58.233175 unknown[730]: fetched base config from "system" Jul 10 00:34:58.233187 unknown[730]: fetched user config from "qemu" Jul 10 00:34:58.233590 ignition[730]: fetch-offline: fetch-offline passed Jul 10 00:34:58.233660 ignition[730]: Ignition finished successfully Jul 10 00:34:58.237089 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:34:58.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.239138 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:34:58.241478 systemd[1]: Starting ignition-kargs.service... Jul 10 00:34:58.251283 ignition[738]: Ignition 2.14.0 Jul 10 00:34:58.251292 ignition[738]: Stage: kargs Jul 10 00:34:58.251385 ignition[738]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:34:58.251393 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:34:58.252157 ignition[738]: kargs: kargs passed Jul 10 00:34:58.252195 ignition[738]: Ignition finished successfully Jul 10 00:34:58.256714 systemd[1]: Finished ignition-kargs.service. Jul 10 00:34:58.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.259056 systemd[1]: Starting ignition-disks.service... Jul 10 00:34:58.267066 ignition[744]: Ignition 2.14.0 Jul 10 00:34:58.267074 ignition[744]: Stage: disks Jul 10 00:34:58.267149 ignition[744]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:34:58.267157 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:34:58.267840 ignition[744]: disks: disks passed Jul 10 00:34:58.267873 ignition[744]: Ignition finished successfully Jul 10 00:34:58.272222 systemd[1]: Finished ignition-disks.service. Jul 10 00:34:58.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.273920 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:34:58.274545 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:34:58.276017 systemd[1]: Reached target local-fs.target. Jul 10 00:34:58.277556 systemd[1]: Reached target sysinit.target. Jul 10 00:34:58.278997 systemd[1]: Reached target basic.target. Jul 10 00:34:58.282072 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:34:58.293671 systemd-fsck[752]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 10 00:34:58.298988 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:34:58.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.301135 systemd[1]: Mounting sysroot.mount... Jul 10 00:34:58.307279 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:34:58.307260 systemd[1]: Mounted sysroot.mount. Jul 10 00:34:58.308146 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:34:58.310515 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:34:58.312074 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:34:58.312102 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:34:58.312119 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:34:58.314350 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:34:58.316849 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:34:58.322329 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:34:58.325317 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:34:58.329040 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:34:58.331952 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:34:58.362647 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:34:58.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.364494 systemd[1]: Starting ignition-mount.service... Jul 10 00:34:58.365573 systemd[1]: Starting sysroot-boot.service... Jul 10 00:34:58.373459 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Jul 10 00:34:58.381826 ignition[805]: INFO : Ignition 2.14.0 Jul 10 00:34:58.382975 ignition[805]: INFO : Stage: mount Jul 10 00:34:58.382975 ignition[805]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:34:58.382975 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:34:58.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.382580 systemd[1]: Finished sysroot-boot.service. Jul 10 00:34:58.389467 ignition[805]: INFO : mount: mount passed Jul 10 00:34:58.389467 ignition[805]: INFO : Ignition finished successfully Jul 10 00:34:58.384880 systemd[1]: Finished ignition-mount.service. Jul 10 00:34:58.898570 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:34:58.905280 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (814) Jul 10 00:34:58.907857 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:34:58.907884 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:34:58.907893 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:34:58.912651 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:34:58.915194 systemd[1]: Starting ignition-files.service... Jul 10 00:34:58.927995 ignition[834]: INFO : Ignition 2.14.0 Jul 10 00:34:58.927995 ignition[834]: INFO : Stage: files Jul 10 00:34:58.929718 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:34:58.929718 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:34:58.929718 ignition[834]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:34:58.933495 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:34:58.933495 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:34:58.933495 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:34:58.933495 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:34:58.933495 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:34:58.933495 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:34:58.932514 unknown[834]: wrote ssh authorized keys file for user: core Jul 10 00:34:58.945083 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:34:58.945083 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 10 00:34:58.945083 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 10 00:34:58.945083 ignition[834]: INFO : files: op(5): [started] processing unit "coreos-metadata.service" Jul 10 00:34:58.945083 ignition[834]: INFO : files: op(5): op(6): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:34:58.945083 ignition[834]: INFO : files: op(5): op(6): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:34:58.945083 ignition[834]: INFO : files: op(5): [finished] processing unit "coreos-metadata.service" Jul 10 00:34:58.945083 ignition[834]: INFO : files: op(7): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:34:58.945083 ignition[834]: INFO : files: op(7): op(8): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:34:58.964703 ignition[834]: INFO : files: op(7): op(8): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:34:58.966908 ignition[834]: INFO : files: op(7): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:34:58.966908 ignition[834]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:34:58.966908 ignition[834]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:34:58.966908 ignition[834]: INFO : files: files passed Jul 10 00:34:58.966908 ignition[834]: INFO : Ignition finished successfully Jul 10 00:34:58.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.965776 systemd[1]: Finished ignition-files.service. Jul 10 00:34:58.967612 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:34:58.969506 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:34:58.982446 initrd-setup-root-after-ignition[859]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 10 00:34:58.970350 systemd[1]: Starting ignition-quench.service... Jul 10 00:34:58.984750 initrd-setup-root-after-ignition[861]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:34:58.972954 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:34:58.973029 systemd[1]: Finished ignition-quench.service. Jul 10 00:34:58.975656 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:34:58.977155 systemd[1]: Reached target ignition-complete.target. Jul 10 00:34:58.978647 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:34:58.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:58.989144 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:34:58.989209 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:34:58.990730 systemd[1]: Reached target initrd-fs.target. Jul 10 00:34:58.992199 systemd[1]: Reached target initrd.target. Jul 10 00:34:58.992971 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:34:58.993528 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:34:59.002592 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:34:59.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.003559 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:34:59.011651 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:34:59.012693 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:34:59.014383 systemd[1]: Stopped target timers.target. Jul 10 00:34:59.016144 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:34:59.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.016260 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:34:59.018011 systemd[1]: Stopped target initrd.target. Jul 10 00:34:59.019932 systemd[1]: Stopped target basic.target. Jul 10 00:34:59.021593 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:34:59.023143 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:34:59.024936 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:34:59.026948 systemd[1]: Stopped target remote-fs.target. Jul 10 00:34:59.028898 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:34:59.030806 systemd[1]: Stopped target sysinit.target. Jul 10 00:34:59.032440 systemd[1]: Stopped target local-fs.target. Jul 10 00:34:59.034417 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:34:59.036154 systemd[1]: Stopped target swap.target. Jul 10 00:34:59.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.037603 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:34:59.037719 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:34:59.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.039276 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:34:59.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.040686 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:34:59.040794 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:34:59.042547 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:34:59.042648 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:34:59.044124 systemd[1]: Stopped target paths.target. Jul 10 00:34:59.045538 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:34:59.049310 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:34:59.050716 systemd[1]: Stopped target slices.target. Jul 10 00:34:59.052618 systemd[1]: Stopped target sockets.target. Jul 10 00:34:59.054453 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:34:59.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.054546 systemd[1]: Closed iscsid.socket. Jul 10 00:34:59.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.056116 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:34:59.056217 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:34:59.058078 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:34:59.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.058175 systemd[1]: Stopped ignition-files.service. Jul 10 00:34:59.060533 systemd[1]: Stopping ignition-mount.service... Jul 10 00:34:59.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.069409 ignition[874]: INFO : Ignition 2.14.0 Jul 10 00:34:59.069409 ignition[874]: INFO : Stage: umount Jul 10 00:34:59.069409 ignition[874]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:34:59.069409 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:34:59.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.062075 systemd[1]: Stopping iscsiuio.service... Jul 10 00:34:59.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.075469 ignition[874]: INFO : umount: umount passed Jul 10 00:34:59.075469 ignition[874]: INFO : Ignition finished successfully Jul 10 00:34:59.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.063042 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:34:59.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.063167 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:34:59.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.065657 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:34:59.066302 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:34:59.066452 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:34:59.067954 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:34:59.068062 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:34:59.071380 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:34:59.071455 systemd[1]: Stopped iscsiuio.service. Jul 10 00:34:59.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.073080 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:34:59.073148 systemd[1]: Stopped ignition-mount.service. Jul 10 00:34:59.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.075643 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:34:59.075707 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:34:59.077705 systemd[1]: Stopped target network.target. Jul 10 00:34:59.078553 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:34:59.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.078581 systemd[1]: Closed iscsiuio.socket. Jul 10 00:34:59.100000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:34:59.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.079486 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:34:59.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.079517 systemd[1]: Stopped ignition-disks.service. Jul 10 00:34:59.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.081129 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:34:59.081159 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:34:59.081571 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:34:59.081601 systemd[1]: Stopped ignition-setup.service. Jul 10 00:34:59.081799 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:34:59.081975 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:34:59.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.082823 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:34:59.083150 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:34:59.083213 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:34:59.083336 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:34:59.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.083365 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:34:59.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.089312 systemd-networkd[710]: eth0: DHCPv6 lease lost Jul 10 00:34:59.122000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:34:59.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.090650 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:34:59.090722 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:34:59.093079 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:34:59.093147 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:34:59.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.096529 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:34:59.096553 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:34:59.098419 systemd[1]: Stopping network-cleanup.service... Jul 10 00:34:59.099208 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:34:59.099245 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:34:59.100864 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:34:59.100896 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:34:59.102311 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:34:59.102342 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:34:59.102639 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:34:59.103505 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:34:59.105637 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:34:59.105703 systemd[1]: Stopped network-cleanup.service. Jul 10 00:34:59.111778 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:34:59.111878 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:34:59.114100 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:34:59.114130 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:34:59.115716 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:34:59.115740 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:34:59.117323 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:34:59.117355 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:34:59.118821 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:34:59.118851 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:34:59.120449 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:34:59.120486 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:34:59.121454 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:34:59.122705 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:34:59.122742 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:34:59.126768 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:34:59.126834 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:34:59.127926 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:34:59.129923 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:34:59.145559 systemd[1]: Switching root. Jul 10 00:34:59.165916 iscsid[715]: iscsid shutting down. Jul 10 00:34:59.166621 systemd-journald[196]: Received SIGTERM from PID 1 (systemd). Jul 10 00:34:59.166658 systemd-journald[196]: Journal stopped Jul 10 00:34:59.728778 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:34:59.728829 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:34:59.728841 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:34:59.728850 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:34:59.728864 kernel: SELinux: policy capability open_perms=1 Jul 10 00:34:59.728876 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:34:59.728889 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:34:59.728898 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:34:59.728907 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:34:59.728919 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:34:59.728933 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:34:59.728944 systemd[1]: Successfully loaded SELinux policy in 36.742ms. Jul 10 00:34:59.728958 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.650ms. Jul 10 00:34:59.728969 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:34:59.728979 systemd[1]: Detected virtualization kvm. Jul 10 00:34:59.728989 systemd[1]: Detected architecture x86-64. Jul 10 00:34:59.728999 systemd[1]: Detected first boot. Jul 10 00:34:59.729009 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:34:59.729019 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:34:59.729029 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:34:59.729042 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:34:59.729052 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:34:59.729062 systemd[1]: Stopped iscsid.service. Jul 10 00:34:59.729072 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:34:59.729082 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:34:59.729092 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:34:59.729106 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:34:59.729118 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:34:59.729128 systemd[1]: Created slice system-getty.slice. Jul 10 00:34:59.729138 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:34:59.729149 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:34:59.729159 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:34:59.729169 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:34:59.729179 systemd[1]: Created slice user.slice. Jul 10 00:34:59.729190 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:34:59.729200 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:34:59.729211 systemd[1]: Set up automount boot.automount. Jul 10 00:34:59.729221 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:34:59.729232 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:34:59.729242 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:34:59.729264 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:34:59.729275 systemd[1]: Reached target integritysetup.target. Jul 10 00:34:59.729285 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:34:59.729301 systemd[1]: Reached target remote-fs.target. Jul 10 00:34:59.729311 systemd[1]: Reached target slices.target. Jul 10 00:34:59.729321 systemd[1]: Reached target swap.target. Jul 10 00:34:59.729332 systemd[1]: Reached target veritysetup.target. Jul 10 00:34:59.729342 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:34:59.729353 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:34:59.729363 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:34:59.729373 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:34:59.729385 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:34:59.729395 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:34:59.729405 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:34:59.729415 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:34:59.729426 systemd[1]: Mounting media.mount... Jul 10 00:34:59.729436 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:34:59.729453 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:34:59.729464 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:34:59.729475 systemd[1]: Mounting tmp.mount... Jul 10 00:34:59.729485 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:34:59.729495 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:34:59.729505 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:34:59.729515 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:34:59.729526 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:34:59.729537 systemd[1]: Starting modprobe@drm.service... Jul 10 00:34:59.729547 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:34:59.729558 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:34:59.729570 systemd[1]: Starting modprobe@loop.service... Jul 10 00:34:59.729580 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:34:59.729590 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:34:59.729600 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:34:59.729611 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:34:59.729624 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:34:59.729634 systemd[1]: Stopped systemd-journald.service. Jul 10 00:34:59.729646 kernel: fuse: init (API version 7.34) Jul 10 00:34:59.729656 kernel: loop: module loaded Jul 10 00:34:59.729666 systemd[1]: Starting systemd-journald.service... Jul 10 00:34:59.729677 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:34:59.729687 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:34:59.729697 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:34:59.729707 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:34:59.729717 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:34:59.729726 systemd[1]: Stopped verity-setup.service. Jul 10 00:34:59.729738 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:34:59.729750 systemd-journald[982]: Journal started Jul 10 00:34:59.729786 systemd-journald[982]: Runtime Journal (/run/log/journal/03d07cb6f67445cf8a596c1fe711b6bf) is 6.0M, max 48.5M, 42.5M free. Jul 10 00:34:59.221000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:34:59.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:34:59.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:34:59.304000 audit: BPF prog-id=10 op=LOAD Jul 10 00:34:59.304000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:34:59.304000 audit: BPF prog-id=11 op=LOAD Jul 10 00:34:59.304000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:34:59.607000 audit: BPF prog-id=12 op=LOAD Jul 10 00:34:59.607000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:34:59.607000 audit: BPF prog-id=13 op=LOAD Jul 10 00:34:59.607000 audit: BPF prog-id=14 op=LOAD Jul 10 00:34:59.607000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:34:59.607000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:34:59.608000 audit: BPF prog-id=15 op=LOAD Jul 10 00:34:59.608000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:34:59.608000 audit: BPF prog-id=16 op=LOAD Jul 10 00:34:59.608000 audit: BPF prog-id=17 op=LOAD Jul 10 00:34:59.608000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:34:59.608000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:34:59.609000 audit: BPF prog-id=18 op=LOAD Jul 10 00:34:59.609000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:34:59.609000 audit: BPF prog-id=19 op=LOAD Jul 10 00:34:59.609000 audit: BPF prog-id=20 op=LOAD Jul 10 00:34:59.609000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:34:59.609000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:34:59.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.618000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:34:59.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.711000 audit: BPF prog-id=21 op=LOAD Jul 10 00:34:59.711000 audit: BPF prog-id=22 op=LOAD Jul 10 00:34:59.711000 audit: BPF prog-id=23 op=LOAD Jul 10 00:34:59.711000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:34:59.711000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:34:59.727000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:34:59.727000 audit[982]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff83169d80 a2=4000 a3=7fff83169e1c items=0 ppid=1 pid=982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:34:59.727000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:34:59.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.606031 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:34:59.606041 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 10 00:34:59.609958 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:34:59.733404 systemd[1]: Started systemd-journald.service. Jul 10 00:34:59.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.734507 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:34:59.735348 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:34:59.736129 systemd[1]: Mounted media.mount. Jul 10 00:34:59.736878 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:34:59.737745 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:34:59.738636 systemd[1]: Mounted tmp.mount. Jul 10 00:34:59.739525 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:34:59.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.740631 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:34:59.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.741646 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:34:59.741807 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:34:59.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.742824 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:34:59.742985 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:34:59.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.743981 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:34:59.744146 systemd[1]: Finished modprobe@drm.service. Jul 10 00:34:59.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.745128 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:34:59.745280 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:34:59.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.746314 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:34:59.746495 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:34:59.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.747461 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:34:59.747599 systemd[1]: Finished modprobe@loop.service. Jul 10 00:34:59.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.748723 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:34:59.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.749917 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:34:59.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.751056 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:34:59.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.752215 systemd[1]: Reached target network-pre.target. Jul 10 00:34:59.754004 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:34:59.755604 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:34:59.756333 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:34:59.757434 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:34:59.758945 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:34:59.760071 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:34:59.760833 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:34:59.762686 systemd-journald[982]: Time spent on flushing to /var/log/journal/03d07cb6f67445cf8a596c1fe711b6bf is 13.964ms for 1023 entries. Jul 10 00:34:59.762686 systemd-journald[982]: System Journal (/var/log/journal/03d07cb6f67445cf8a596c1fe711b6bf) is 8.0M, max 195.6M, 187.6M free. Jul 10 00:34:59.799411 systemd-journald[982]: Received client request to flush runtime journal. Jul 10 00:34:59.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.762021 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:34:59.763986 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:34:59.765853 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:34:59.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:34:59.768532 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:34:59.801215 udevadm[1005]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 10 00:34:59.769533 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:34:59.770536 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:34:59.771604 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:34:59.772669 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:34:59.774473 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:34:59.780003 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:34:59.783984 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:34:59.800201 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:35:00.166470 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:35:00.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.171191 kernel: kauditd_printk_skb: 131 callbacks suppressed Jul 10 00:35:00.171273 kernel: audit: type=1130 audit(1752107700.167:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.171294 kernel: audit: type=1334 audit(1752107700.170:141): prog-id=24 op=LOAD Jul 10 00:35:00.170000 audit: BPF prog-id=24 op=LOAD Jul 10 00:35:00.171000 audit: BPF prog-id=25 op=LOAD Jul 10 00:35:00.172654 systemd[1]: Starting systemd-udevd.service... Jul 10 00:35:00.173304 kernel: audit: type=1334 audit(1752107700.171:142): prog-id=25 op=LOAD Jul 10 00:35:00.173334 kernel: audit: type=1334 audit(1752107700.171:143): prog-id=7 op=UNLOAD Jul 10 00:35:00.173355 kernel: audit: type=1334 audit(1752107700.171:144): prog-id=8 op=UNLOAD Jul 10 00:35:00.171000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:35:00.171000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:35:00.189272 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Jul 10 00:35:00.202320 systemd[1]: Started systemd-udevd.service. Jul 10 00:35:00.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.206000 audit: BPF prog-id=26 op=LOAD Jul 10 00:35:00.208075 systemd[1]: Starting systemd-networkd.service... Jul 10 00:35:00.208173 kernel: audit: type=1130 audit(1752107700.202:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.208199 kernel: audit: type=1334 audit(1752107700.206:146): prog-id=26 op=LOAD Jul 10 00:35:00.217650 kernel: audit: type=1334 audit(1752107700.212:147): prog-id=27 op=LOAD Jul 10 00:35:00.222355 kernel: audit: type=1334 audit(1752107700.212:148): prog-id=28 op=LOAD Jul 10 00:35:00.222387 kernel: audit: type=1334 audit(1752107700.212:149): prog-id=29 op=LOAD Jul 10 00:35:00.212000 audit: BPF prog-id=27 op=LOAD Jul 10 00:35:00.212000 audit: BPF prog-id=28 op=LOAD Jul 10 00:35:00.212000 audit: BPF prog-id=29 op=LOAD Jul 10 00:35:00.213207 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:35:00.241773 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 10 00:35:00.241851 systemd[1]: Started systemd-userdbd.service. Jul 10 00:35:00.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.248855 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:35:00.272295 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 10 00:35:00.280511 systemd-networkd[1018]: lo: Link UP Jul 10 00:35:00.280519 systemd-networkd[1018]: lo: Gained carrier Jul 10 00:35:00.280844 systemd-networkd[1018]: Enumeration completed Jul 10 00:35:00.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.280982 systemd[1]: Started systemd-networkd.service. Jul 10 00:35:00.282159 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:35:00.283196 systemd-networkd[1018]: eth0: Link UP Jul 10 00:35:00.283303 systemd-networkd[1018]: eth0: Gained carrier Jul 10 00:35:00.284275 kernel: ACPI: button: Power Button [PWRF] Jul 10 00:35:00.296354 systemd-networkd[1018]: eth0: DHCPv4 address 10.0.0.24/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:35:00.291000 audit[1017]: AVC avc: denied { confidentiality } for pid=1017 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 10 00:35:00.291000 audit[1017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=565047000960 a1=338ac a2=7f82e33ffbc5 a3=5 items=110 ppid=1007 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:00.291000 audit: CWD cwd="/" Jul 10 00:35:00.291000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=1 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=2 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=3 name=(null) inode=11989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=4 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=5 name=(null) inode=11990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=6 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=7 name=(null) inode=11991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=8 name=(null) inode=11991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=9 name=(null) inode=11992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=10 name=(null) inode=11991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=11 name=(null) inode=11993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=12 name=(null) inode=11991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=13 name=(null) inode=11994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=14 name=(null) inode=11991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=15 name=(null) inode=11995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=16 name=(null) inode=11991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=17 name=(null) inode=11996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=18 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=19 name=(null) inode=11997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=20 name=(null) inode=11997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=21 name=(null) inode=11998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=22 name=(null) inode=11997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=23 name=(null) inode=11999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=24 name=(null) inode=11997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=25 name=(null) inode=12000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=26 name=(null) inode=11997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=27 name=(null) inode=12001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=28 name=(null) inode=11997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=29 name=(null) inode=12002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=30 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=31 name=(null) inode=12003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=32 name=(null) inode=12003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=33 name=(null) inode=12004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=34 name=(null) inode=12003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=35 name=(null) inode=12005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=36 name=(null) inode=12003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=37 name=(null) inode=12006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=38 name=(null) inode=12003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=39 name=(null) inode=12007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=40 name=(null) inode=12003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=41 name=(null) inode=12008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=42 name=(null) inode=11988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=43 name=(null) inode=12009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=44 name=(null) inode=12009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=45 name=(null) inode=12010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=46 name=(null) inode=12009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=47 name=(null) inode=12011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=48 name=(null) inode=12009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=49 name=(null) inode=12012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=50 name=(null) inode=12009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=51 name=(null) inode=12013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=52 name=(null) inode=12009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=53 name=(null) inode=12014 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=55 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=56 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=57 name=(null) inode=12016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=58 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=59 name=(null) inode=12017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=60 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=61 name=(null) inode=12018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=62 name=(null) inode=12018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=63 name=(null) inode=12019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=64 name=(null) inode=12018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=65 name=(null) inode=12020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=66 name=(null) inode=12018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=67 name=(null) inode=12021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=68 name=(null) inode=12018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=69 name=(null) inode=12022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=70 name=(null) inode=12018 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=71 name=(null) inode=12023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=72 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=73 name=(null) inode=12024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=74 name=(null) inode=12024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=75 name=(null) inode=12025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=76 name=(null) inode=12024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=77 name=(null) inode=12026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=78 name=(null) inode=12024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=79 name=(null) inode=12027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=80 name=(null) inode=12024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=81 name=(null) inode=12028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=82 name=(null) inode=12024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=83 name=(null) inode=12029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=84 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=85 name=(null) inode=12030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=86 name=(null) inode=12030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=87 name=(null) inode=12031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=88 name=(null) inode=12030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=89 name=(null) inode=12032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=90 name=(null) inode=12030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=91 name=(null) inode=12033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=92 name=(null) inode=12030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=93 name=(null) inode=12034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=94 name=(null) inode=12030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=95 name=(null) inode=12035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=96 name=(null) inode=12015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=97 name=(null) inode=12036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=98 name=(null) inode=12036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=99 name=(null) inode=12037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=100 name=(null) inode=12036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=101 name=(null) inode=12038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=102 name=(null) inode=12036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=103 name=(null) inode=12039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=104 name=(null) inode=12036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=105 name=(null) inode=12040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=106 name=(null) inode=12036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=107 name=(null) inode=12041 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PATH item=109 name=(null) inode=12042 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:35:00.291000 audit: PROCTITLE proctitle="(udev-worker)" Jul 10 00:35:00.306286 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 10 00:35:00.318524 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 10 00:35:00.323422 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 10 00:35:00.323547 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 10 00:35:00.331299 kernel: mousedev: PS/2 mouse device common for all mice Jul 10 00:35:00.376981 kernel: kvm: Nested Virtualization enabled Jul 10 00:35:00.377149 kernel: SVM: kvm: Nested Paging enabled Jul 10 00:35:00.377171 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 10 00:35:00.377184 kernel: SVM: Virtual GIF supported Jul 10 00:35:00.393283 kernel: EDAC MC: Ver: 3.0.0 Jul 10 00:35:00.417579 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:35:00.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.419379 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:35:00.425778 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:35:00.451880 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:35:00.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.452881 systemd[1]: Reached target cryptsetup.target. Jul 10 00:35:00.454546 systemd[1]: Starting lvm2-activation.service... Jul 10 00:35:00.457560 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:35:00.481346 systemd[1]: Finished lvm2-activation.service. Jul 10 00:35:00.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.482384 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:35:00.483204 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:35:00.483233 systemd[1]: Reached target local-fs.target. Jul 10 00:35:00.484050 systemd[1]: Reached target machines.target. Jul 10 00:35:00.486099 systemd[1]: Starting ldconfig.service... Jul 10 00:35:00.487044 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.487088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:00.487999 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:35:00.489912 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:35:00.492027 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:35:00.493882 systemd[1]: Starting systemd-sysext.service... Jul 10 00:35:00.496292 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Jul 10 00:35:00.497367 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:35:00.502824 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:35:00.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.507615 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:35:00.511476 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:35:00.511600 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:35:00.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.517032 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:35:00.517524 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:35:00.520171 (sd-sysext)[1057]: No suitable extensions found (2 ignored due to incompatible version). Jul 10 00:35:00.527602 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) Jul 10 00:35:00.527602 systemd-fsck[1053]: /dev/vda1: 790 files, 120731/258078 clusters Jul 10 00:35:00.528121 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.529195 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:35:00.530475 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.532032 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:35:00.533861 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:35:00.535548 systemd[1]: Starting modprobe@loop.service... Jul 10 00:35:00.536360 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.536465 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:00.536565 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.538563 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:35:00.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.540020 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:35:00.541185 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:35:00.541314 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:35:00.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.542774 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:35:00.542882 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:35:00.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.544346 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:35:00.544568 systemd[1]: Finished modprobe@loop.service. Jul 10 00:35:00.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.548183 systemd[1]: Mounting boot.mount... Jul 10 00:35:00.548930 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:35:00.548963 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.549222 systemd[1]: Finished systemd-sysext.service. Jul 10 00:35:00.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.551741 systemd[1]: Starting ensure-sysext.service... Jul 10 00:35:00.553125 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:35:00.557715 systemd[1]: Mounted boot.mount. Jul 10 00:35:00.558712 systemd[1]: Reloading. Jul 10 00:35:00.562656 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:35:00.565149 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:35:00.567932 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:35:00.612712 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:35:00.662042 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:35:00.662058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:35:00.727000 audit: BPF prog-id=30 op=LOAD Jul 10 00:35:00.727000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:35:00.727000 audit: BPF prog-id=31 op=LOAD Jul 10 00:35:00.727000 audit: BPF prog-id=32 op=LOAD Jul 10 00:35:00.727000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:35:00.727000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:35:00.727000 audit: BPF prog-id=33 op=LOAD Jul 10 00:35:00.727000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:35:00.728000 audit: BPF prog-id=34 op=LOAD Jul 10 00:35:00.729000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:35:00.729000 audit: BPF prog-id=35 op=LOAD Jul 10 00:35:00.729000 audit: BPF prog-id=36 op=LOAD Jul 10 00:35:00.729000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:35:00.729000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:35:00.729000 audit: BPF prog-id=37 op=LOAD Jul 10 00:35:00.729000 audit: BPF prog-id=38 op=LOAD Jul 10 00:35:00.729000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:35:00.730000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:35:00.731603 systemd[1]: Finished ldconfig.service. Jul 10 00:35:00.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.732639 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:35:00.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.734216 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:35:00.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.737691 systemd[1]: Starting audit-rules.service... Jul 10 00:35:00.739134 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:35:00.741003 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:35:00.742000 audit: BPF prog-id=39 op=LOAD Jul 10 00:35:00.743535 systemd[1]: Starting systemd-resolved.service... Jul 10 00:35:00.744000 audit: BPF prog-id=40 op=LOAD Jul 10 00:35:00.745995 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:35:00.747816 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:35:00.749188 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:35:00.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.751000 audit[1133]: SYSTEM_BOOT pid=1133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.758666 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:35:00.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.760418 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.760727 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.762690 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:35:00.764555 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:35:00.766278 systemd[1]: Starting modprobe@loop.service... Jul 10 00:35:00.767049 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.767176 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:00.768457 systemd[1]: Starting systemd-update-done.service... Jul 10 00:35:00.769298 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:35:00.769430 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.771094 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:35:00.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.772431 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:35:00.772566 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:35:00.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.773956 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:35:00.774193 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:35:00.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.775734 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:35:00.775859 systemd[1]: Finished modprobe@loop.service. Jul 10 00:35:00.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.777510 systemd[1]: Finished systemd-update-done.service. Jul 10 00:35:00.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:00.781489 augenrules[1146]: No rules Jul 10 00:35:00.781000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:35:00.781000 audit[1146]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffb8e05910 a2=420 a3=0 items=0 ppid=1122 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:00.781000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:35:00.782844 systemd[1]: Finished audit-rules.service. Jul 10 00:35:00.785235 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.785483 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.786724 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:35:00.788437 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:35:00.790272 systemd[1]: Starting modprobe@loop.service... Jul 10 00:35:00.791002 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.791128 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:00.791248 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:35:00.791356 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.792724 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:35:00.792891 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:35:00.794261 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:35:00.794456 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:35:00.795904 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:35:00.796048 systemd[1]: Finished modprobe@loop.service. Jul 10 00:35:00.799742 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.799983 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.801069 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:35:00.802751 systemd[1]: Starting modprobe@drm.service... Jul 10 00:35:00.804690 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:35:00.806284 systemd[1]: Starting modprobe@loop.service... Jul 10 00:35:00.807030 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:35:00.807123 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:00.807224 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:35:00.807314 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:35:00.808146 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:35:00.808267 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:35:00.809477 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:35:00.809572 systemd[1]: Finished modprobe@drm.service. Jul 10 00:35:00.809595 systemd-resolved[1128]: Positive Trust Anchors: Jul 10 00:35:00.809602 systemd-resolved[1128]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:35:00.809637 systemd-resolved[1128]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:35:00.810733 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:35:00.810823 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:35:00.812041 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:35:00.812133 systemd[1]: Finished modprobe@loop.service. Jul 10 00:35:02.179413 systemd-timesyncd[1132]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 10 00:35:02.179477 systemd-timesyncd[1132]: Initial clock synchronization to Thu 2025-07-10 00:35:02.179340 UTC. Jul 10 00:35:02.179497 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:35:02.181058 systemd[1]: Reached target time-set.target. Jul 10 00:35:02.182693 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:35:02.182721 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:35:02.182953 systemd[1]: Finished ensure-sysext.service. Jul 10 00:35:02.183772 systemd-resolved[1128]: Defaulting to hostname 'linux'. Jul 10 00:35:02.184991 systemd[1]: Started systemd-resolved.service. Jul 10 00:35:02.185845 systemd[1]: Reached target network.target. Jul 10 00:35:02.186709 systemd[1]: Reached target nss-lookup.target. Jul 10 00:35:02.187524 systemd[1]: Reached target sysinit.target. Jul 10 00:35:02.188349 systemd[1]: Started motdgen.path. Jul 10 00:35:02.189072 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:35:02.190296 systemd[1]: Started logrotate.timer. Jul 10 00:35:02.191124 systemd[1]: Started mdadm.timer. Jul 10 00:35:02.191877 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:35:02.192738 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:35:02.192760 systemd[1]: Reached target paths.target. Jul 10 00:35:02.193527 systemd[1]: Reached target timers.target. Jul 10 00:35:02.194513 systemd[1]: Listening on dbus.socket. Jul 10 00:35:02.197030 systemd[1]: Listening on sshd.socket. Jul 10 00:35:02.197853 systemd[1]: Reached target sockets.target. Jul 10 00:35:02.198702 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:02.198721 systemd[1]: Reached target basic.target. Jul 10 00:35:02.199500 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:02.199519 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:02.200188 systemd[1]: Starting dbus.service... Jul 10 00:35:02.201513 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:35:02.203017 systemd[1]: Starting extend-filesystems.service... Jul 10 00:35:02.204159 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:35:02.204972 jq[1161]: false Jul 10 00:35:02.205130 systemd[1]: Starting motdgen.service... Jul 10 00:35:02.206807 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:35:02.208478 systemd[1]: Starting sshd-keygen.service... Jul 10 00:35:02.213211 systemd[1]: Starting systemd-logind.service... Jul 10 00:35:02.214073 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:35:02.214114 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:35:02.214434 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:35:02.214953 systemd[1]: Starting update-engine.service... Jul 10 00:35:02.216630 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:35:02.218460 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:35:02.220538 dbus-daemon[1160]: [system] SELinux support is enabled Jul 10 00:35:02.226622 extend-filesystems[1162]: Found sr0 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda1 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda2 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda3 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found usr Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda4 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda6 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda7 Jul 10 00:35:02.226622 extend-filesystems[1162]: Found vda9 Jul 10 00:35:02.226622 extend-filesystems[1162]: Checking size of /dev/vda9 Jul 10 00:35:02.218671 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:35:02.242057 jq[1179]: true Jul 10 00:35:02.218887 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:35:02.242404 update_engine[1178]: I0710 00:35:02.242054 1178 main.cc:92] Flatcar Update Engine starting Jul 10 00:35:02.242585 jq[1182]: true Jul 10 00:35:02.218993 systemd[1]: Finished motdgen.service. Jul 10 00:35:02.220016 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:35:02.220129 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:35:02.221157 systemd[1]: Started dbus.service. Jul 10 00:35:02.223674 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:35:02.223689 systemd[1]: Reached target system-config.target. Jul 10 00:35:02.224690 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:35:02.247382 update_engine[1178]: I0710 00:35:02.244012 1178 update_check_scheduler.cc:74] Next update check in 7m4s Jul 10 00:35:02.224703 systemd[1]: Reached target user-config.target. Jul 10 00:35:02.243979 systemd[1]: Started update-engine.service. Jul 10 00:35:02.246341 systemd[1]: Started locksmithd.service. Jul 10 00:35:02.247519 extend-filesystems[1162]: Old size kept for /dev/vda9 Jul 10 00:35:02.248551 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:35:02.248698 systemd[1]: Finished extend-filesystems.service. Jul 10 00:35:02.265949 systemd-logind[1174]: Watching system buttons on /dev/input/event1 (Power Button) Jul 10 00:35:02.266294 systemd-logind[1174]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 10 00:35:02.266579 systemd-logind[1174]: New seat seat0. Jul 10 00:35:02.268592 bash[1201]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:35:02.268951 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:35:02.273968 systemd[1]: Started systemd-logind.service. Jul 10 00:35:02.277740 locksmithd[1191]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:35:02.822448 systemd-networkd[1018]: eth0: Gained IPv6LL Jul 10 00:35:02.902926 sshd_keygen[1177]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:35:02.920416 systemd[1]: Finished sshd-keygen.service. Jul 10 00:35:02.922590 systemd[1]: Starting issuegen.service... Jul 10 00:35:02.928545 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:35:02.928697 systemd[1]: Finished issuegen.service. Jul 10 00:35:02.930757 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:35:02.936032 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:35:02.938632 systemd[1]: Started getty@tty1.service. Jul 10 00:35:02.940590 systemd[1]: Started serial-getty@ttyS0.service. Jul 10 00:35:02.941623 systemd[1]: Reached target getty.target. Jul 10 00:35:02.942485 systemd[1]: Reached target multi-user.target. Jul 10 00:35:02.944361 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:35:02.951464 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:35:02.951638 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:35:02.952801 systemd[1]: Startup finished in 668ms (kernel) + 3.461s (initrd) + 2.403s (userspace) = 6.533s. Jul 10 00:35:10.021758 systemd[1]: Created slice system-sshd.slice. Jul 10 00:35:10.022623 systemd[1]: Started sshd@0-10.0.0.24:22-10.0.0.1:58990.service. Jul 10 00:35:10.057207 sshd[1222]: Accepted publickey for core from 10.0.0.1 port 58990 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.058842 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.066410 systemd[1]: Created slice user-500.slice. Jul 10 00:35:10.067492 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:35:10.068977 systemd-logind[1174]: New session 1 of user core. Jul 10 00:35:10.075448 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:35:10.076491 systemd[1]: Starting user@500.service... Jul 10 00:35:10.078929 (systemd)[1225]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.142954 systemd[1225]: Queued start job for default target default.target. Jul 10 00:35:10.143532 systemd[1225]: Reached target paths.target. Jul 10 00:35:10.143551 systemd[1225]: Reached target sockets.target. Jul 10 00:35:10.143564 systemd[1225]: Reached target timers.target. Jul 10 00:35:10.143574 systemd[1225]: Reached target basic.target. Jul 10 00:35:10.143604 systemd[1225]: Reached target default.target. Jul 10 00:35:10.143624 systemd[1225]: Startup finished in 60ms. Jul 10 00:35:10.143693 systemd[1]: Started user@500.service. Jul 10 00:35:10.144537 systemd[1]: Started session-1.scope. Jul 10 00:35:10.193590 systemd[1]: Started sshd@1-10.0.0.24:22-10.0.0.1:59002.service. Jul 10 00:35:10.223221 sshd[1234]: Accepted publickey for core from 10.0.0.1 port 59002 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.224186 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.227802 systemd-logind[1174]: New session 2 of user core. Jul 10 00:35:10.228470 systemd[1]: Started session-2.scope. Jul 10 00:35:10.282031 sshd[1234]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:10.285499 systemd[1]: Started sshd@2-10.0.0.24:22-10.0.0.1:59010.service. Jul 10 00:35:10.285932 systemd[1]: sshd@1-10.0.0.24:22-10.0.0.1:59002.service: Deactivated successfully. Jul 10 00:35:10.286471 systemd[1]: session-2.scope: Deactivated successfully. Jul 10 00:35:10.286958 systemd-logind[1174]: Session 2 logged out. Waiting for processes to exit. Jul 10 00:35:10.287689 systemd-logind[1174]: Removed session 2. Jul 10 00:35:10.314571 sshd[1239]: Accepted publickey for core from 10.0.0.1 port 59010 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.315478 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.318710 systemd-logind[1174]: New session 3 of user core. Jul 10 00:35:10.319465 systemd[1]: Started session-3.scope. Jul 10 00:35:10.367854 sshd[1239]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:10.370344 systemd[1]: sshd@2-10.0.0.24:22-10.0.0.1:59010.service: Deactivated successfully. Jul 10 00:35:10.370805 systemd[1]: session-3.scope: Deactivated successfully. Jul 10 00:35:10.371270 systemd-logind[1174]: Session 3 logged out. Waiting for processes to exit. Jul 10 00:35:10.372118 systemd[1]: Started sshd@3-10.0.0.24:22-10.0.0.1:59020.service. Jul 10 00:35:10.372956 systemd-logind[1174]: Removed session 3. Jul 10 00:35:10.488357 sshd[1246]: Accepted publickey for core from 10.0.0.1 port 59020 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.489457 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.492639 systemd-logind[1174]: New session 4 of user core. Jul 10 00:35:10.493359 systemd[1]: Started session-4.scope. Jul 10 00:35:10.548866 sshd[1246]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:10.551872 systemd[1]: sshd@3-10.0.0.24:22-10.0.0.1:59020.service: Deactivated successfully. Jul 10 00:35:10.552537 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:35:10.553057 systemd-logind[1174]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:35:10.554098 systemd[1]: Started sshd@4-10.0.0.24:22-10.0.0.1:59024.service. Jul 10 00:35:10.554760 systemd-logind[1174]: Removed session 4. Jul 10 00:35:10.583894 sshd[1252]: Accepted publickey for core from 10.0.0.1 port 59024 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.584848 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.587980 systemd-logind[1174]: New session 5 of user core. Jul 10 00:35:10.588769 systemd[1]: Started session-5.scope. Jul 10 00:35:10.641941 sudo[1255]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:35:10.642108 sudo[1255]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:10.652470 dbus-daemon[1160]: \xd0\xed\xec\xe5\xf6U: received setenforce notice (enforcing=-1059536944) Jul 10 00:35:10.654482 sudo[1255]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:10.655973 sshd[1252]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:10.658668 systemd[1]: sshd@4-10.0.0.24:22-10.0.0.1:59024.service: Deactivated successfully. Jul 10 00:35:10.659165 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:35:10.659634 systemd-logind[1174]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:35:10.660600 systemd[1]: Started sshd@5-10.0.0.24:22-10.0.0.1:59038.service. Jul 10 00:35:10.661169 systemd-logind[1174]: Removed session 5. Jul 10 00:35:10.690564 sshd[1259]: Accepted publickey for core from 10.0.0.1 port 59038 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.691675 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.694969 systemd-logind[1174]: New session 6 of user core. Jul 10 00:35:10.695759 systemd[1]: Started session-6.scope. Jul 10 00:35:10.747654 sudo[1263]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:35:10.747876 sudo[1263]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:10.750717 sudo[1263]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:10.755420 sudo[1262]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:35:10.755601 sudo[1262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:10.763469 systemd[1]: Stopping audit-rules.service... Jul 10 00:35:10.763000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:35:10.764973 auditctl[1266]: No rules Jul 10 00:35:10.765377 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:35:10.765531 systemd[1]: Stopped audit-rules.service. Jul 10 00:35:10.768592 kernel: kauditd_printk_skb: 166 callbacks suppressed Jul 10 00:35:10.768640 kernel: audit: type=1305 audit(1752107710.763:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:35:10.768858 systemd[1]: Starting audit-rules.service... Jul 10 00:35:10.763000 audit[1266]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd0a170a50 a2=420 a3=0 items=0 ppid=1 pid=1266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:10.774785 kernel: audit: type=1300 audit(1752107710.763:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd0a170a50 a2=420 a3=0 items=0 ppid=1 pid=1266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:10.774828 kernel: audit: type=1327 audit(1752107710.763:201): proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:35:10.763000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:35:10.776026 kernel: audit: type=1131 audit(1752107710.763:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.783582 augenrules[1283]: No rules Jul 10 00:35:10.784136 systemd[1]: Finished audit-rules.service. Jul 10 00:35:10.784942 sudo[1262]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:10.817539 sshd[1259]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:10.821037 systemd[1]: sshd@5-10.0.0.24:22-10.0.0.1:59038.service: Deactivated successfully. Jul 10 00:35:10.821162 kernel: audit: type=1130 audit(1752107710.780:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.822046 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:35:10.822634 systemd-logind[1174]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:35:10.823975 systemd[1]: Started sshd@6-10.0.0.24:22-10.0.0.1:59052.service. Jul 10 00:35:10.780000 audit[1262]: USER_END pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.825083 systemd-logind[1174]: Removed session 6. Jul 10 00:35:10.828647 kernel: audit: type=1106 audit(1752107710.780:204): pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.780000 audit[1262]: CRED_DISP pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.832341 kernel: audit: type=1104 audit(1752107710.780:205): pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.815000 audit[1259]: USER_END pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.837282 kernel: audit: type=1106 audit(1752107710.815:206): pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.837326 kernel: audit: type=1104 audit(1752107710.815:207): pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.815000 audit[1259]: CRED_DISP pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.24:22-10.0.0.1:59038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.844971 kernel: audit: type=1131 audit(1752107710.820:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.24:22-10.0.0.1:59038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.24:22-10.0.0.1:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.854845 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 59052 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.853000 audit[1289]: USER_ACCT pid=1289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.854000 audit[1289]: CRED_ACQ pid=1289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.854000 audit[1289]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff46d7a180 a2=3 a3=0 items=0 ppid=1 pid=1289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:10.854000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:10.855977 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.859508 systemd-logind[1174]: New session 7 of user core. Jul 10 00:35:10.860402 systemd[1]: Started session-7.scope. Jul 10 00:35:10.863000 audit[1289]: USER_START pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.864000 audit[1291]: CRED_ACQ pid=1291 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.911538 sshd[1289]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:10.911000 audit[1289]: USER_END pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.911000 audit[1289]: CRED_DISP pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.914499 systemd[1]: sshd@6-10.0.0.24:22-10.0.0.1:59052.service: Deactivated successfully. Jul 10 00:35:10.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.24:22-10.0.0.1:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.914970 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:35:10.915464 systemd-logind[1174]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:35:10.916443 systemd[1]: Started sshd@7-10.0.0.24:22-10.0.0.1:59054.service. Jul 10 00:35:10.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.24:22-10.0.0.1:59054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:10.917285 systemd-logind[1174]: Removed session 7. Jul 10 00:35:10.947000 audit[1296]: USER_ACCT pid=1296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.948571 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 59054 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:10.948000 audit[1296]: CRED_ACQ pid=1296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.948000 audit[1296]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd365cb7c0 a2=3 a3=0 items=0 ppid=1 pid=1296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:10.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:10.949690 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:10.953033 systemd-logind[1174]: New session 8 of user core. Jul 10 00:35:10.953733 systemd[1]: Started session-8.scope. Jul 10 00:35:10.955000 audit[1296]: USER_START pid=1296 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:10.956000 audit[1298]: CRED_ACQ pid=1298 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:11.962005 sshd[1296]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:11.961000 audit[1296]: USER_END pid=1296 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:11.961000 audit[1296]: CRED_DISP pid=1296 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:11.964942 systemd[1]: sshd@7-10.0.0.24:22-10.0.0.1:59054.service: Deactivated successfully. Jul 10 00:35:11.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.24:22-10.0.0.1:59054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:11.965613 systemd[1]: session-8.scope: Deactivated successfully. Jul 10 00:35:11.966139 systemd-logind[1174]: Session 8 logged out. Waiting for processes to exit. Jul 10 00:35:11.967310 systemd[1]: Started sshd@8-10.0.0.24:22-10.0.0.1:59056.service. Jul 10 00:35:11.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.24:22-10.0.0.1:59056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:11.968312 systemd-logind[1174]: Removed session 8. Jul 10 00:35:11.998000 audit[1311]: USER_ACCT pid=1311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:12.000321 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 59056 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:11.999000 audit[1311]: CRED_ACQ pid=1311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:11.999000 audit[1311]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e2cb750 a2=3 a3=0 items=0 ppid=1 pid=1311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:11.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:12.001399 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:12.005099 systemd-logind[1174]: New session 9 of user core. Jul 10 00:35:12.006097 systemd[1]: Started session-9.scope. Jul 10 00:35:12.009000 audit[1311]: USER_START pid=1311 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:12.010000 audit[1313]: CRED_ACQ pid=1313 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.675000 audit[1314]: USER_ACCT pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.676459 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 10 00:35:20.676629 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:20.677339 kernel: kauditd_printk_skb: 30 callbacks suppressed Jul 10 00:35:20.677393 kernel: audit: type=1101 audit(1752107720.675:233): pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.679626 sudo[1314]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:20.675000 audit[1314]: CRED_REFR pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.681014 sshd[1311]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:20.684284 kernel: audit: type=1110 audit(1752107720.675:234): pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.684397 kernel: audit: type=1105 audit(1752107720.676:235): pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.676000 audit[1314]: USER_START pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.684436 systemd[1]: Started sshd@9-10.0.0.24:22-10.0.0.1:36804.service. Jul 10 00:35:20.684846 systemd[1]: sshd@8-10.0.0.24:22-10.0.0.1:59056.service: Deactivated successfully. Jul 10 00:35:20.685372 systemd[1]: session-9.scope: Deactivated successfully. Jul 10 00:35:20.685498 systemd[1]: session-9.scope: Consumed 4.907s CPU time. Jul 10 00:35:20.686131 systemd-logind[1174]: Session 9 logged out. Waiting for processes to exit. Jul 10 00:35:20.687115 systemd-logind[1174]: Removed session 9. Jul 10 00:35:20.676000 audit[1314]: USER_END pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.692571 kernel: audit: type=1106 audit(1752107720.676:236): pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.692745 kernel: audit: type=1104 audit(1752107720.676:237): pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.676000 audit[1314]: CRED_DISP pid=1314 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.696294 kernel: audit: type=1106 audit(1752107720.680:238): pid=1311 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.680000 audit[1311]: USER_END pid=1311 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.680000 audit[1311]: CRED_DISP pid=1311 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.705419 kernel: audit: type=1104 audit(1752107720.680:239): pid=1311 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.705512 kernel: audit: type=1130 audit(1752107720.683:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.24:22-10.0.0.1:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.24:22-10.0.0.1:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.709476 kernel: audit: type=1131 audit(1752107720.683:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.24:22-10.0.0.1:59056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.24:22-10.0.0.1:59056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.717000 audit[1370]: USER_ACCT pid=1370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.719166 sshd[1370]: Accepted publickey for core from 10.0.0.1 port 36804 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:20.720723 sshd[1370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:20.719000 audit[1370]: CRED_ACQ pid=1370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.719000 audit[1370]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff50277290 a2=3 a3=0 items=0 ppid=1 pid=1370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:20.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:20.723366 kernel: audit: type=1101 audit(1752107720.717:242): pid=1370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.724477 systemd-logind[1174]: New session 10 of user core. Jul 10 00:35:20.725278 systemd[1]: Started session-10.scope. Jul 10 00:35:20.727000 audit[1370]: USER_START pid=1370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.728000 audit[1373]: CRED_ACQ pid=1373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.775000 audit[1374]: USER_ACCT pid=1374 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.775000 audit[1374]: CRED_REFR pid=1374 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.777014 sudo[1374]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 10 00:35:20.777221 sudo[1374]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:20.777000 audit[1374]: USER_START pid=1374 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.785921 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 10 00:35:20.786134 systemd[1]: Stopped ensure-sysext.service. Jul 10 00:35:20.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.786212 systemd[1]: Stopping ensure-sysext.service... Jul 10 00:35:20.787529 systemd[1]: Stopping systemd-sysext.service... Jul 10 00:35:20.800410 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:20.800667 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:20.802330 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 10 00:35:20.802504 systemd[1]: Stopped systemd-sysext.service. Jul 10 00:35:20.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.804034 systemd[1]: Starting systemd-sysext.service... Jul 10 00:35:20.809951 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:35:20.813647 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:35:20.813839 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:35:20.823280 kernel: loop0: detected capacity change from 0 to 322896 Jul 10 00:35:20.828271 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:20.844294 kernel: loop1: detected capacity change from 0 to 301320 Jul 10 00:35:20.849280 kernel: EXT4-fs (loop1): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:20.860287 kernel: loop2: detected capacity change from 0 to 322896 Jul 10 00:35:20.865759 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:20.865868 kernel: loop3: detected capacity change from 0 to 301320 Jul 10 00:35:20.869794 (sd-sysext)[1387]: Using extensions 'containerd', 'docker'. Jul 10 00:35:20.870940 kernel: EXT4-fs (loop3): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:20.870191 (sd-sysext)[1387]: Merged extensions into '/usr'. Jul 10 00:35:20.886445 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:35:20.891885 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:35:20.892941 systemd[1]: Finished systemd-sysext.service. Jul 10 00:35:20.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.892000 audit[1374]: USER_END pid=1374 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.892000 audit[1374]: CRED_DISP pid=1374 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.893779 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:20.893704 sudo[1374]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:20.893856 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:20.894970 sshd[1370]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:20.895150 systemd[1]: Starting ensure-sysext.service... Jul 10 00:35:20.895000 audit[1370]: USER_END pid=1370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.895000 audit[1370]: CRED_DISP pid=1370 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:20.897873 systemd[1]: sshd@9-10.0.0.24:22-10.0.0.1:36804.service: Deactivated successfully. Jul 10 00:35:20.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.24:22-10.0.0.1:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.898563 systemd-logind[1174]: Session 10 logged out. Waiting for processes to exit. Jul 10 00:35:20.898612 systemd[1]: session-10.scope: Deactivated successfully. Jul 10 00:35:20.899869 systemd[1]: Started sshd@10-10.0.0.24:22-10.0.0.1:36808.service. Jul 10 00:35:20.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.24:22-10.0.0.1:36808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:20.901859 systemd[1]: Reloading. Jul 10 00:35:21.017384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:35:21.017400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:35:21.033564 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.091000 audit: BPF prog-id=46 op=LOAD Jul 10 00:35:21.091000 audit: BPF prog-id=40 op=UNLOAD Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit: BPF prog-id=47 op=LOAD Jul 10 00:35:21.093000 audit: BPF prog-id=30 op=UNLOAD Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit: BPF prog-id=48 op=LOAD Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.093000 audit: BPF prog-id=49 op=LOAD Jul 10 00:35:21.093000 audit: BPF prog-id=31 op=UNLOAD Jul 10 00:35:21.093000 audit: BPF prog-id=32 op=UNLOAD Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit: BPF prog-id=50 op=LOAD Jul 10 00:35:21.094000 audit: BPF prog-id=41 op=UNLOAD Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit: BPF prog-id=51 op=LOAD Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.094000 audit: BPF prog-id=52 op=LOAD Jul 10 00:35:21.094000 audit: BPF prog-id=42 op=UNLOAD Jul 10 00:35:21.094000 audit: BPF prog-id=43 op=UNLOAD Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit: BPF prog-id=53 op=LOAD Jul 10 00:35:21.095000 audit: BPF prog-id=39 op=UNLOAD Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit: BPF prog-id=54 op=LOAD Jul 10 00:35:21.096000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.096000 audit: BPF prog-id=55 op=LOAD Jul 10 00:35:21.096000 audit: BPF prog-id=44 op=UNLOAD Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit: BPF prog-id=56 op=LOAD Jul 10 00:35:21.097000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit: BPF prog-id=57 op=LOAD Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.098000 audit: BPF prog-id=58 op=LOAD Jul 10 00:35:21.098000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:35:21.098000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit: BPF prog-id=59 op=LOAD Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:21.099000 audit: BPF prog-id=60 op=LOAD Jul 10 00:35:21.099000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:35:21.099000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:35:21.106794 systemd-logind[1174]: Removed session 10. Jul 10 00:35:21.109323 systemd[1]: Starting docker.socket... Jul 10 00:35:21.110579 systemd[1]: Starting containerd.service... Jul 10 00:35:21.111021 systemd[1]: Listening on docker.socket. Jul 10 00:35:21.114722 systemd[1]: Stopped target sockets.target. Jul 10 00:35:21.114741 systemd[1]: Stopping sockets.target... Jul 10 00:35:21.114853 systemd[1]: Reached target sockets.target. Jul 10 00:35:21.115530 systemd[1]: Started containerd.service. Jul 10 00:35:21.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.117117 systemd[1]: Stopped target timers.target. Jul 10 00:35:21.117139 systemd[1]: Stopping timers.target... Jul 10 00:35:21.117217 systemd[1]: Reached target timers.target. Jul 10 00:35:21.119730 systemd[1]: Stopped target multi-user.target. Jul 10 00:35:21.119751 systemd[1]: Stopping multi-user.target... Jul 10 00:35:21.119773 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:35:21.121628 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:35:21.123397 systemd[1]: Starting extend-filesystems.service... Jul 10 00:35:21.124965 systemd[1]: Starting issuegen.service... Jul 10 00:35:21.125502 jq[1457]: false Jul 10 00:35:21.126445 systemd[1]: Starting motdgen.service... Jul 10 00:35:21.128208 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:35:21.128271 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:35:21.131388 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:35:21.131590 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:35:21.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.134073 systemd[1]: Finished ensure-sysext.service. Jul 10 00:35:21.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.134627 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:35:21.134747 systemd[1]: Finished issuegen.service. Jul 10 00:35:21.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.134928 extend-filesystems[1458]: Found loop2 Jul 10 00:35:21.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.135780 extend-filesystems[1458]: Found loop3 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found sr0 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda1 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda2 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda3 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found usr Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda4 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda6 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda7 Jul 10 00:35:21.135780 extend-filesystems[1458]: Found vda9 Jul 10 00:35:21.135780 extend-filesystems[1458]: Checking size of /dev/vda9 Jul 10 00:35:21.135071 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:35:21.135182 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:35:21.145127 extend-filesystems[1458]: Old size kept for /dev/vda9 Jul 10 00:35:21.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.145115 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:35:21.145244 systemd[1]: Finished extend-filesystems.service. Jul 10 00:35:21.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.146524 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:35:21.146637 systemd[1]: Finished motdgen.service. Jul 10 00:35:21.146865 systemd[1]: Reached target multi-user.target. Jul 10 00:35:21.148110 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:35:21.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.158142 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:35:21.158295 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:35:21.186285 containerd[1456]: time="2025-07-10T00:35:21.186037996Z" level=info msg="starting containerd" revision=1c90a442489720eec95342e1789ee8a5e1b9536f version=v1.6.9 Jul 10 00:35:21.201762 containerd[1456]: time="2025-07-10T00:35:21.201709226Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:35:21.201900 containerd[1456]: time="2025-07-10T00:35:21.201883062Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:21.203485 containerd[1456]: time="2025-07-10T00:35:21.203458566Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:35:21.203485 containerd[1456]: time="2025-07-10T00:35:21.203483844Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:21.203694 containerd[1456]: time="2025-07-10T00:35:21.203664552Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:35:21.203694 containerd[1456]: time="2025-07-10T00:35:21.203682927Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:21.203694 containerd[1456]: time="2025-07-10T00:35:21.203694459Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:35:21.203794 containerd[1456]: time="2025-07-10T00:35:21.203703686Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:21.203794 containerd[1456]: time="2025-07-10T00:35:21.203764881Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:21.204501 containerd[1456]: time="2025-07-10T00:35:21.204476535Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:21.204616 containerd[1456]: time="2025-07-10T00:35:21.204583255Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:35:21.204616 containerd[1456]: time="2025-07-10T00:35:21.204604415Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:35:21.204676 containerd[1456]: time="2025-07-10T00:35:21.204647356Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:35:21.204676 containerd[1456]: time="2025-07-10T00:35:21.204658567Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:35:21.210507 containerd[1456]: time="2025-07-10T00:35:21.210471839Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:35:21.210507 containerd[1456]: time="2025-07-10T00:35:21.210500472Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:35:21.210507 containerd[1456]: time="2025-07-10T00:35:21.210512745Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:35:21.210641 containerd[1456]: time="2025-07-10T00:35:21.210544274Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210641 containerd[1456]: time="2025-07-10T00:35:21.210561857Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210641 containerd[1456]: time="2025-07-10T00:35:21.210573860Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210641 containerd[1456]: time="2025-07-10T00:35:21.210584670Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210902 containerd[1456]: time="2025-07-10T00:35:21.210878581Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210902 containerd[1456]: time="2025-07-10T00:35:21.210894962Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210962 containerd[1456]: time="2025-07-10T00:35:21.210907666Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210962 containerd[1456]: time="2025-07-10T00:35:21.210919969Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.210962 containerd[1456]: time="2025-07-10T00:35:21.210930569Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:35:21.211037 containerd[1456]: time="2025-07-10T00:35:21.211022291Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:35:21.211108 containerd[1456]: time="2025-07-10T00:35:21.211086712Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:35:21.211673 containerd[1456]: time="2025-07-10T00:35:21.211629660Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:35:21.211736 containerd[1456]: time="2025-07-10T00:35:21.211718507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.211789 containerd[1456]: time="2025-07-10T00:35:21.211774762Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:35:21.211899 containerd[1456]: time="2025-07-10T00:35:21.211875922Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.211920 containerd[1456]: time="2025-07-10T00:35:21.211902702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.211974 containerd[1456]: time="2025-07-10T00:35:21.211957374Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.211995 containerd[1456]: time="2025-07-10T00:35:21.211986289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212031 containerd[1456]: time="2025-07-10T00:35:21.212002199Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212055 containerd[1456]: time="2025-07-10T00:35:21.212040480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212075 containerd[1456]: time="2025-07-10T00:35:21.212056540Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212093 containerd[1456]: time="2025-07-10T00:35:21.212071168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212133 containerd[1456]: time="2025-07-10T00:35:21.212115731Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:35:21.212500 containerd[1456]: time="2025-07-10T00:35:21.212474114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212526 containerd[1456]: time="2025-07-10T00:35:21.212508147Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212559 containerd[1456]: time="2025-07-10T00:35:21.212526993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.212579 containerd[1456]: time="2025-07-10T00:35:21.212566296Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:35:21.212617 containerd[1456]: time="2025-07-10T00:35:21.212589199Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:35:21.212658 containerd[1456]: time="2025-07-10T00:35:21.212643381Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:35:21.212697 containerd[1456]: time="2025-07-10T00:35:21.212681452Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:35:21.212761 containerd[1456]: time="2025-07-10T00:35:21.212746685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:35:21.213175 containerd[1456]: time="2025-07-10T00:35:21.213094046Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:35:21.213751 containerd[1456]: time="2025-07-10T00:35:21.213190517Z" level=info msg="Connect containerd service" Jul 10 00:35:21.213751 containerd[1456]: time="2025-07-10T00:35:21.213281357Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:35:21.214134 containerd[1456]: time="2025-07-10T00:35:21.214100103Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:35:21.214597 containerd[1456]: time="2025-07-10T00:35:21.214578670Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:35:21.214654 containerd[1456]: time="2025-07-10T00:35:21.214637711Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:35:21.214677 containerd[1456]: time="2025-07-10T00:35:21.214617904Z" level=info msg="Start subscribing containerd event" Jul 10 00:35:21.214697 containerd[1456]: time="2025-07-10T00:35:21.214659802Z" level=info msg="containerd successfully booted in 0.029582s" Jul 10 00:35:21.214717 containerd[1456]: time="2025-07-10T00:35:21.214702312Z" level=info msg="Start recovering state" Jul 10 00:35:21.214890 containerd[1456]: time="2025-07-10T00:35:21.214860990Z" level=info msg="Start event monitor" Jul 10 00:35:21.214890 containerd[1456]: time="2025-07-10T00:35:21.214883272Z" level=info msg="Start snapshots syncer" Jul 10 00:35:21.214968 containerd[1456]: time="2025-07-10T00:35:21.214897318Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:35:21.214968 containerd[1456]: time="2025-07-10T00:35:21.214906816Z" level=info msg="Start streaming server" Jul 10 00:35:21.288000 audit[1395]: USER_ACCT pid=1395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:21.290034 sshd[1395]: Accepted publickey for core from 10.0.0.1 port 36808 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:21.289000 audit[1395]: CRED_ACQ pid=1395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:21.289000 audit[1395]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3ca81bf0 a2=3 a3=0 items=0 ppid=1 pid=1395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.289000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:21.291382 sshd[1395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:21.295387 systemd-logind[1174]: New session 11 of user core. Jul 10 00:35:21.296138 systemd[1]: Started session-11.scope. Jul 10 00:35:21.299000 audit[1395]: USER_START pid=1395 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:21.300000 audit[1495]: CRED_ACQ pid=1495 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:21.384146 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:35:21.388965 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:35:21.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.389319 systemd[1]: Reached target network-online.target. Jul 10 00:35:21.390444 systemd[1]: Starting docker.service... Jul 10 00:35:21.447646 dockerd[1505]: time="2025-07-10T00:35:21.447587495Z" level=info msg="Starting up" Jul 10 00:35:21.449389 dockerd[1505]: time="2025-07-10T00:35:21.449351403Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 10 00:35:21.449389 dockerd[1505]: time="2025-07-10T00:35:21.449378484Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 10 00:35:21.449625 dockerd[1505]: time="2025-07-10T00:35:21.449596012Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 10 00:35:21.449625 dockerd[1505]: time="2025-07-10T00:35:21.449615428Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 10 00:35:21.451866 dockerd[1505]: time="2025-07-10T00:35:21.451846913Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 10 00:35:21.451866 dockerd[1505]: time="2025-07-10T00:35:21.451860999Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 10 00:35:21.451938 dockerd[1505]: time="2025-07-10T00:35:21.451872130Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 10 00:35:21.451938 dockerd[1505]: time="2025-07-10T00:35:21.451881909Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 10 00:35:21.459215 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1859843053-merged.mount: Deactivated successfully. Jul 10 00:35:21.484855 dockerd[1505]: time="2025-07-10T00:35:21.484804430Z" level=info msg="Loading containers: start." Jul 10 00:35:21.531000 audit[1538]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.531000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe52dc6090 a2=0 a3=7ffe52dc607c items=0 ppid=1505 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 10 00:35:21.533000 audit[1540]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.533000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc014d76a0 a2=0 a3=7ffc014d768c items=0 ppid=1505 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 10 00:35:21.534000 audit[1542]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.534000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffddc4de540 a2=0 a3=7ffddc4de52c items=0 ppid=1505 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:21.535000 audit[1544]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.535000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe611588d0 a2=0 a3=7ffe611588bc items=0 ppid=1505 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:21.537000 audit[1546]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.537000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec24d69e0 a2=0 a3=7ffec24d69cc items=0 ppid=1505 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 10 00:35:21.555000 audit[1551]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.555000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc449d29a0 a2=0 a3=7ffc449d298c items=0 ppid=1505 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.555000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 10 00:35:21.564000 audit[1553]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.564000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda954c510 a2=0 a3=7ffda954c4fc items=0 ppid=1505 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.564000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 10 00:35:21.566000 audit[1555]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.566000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffea6c75330 a2=0 a3=7ffea6c7531c items=0 ppid=1505 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.566000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 10 00:35:21.567000 audit[1557]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.567000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff21046310 a2=0 a3=7fff210462fc items=0 ppid=1505 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:21.574000 audit[1561]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.574000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdcc1cd0e0 a2=0 a3=7ffdcc1cd0cc items=0 ppid=1505 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:21.578000 audit[1562]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.578000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec80a2bf0 a2=0 a3=7ffec80a2bdc items=0 ppid=1505 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:21.588288 kernel: Initializing XFRM netlink socket Jul 10 00:35:21.618157 dockerd[1505]: time="2025-07-10T00:35:21.618108874Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 10 00:35:21.634000 audit[1569]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.634000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffefd96e9a0 a2=0 a3=7ffefd96e98c items=0 ppid=1505 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 10 00:35:21.644000 audit[1572]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.644000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff3336b910 a2=0 a3=7fff3336b8fc items=0 ppid=1505 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 10 00:35:21.646000 audit[1575]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.646000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffebb96ef10 a2=0 a3=7ffebb96eefc items=0 ppid=1505 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 10 00:35:21.648000 audit[1577]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.648000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdc985cdd0 a2=0 a3=7ffdc985cdbc items=0 ppid=1505 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 10 00:35:21.650000 audit[1579]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.650000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff60c79be0 a2=0 a3=7fff60c79bcc items=0 ppid=1505 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.650000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 10 00:35:21.652000 audit[1581]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.652000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff9dadd0d0 a2=0 a3=7fff9dadd0bc items=0 ppid=1505 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 10 00:35:21.654000 audit[1583]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.654000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe9c5e8d40 a2=0 a3=7ffe9c5e8d2c items=0 ppid=1505 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 10 00:35:21.661000 audit[1586]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.661000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe56d7e080 a2=0 a3=7ffe56d7e06c items=0 ppid=1505 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 10 00:35:21.663000 audit[1588]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.663000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc1cf07f50 a2=0 a3=7ffc1cf07f3c items=0 ppid=1505 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:21.664000 audit[1590]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.664000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe08434f20 a2=0 a3=7ffe08434f0c items=0 ppid=1505 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:21.666000 audit[1592]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.666000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff03e77040 a2=0 a3=7fff03e7702c items=0 ppid=1505 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.666000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 10 00:35:21.668322 systemd-networkd[1018]: docker0: Link UP Jul 10 00:35:21.676000 audit[1596]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1596 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.676000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5d35b580 a2=0 a3=7ffc5d35b56c items=0 ppid=1505 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:21.681000 audit[1597]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1597 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:21.681000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd77b90f70 a2=0 a3=7ffd77b90f5c items=0 ppid=1505 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:21.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:21.683425 dockerd[1505]: time="2025-07-10T00:35:21.683391592Z" level=info msg="Loading containers: done." Jul 10 00:35:21.783623 dockerd[1505]: time="2025-07-10T00:35:21.783565844Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 10 00:35:21.783804 dockerd[1505]: time="2025-07-10T00:35:21.783755851Z" level=info msg="Docker daemon" commit=3056208 graphdriver(s)=overlay2 version=20.10.21 Jul 10 00:35:21.783881 dockerd[1505]: time="2025-07-10T00:35:21.783829419Z" level=info msg="Daemon has completed initialization" Jul 10 00:35:21.801722 systemd[1]: Started docker.service. Jul 10 00:35:21.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:21.808952 dockerd[1505]: time="2025-07-10T00:35:21.808830445Z" level=info msg="API listen on /run/docker.sock" Jul 10 00:35:23.729883 systemd[1]: var-lib-docker-overlay2-682c26ffad85514b7023b4a03c9e0e942d797bee00e86331f23decdeb73a1ae7\x2dinit-merged.mount: Deactivated successfully. Jul 10 00:35:23.777090 kernel: docker0: port 1(veth05ee129) entered blocking state Jul 10 00:35:23.777238 kernel: docker0: port 1(veth05ee129) entered disabled state Jul 10 00:35:23.777294 kernel: device veth05ee129 entered promiscuous mode Jul 10 00:35:23.773000 audit: ANOM_PROMISCUOUS dev=veth05ee129 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 10 00:35:23.773000 audit[1505]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=f a1=c000144de0 a2=28 a3=0 items=0 ppid=1 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:23.773000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 10 00:35:23.778359 systemd-networkd[1018]: veth05ee129: Link UP Jul 10 00:35:23.832579 containerd[1456]: time="2025-07-10T00:35:23.832470622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:35:23.832579 containerd[1456]: time="2025-07-10T00:35:23.832532869Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:35:23.832579 containerd[1456]: time="2025-07-10T00:35:23.832542677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:35:23.832941 containerd[1456]: time="2025-07-10T00:35:23.832677440Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/f78980bd5d602c56d3f8f2fc6d2ef5f3b1b447b0e37ed4f0e069c0f89978be6e pid=1635 runtime=io.containerd.runc.v2 Jul 10 00:35:23.853047 systemd[1]: Started docker-f78980bd5d602c56d3f8f2fc6d2ef5f3b1b447b0e37ed4f0e069c0f89978be6e.scope. Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit: BPF prog-id=61 op=LOAD Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000143c48 a2=10 a3=1c items=0 ppid=1635 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F66373839383062643564363032633536643366386632666336 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001436b0 a2=3c a3=c items=0 ppid=1635 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F66373839383062643564363032633536643366386632666336 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit: BPF prog-id=62 op=LOAD Jul 10 00:35:23.860000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001439d8 a2=78 a3=c000280970 items=0 ppid=1635 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F66373839383062643564363032633536643366386632666336 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit: BPF prog-id=63 op=LOAD Jul 10 00:35:23.860000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000143770 a2=78 a3=c0002809b8 items=0 ppid=1635 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F66373839383062643564363032633536643366386632666336 Jul 10 00:35:23.860000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:35:23.860000 audit: BPF prog-id=62 op=UNLOAD Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:23.860000 audit: BPF prog-id=64 op=LOAD Jul 10 00:35:23.860000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000143c30 a2=78 a3=c000280e18 items=0 ppid=1635 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F66373839383062643564363032633536643366386632666336 Jul 10 00:35:24.083058 kernel: eth0: renamed from vethe825106 Jul 10 00:35:24.090844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth05ee129: link becomes ready Jul 10 00:35:24.090908 kernel: docker0: port 1(veth05ee129) entered blocking state Jul 10 00:35:24.090931 kernel: docker0: port 1(veth05ee129) entered forwarding state Jul 10 00:35:24.091656 systemd-networkd[1018]: veth05ee129: Gained carrier Jul 10 00:35:24.092779 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready Jul 10 00:35:24.092855 systemd-networkd[1018]: docker0: Gained carrier Jul 10 00:35:24.095365 systemd-resolved[1128]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:35:24.122542 systemd[1]: docker-f78980bd5d602c56d3f8f2fc6d2ef5f3b1b447b0e37ed4f0e069c0f89978be6e.scope: Deactivated successfully. Jul 10 00:35:24.121000 audit: BPF prog-id=61 op=UNLOAD Jul 10 00:35:24.139436 dockerd[1505]: time="2025-07-10T00:35:24.139383784Z" level=info msg="ignoring event" container=f78980bd5d602c56d3f8f2fc6d2ef5f3b1b447b0e37ed4f0e069c0f89978be6e module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 10 00:35:24.139725 containerd[1456]: time="2025-07-10T00:35:24.139490644Z" level=info msg="shim disconnected" id=f78980bd5d602c56d3f8f2fc6d2ef5f3b1b447b0e37ed4f0e069c0f89978be6e Jul 10 00:35:24.139725 containerd[1456]: time="2025-07-10T00:35:24.139552330Z" level=warning msg="cleaning up after shim disconnected" id=f78980bd5d602c56d3f8f2fc6d2ef5f3b1b447b0e37ed4f0e069c0f89978be6e namespace=moby Jul 10 00:35:24.139725 containerd[1456]: time="2025-07-10T00:35:24.139562910Z" level=info msg="cleaning up dead shim" Jul 10 00:35:24.147167 containerd[1456]: time="2025-07-10T00:35:24.147125372Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:35:24Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1693 runtime=io.containerd.runc.v2\n" Jul 10 00:35:24.152173 systemd-networkd[1018]: veth05ee129: Lost carrier Jul 10 00:35:24.152340 kernel: docker0: port 1(veth05ee129) entered disabled state Jul 10 00:35:24.152377 kernel: vethe825106: renamed from eth0 Jul 10 00:35:24.167283 systemd-networkd[1018]: veth05ee129: Link DOWN Jul 10 00:35:24.169524 kernel: docker0: port 1(veth05ee129) entered disabled state Jul 10 00:35:24.169582 kernel: device veth05ee129 left promiscuous mode Jul 10 00:35:24.169605 kernel: docker0: port 1(veth05ee129) entered disabled state Jul 10 00:35:24.165000 audit: ANOM_PROMISCUOUS dev=veth05ee129 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 10 00:35:24.165000 audit[1505]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=f a1=c000058f80 a2=20 a3=0 items=0 ppid=1 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:24.165000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 10 00:35:24.529000 audit: BPF prog-id=64 op=UNLOAD Jul 10 00:35:24.695269 sshd[1395]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:24.695000 audit[1395]: USER_END pid=1395 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.695000 audit[1395]: CRED_DISP pid=1395 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.698835 systemd[1]: sshd@10-10.0.0.24:22-10.0.0.1:36808.service: Deactivated successfully. Jul 10 00:35:24.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.24:22-10.0.0.1:36808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:24.699407 systemd[1]: session-11.scope: Deactivated successfully. Jul 10 00:35:24.699936 systemd-logind[1174]: Session 11 logged out. Waiting for processes to exit. Jul 10 00:35:24.701036 systemd[1]: Started sshd@11-10.0.0.24:22-10.0.0.1:36822.service. Jul 10 00:35:24.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.24:22-10.0.0.1:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:24.701700 systemd-logind[1174]: Removed session 11. Jul 10 00:35:24.727706 systemd[1]: var-lib-docker-overlay2-682c26ffad85514b7023b4a03c9e0e942d797bee00e86331f23decdeb73a1ae7-merged.mount: Deactivated successfully. Jul 10 00:35:24.732000 audit[1709]: USER_ACCT pid=1709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.733496 sshd[1709]: Accepted publickey for core from 10.0.0.1 port 36822 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:24.732000 audit[1709]: CRED_ACQ pid=1709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.733000 audit[1709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeade68f20 a2=3 a3=0 items=0 ppid=1 pid=1709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:24.733000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:24.734563 sshd[1709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:24.737305 systemd-logind[1174]: New session 12 of user core. Jul 10 00:35:24.737983 systemd[1]: Started session-12.scope. Jul 10 00:35:24.739000 audit[1709]: USER_START pid=1709 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.740000 audit[1711]: CRED_ACQ pid=1711 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.808158 sshd[1709]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:24.807000 audit[1709]: USER_END pid=1709 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.807000 audit[1709]: CRED_DISP pid=1709 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.810696 systemd[1]: sshd@11-10.0.0.24:22-10.0.0.1:36822.service: Deactivated successfully. Jul 10 00:35:24.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.24:22-10.0.0.1:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:24.811148 systemd[1]: session-12.scope: Deactivated successfully. Jul 10 00:35:24.811542 systemd-logind[1174]: Session 12 logged out. Waiting for processes to exit. Jul 10 00:35:24.812343 systemd[1]: Started sshd@12-10.0.0.24:22-10.0.0.1:36834.service. Jul 10 00:35:24.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.24:22-10.0.0.1:36834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:24.813087 systemd-logind[1174]: Removed session 12. Jul 10 00:35:24.838455 systemd-networkd[1018]: docker0: Lost carrier Jul 10 00:35:24.840000 audit[1718]: USER_ACCT pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.841939 sshd[1718]: Accepted publickey for core from 10.0.0.1 port 36834 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:24.841000 audit[1718]: CRED_ACQ pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.841000 audit[1718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9fb0c530 a2=3 a3=0 items=0 ppid=1 pid=1718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:24.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:24.842917 sshd[1718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:24.846210 systemd-logind[1174]: New session 13 of user core. Jul 10 00:35:24.847142 systemd[1]: Started session-13.scope. Jul 10 00:35:24.850000 audit[1718]: USER_START pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:24.851000 audit[1720]: CRED_ACQ pid=1720 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:25.222396 systemd-networkd[1018]: docker0: Gained IPv6LL Jul 10 00:35:34.092000 audit[1721]: USER_ACCT pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.093590 sudo[1721]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 10 00:35:34.093775 sudo[1721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:34.094648 kernel: kauditd_printk_skb: 372 callbacks suppressed Jul 10 00:35:34.094699 kernel: audit: type=1101 audit(1752107734.092:516): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.096763 sudo[1721]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:34.092000 audit[1721]: CRED_REFR pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.102542 kernel: audit: type=1110 audit(1752107734.092:517): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.102592 kernel: audit: type=1105 audit(1752107734.094:518): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.094000 audit[1721]: USER_START pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.095000 audit[1721]: USER_END pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.106789 sshd[1718]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:34.110040 systemd[1]: Started sshd@13-10.0.0.24:22-10.0.0.1:54796.service. Jul 10 00:35:34.095000 audit[1721]: CRED_DISP pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.111047 systemd[1]: sshd@12-10.0.0.24:22-10.0.0.1:36834.service: Deactivated successfully. Jul 10 00:35:34.111562 systemd[1]: session-13.scope: Deactivated successfully. Jul 10 00:35:34.111699 systemd[1]: session-13.scope: Consumed 5.638s CPU time. Jul 10 00:35:34.112095 systemd-logind[1174]: Session 13 logged out. Waiting for processes to exit. Jul 10 00:35:34.112873 systemd-logind[1174]: Removed session 13. Jul 10 00:35:34.114450 kernel: audit: type=1106 audit(1752107734.095:519): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.114491 kernel: audit: type=1104 audit(1752107734.095:520): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.114511 kernel: audit: type=1106 audit(1752107734.106:521): pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.106000 audit[1718]: USER_END pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.106000 audit[1718]: CRED_DISP pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.122784 kernel: audit: type=1104 audit(1752107734.106:522): pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.122809 kernel: audit: type=1130 audit(1752107734.108:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.24:22-10.0.0.1:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.24:22-10.0.0.1:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.24:22-10.0.0.1:36834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.130151 kernel: audit: type=1131 audit(1752107734.109:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.24:22-10.0.0.1:36834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.144000 audit[1777]: USER_ACCT pid=1777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.145938 sshd[1777]: Accepted publickey for core from 10.0.0.1 port 54796 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:34.148047 sshd[1777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:34.146000 audit[1777]: CRED_ACQ pid=1777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.146000 audit[1777]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcba60c5d0 a2=3 a3=0 items=0 ppid=1 pid=1777 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:34.150289 kernel: audit: type=1101 audit(1752107734.144:525): pid=1777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.151599 systemd-logind[1174]: New session 14 of user core. Jul 10 00:35:34.152324 systemd[1]: Started session-14.scope. Jul 10 00:35:34.154000 audit[1777]: USER_START pid=1777 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.155000 audit[1780]: CRED_ACQ pid=1780 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.203000 audit[1782]: USER_ACCT pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.203000 audit[1782]: CRED_REFR pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.204755 sudo[1782]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 10 00:35:34.204999 sudo[1782]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:34.205000 audit[1782]: USER_START pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.212385 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 10 00:35:34.212579 systemd[1]: Stopped ensure-sysext.service. Jul 10 00:35:34.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.212655 systemd[1]: Stopping ensure-sysext.service... Jul 10 00:35:34.213811 systemd[1]: Stopping systemd-sysext.service... Jul 10 00:35:34.218456 systemd-sysext[1784]: Unmerged '/usr'. Jul 10 00:35:34.222385 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:35:34.233411 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:35:34.240197 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:35:34.241249 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 10 00:35:34.241448 systemd[1]: Stopped systemd-sysext.service. Jul 10 00:35:34.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.241705 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:34.241834 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:34.243192 systemd[1]: Starting systemd-sysext.service... Jul 10 00:35:34.249350 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:35:34.251915 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:35:34.252068 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:35:34.260286 kernel: loop4: detected capacity change from 0 to 301320 Jul 10 00:35:34.266277 kernel: EXT4-fs (loop4): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:34.328277 kernel: loop5: detected capacity change from 0 to 322896 Jul 10 00:35:34.334278 kernel: EXT4-fs (loop5): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:34.348281 kernel: loop6: detected capacity change from 0 to 301320 Jul 10 00:35:34.353886 kernel: EXT4-fs (loop6): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:34.353935 kernel: loop7: detected capacity change from 0 to 322896 Jul 10 00:35:34.360197 (sd-sysext)[1796]: Using extensions 'containerd', 'docker'. Jul 10 00:35:34.360468 kernel: EXT4-fs (loop7): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:35:34.360611 (sd-sysext)[1796]: Merged extensions into '/usr'. Jul 10 00:35:34.379178 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:35:34.384707 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:35:34.385917 systemd[1]: Finished systemd-sysext.service. Jul 10 00:35:34.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.386591 sudo[1782]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:34.385000 audit[1782]: USER_END pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.385000 audit[1782]: CRED_DISP pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.386793 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:34.386874 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:35:34.388014 systemd[1]: Starting ensure-sysext.service... Jul 10 00:35:34.390000 audit[1781]: USER_ACCT pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.391672 sudo[1781]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart docker containerd Jul 10 00:35:34.390000 audit[1781]: CRED_REFR pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.391936 sudo[1781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:35:34.393817 systemd[1]: Reloading. Jul 10 00:35:34.393000 audit[1781]: USER_START pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.506418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:35:34.506436 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:35:34.522408 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.585000 audit: BPF prog-id=65 op=LOAD Jul 10 00:35:34.585000 audit: BPF prog-id=46 op=UNLOAD Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit: BPF prog-id=66 op=LOAD Jul 10 00:35:34.587000 audit: BPF prog-id=47 op=UNLOAD Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit: BPF prog-id=67 op=LOAD Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit: BPF prog-id=68 op=LOAD Jul 10 00:35:34.587000 audit: BPF prog-id=48 op=UNLOAD Jul 10 00:35:34.587000 audit: BPF prog-id=49 op=UNLOAD Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit: BPF prog-id=69 op=LOAD Jul 10 00:35:34.588000 audit: BPF prog-id=50 op=UNLOAD Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit: BPF prog-id=70 op=LOAD Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit: BPF prog-id=71 op=LOAD Jul 10 00:35:34.588000 audit: BPF prog-id=51 op=UNLOAD Jul 10 00:35:34.588000 audit: BPF prog-id=52 op=UNLOAD Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit: BPF prog-id=72 op=LOAD Jul 10 00:35:34.589000 audit: BPF prog-id=53 op=UNLOAD Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.589000 audit: BPF prog-id=73 op=LOAD Jul 10 00:35:34.589000 audit: BPF prog-id=54 op=UNLOAD Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.590000 audit: BPF prog-id=74 op=LOAD Jul 10 00:35:34.590000 audit: BPF prog-id=55 op=UNLOAD Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit: BPF prog-id=75 op=LOAD Jul 10 00:35:34.591000 audit: BPF prog-id=56 op=UNLOAD Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit: BPF prog-id=76 op=LOAD Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.591000 audit: BPF prog-id=77 op=LOAD Jul 10 00:35:34.591000 audit: BPF prog-id=57 op=UNLOAD Jul 10 00:35:34.592000 audit: BPF prog-id=58 op=UNLOAD Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit: BPF prog-id=78 op=LOAD Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:34.593000 audit: BPF prog-id=79 op=LOAD Jul 10 00:35:34.593000 audit: BPF prog-id=59 op=UNLOAD Jul 10 00:35:34.593000 audit: BPF prog-id=60 op=UNLOAD Jul 10 00:35:34.607419 dockerd[1505]: time="2025-07-10T00:35:34.605106169Z" level=info msg="Processing signal 'terminated'" Jul 10 00:35:34.607419 dockerd[1505]: time="2025-07-10T00:35:34.605660168Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Jul 10 00:35:34.607419 dockerd[1505]: time="2025-07-10T00:35:34.605847479Z" level=info msg="Daemon shutdown complete" Jul 10 00:35:34.605173 systemd[1]: Stopping docker.service... Jul 10 00:35:34.606151 systemd[1]: Stopped target sockets.target. Jul 10 00:35:34.606164 systemd[1]: Stopping sockets.target... Jul 10 00:35:34.607772 systemd[1]: docker.service: Deactivated successfully. Jul 10 00:35:34.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.607941 systemd[1]: Stopped docker.service. Jul 10 00:35:34.608351 systemd[1]: Stopped target timers.target. Jul 10 00:35:34.608366 systemd[1]: Stopping timers.target... Jul 10 00:35:34.608487 systemd[1]: Reached target timers.target. Jul 10 00:35:34.608721 systemd[1]: docker.socket: Deactivated successfully. Jul 10 00:35:34.608959 systemd[1]: Closed docker.socket. Jul 10 00:35:34.608980 systemd[1]: Stopping docker.socket... Jul 10 00:35:34.610429 systemd[1]: Starting docker.socket... Jul 10 00:35:34.611351 containerd[1456]: time="2025-07-10T00:35:34.610902590Z" level=info msg="Stop CRI service" Jul 10 00:35:34.610738 systemd[1]: Stopping containerd.service... Jul 10 00:35:34.611424 systemd[1]: Listening on docker.socket. Jul 10 00:35:34.612019 systemd[1]: Reached target sockets.target. Jul 10 00:35:34.612452 containerd[1456]: time="2025-07-10T00:35:34.612309658Z" level=info msg="Stop CRI service" Jul 10 00:35:34.614240 systemd[1]: containerd.service: Deactivated successfully. Jul 10 00:35:34.614410 systemd[1]: Stopped containerd.service. Jul 10 00:35:34.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.614826 systemd[1]: Stopped target multi-user.target. Jul 10 00:35:34.614843 systemd[1]: Stopping multi-user.target... Jul 10 00:35:34.614863 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:35:34.616269 systemd[1]: Starting containerd.service... Jul 10 00:35:34.617424 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:35:34.618577 systemd[1]: Starting extend-filesystems.service... Jul 10 00:35:34.619899 jq[1861]: false Jul 10 00:35:34.619728 systemd[1]: Starting issuegen.service... Jul 10 00:35:34.620947 systemd[1]: Starting motdgen.service... Jul 10 00:35:34.622226 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:35:34.622475 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:35:34.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.625153 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:35:34.625306 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:35:34.625978 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:35:34.626104 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:35:34.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.628044 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:35:34.628170 systemd[1]: Finished issuegen.service. Jul 10 00:35:34.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.629125 systemd[1]: Started containerd.service. Jul 10 00:35:34.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.631888 systemd[1]: Finished ensure-sysext.service. Jul 10 00:35:34.632367 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:35:34.632565 systemd[1]: Finished motdgen.service. Jul 10 00:35:34.636279 extend-filesystems[1862]: Found loop2 Jul 10 00:35:34.636279 extend-filesystems[1862]: Found loop3 Jul 10 00:35:34.636279 extend-filesystems[1862]: Found loop6 Jul 10 00:35:34.636279 extend-filesystems[1862]: Found loop7 Jul 10 00:35:34.636279 extend-filesystems[1862]: Found sr0 Jul 10 00:35:34.636279 extend-filesystems[1862]: Found vda Jul 10 00:35:34.636041 systemd[1]: Starting docker.service... Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda1 Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda2 Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda3 Jul 10 00:35:34.639946 extend-filesystems[1862]: Found usr Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda4 Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda6 Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda7 Jul 10 00:35:34.639946 extend-filesystems[1862]: Found vda9 Jul 10 00:35:34.639946 extend-filesystems[1862]: Checking size of /dev/vda9 Jul 10 00:35:34.650008 extend-filesystems[1862]: Old size kept for /dev/vda9 Jul 10 00:35:34.651355 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:35:34.651542 systemd[1]: Finished extend-filesystems.service. Jul 10 00:35:34.652135 systemd[1]: Reached target multi-user.target. Jul 10 00:35:34.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.654064 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:35:34.679863 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:35:34.680097 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:35:34.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.705157 containerd[1877]: time="2025-07-10T00:35:34.705092569Z" level=info msg="starting containerd" revision=5b842e528e99d4d4c1686467debf2bd4b88ecd86 version=v1.6.15 Jul 10 00:35:34.725512 dockerd[1878]: time="2025-07-10T00:35:34.725459695Z" level=info msg="Starting up" Jul 10 00:35:34.727015 dockerd[1878]: time="2025-07-10T00:35:34.726986528Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 10 00:35:34.727015 dockerd[1878]: time="2025-07-10T00:35:34.727002308Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 10 00:35:34.727104 dockerd[1878]: time="2025-07-10T00:35:34.727019059Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 10 00:35:34.727104 dockerd[1878]: time="2025-07-10T00:35:34.727035520Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 10 00:35:34.729291 containerd[1877]: time="2025-07-10T00:35:34.729244222Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:35:34.729339 containerd[1877]: time="2025-07-10T00:35:34.729307772Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:34.730583 containerd[1877]: time="2025-07-10T00:35:34.730546615Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:35:34.730583 containerd[1877]: time="2025-07-10T00:35:34.730572814Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:34.730751 containerd[1877]: time="2025-07-10T00:35:34.730727664Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:35:34.730751 containerd[1877]: time="2025-07-10T00:35:34.730743023Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:34.730796 containerd[1877]: time="2025-07-10T00:35:34.730754144Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:35:34.730796 containerd[1877]: time="2025-07-10T00:35:34.730762820Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:34.730796 containerd[1877]: time="2025-07-10T00:35:34.730782036Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:34.731434 containerd[1877]: time="2025-07-10T00:35:34.731413781Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:35:34.731531 containerd[1877]: time="2025-07-10T00:35:34.731517636Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:35:34.731555 containerd[1877]: time="2025-07-10T00:35:34.731532424Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:35:34.731555 containerd[1877]: time="2025-07-10T00:35:34.731545368Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:35:34.731597 containerd[1877]: time="2025-07-10T00:35:34.731553162Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:35:34.731771 containerd[1877]: time="2025-07-10T00:35:34.731751454Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:35:34.731797 containerd[1877]: time="2025-07-10T00:35:34.731771161Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:35:34.731797 containerd[1877]: time="2025-07-10T00:35:34.731781180Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:35:34.731926 containerd[1877]: time="2025-07-10T00:35:34.731914079Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.731947 containerd[1877]: time="2025-07-10T00:35:34.731930741Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.731947 containerd[1877]: time="2025-07-10T00:35:34.731943094Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.731986 containerd[1877]: time="2025-07-10T00:35:34.731954245Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.732285 containerd[1877]: time="2025-07-10T00:35:34.732274135Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.732314 containerd[1877]: time="2025-07-10T00:35:34.732289093Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.732314 containerd[1877]: time="2025-07-10T00:35:34.732300364Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.732314 containerd[1877]: time="2025-07-10T00:35:34.732310903Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.732375 containerd[1877]: time="2025-07-10T00:35:34.732321814Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:35:34.732375 containerd[1877]: time="2025-07-10T00:35:34.732351480Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:35:34.732423 containerd[1877]: time="2025-07-10T00:35:34.732411813Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:35:34.732874 containerd[1877]: time="2025-07-10T00:35:34.732850095Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:35:34.732921 containerd[1877]: time="2025-07-10T00:35:34.732874430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.732921 containerd[1877]: time="2025-07-10T00:35:34.732885601Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:35:34.732961 containerd[1877]: time="2025-07-10T00:35:34.732943069Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.732961 containerd[1877]: time="2025-07-10T00:35:34.732953529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.732997 containerd[1877]: time="2025-07-10T00:35:34.732963507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.732997 containerd[1877]: time="2025-07-10T00:35:34.732973526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.732997 containerd[1877]: time="2025-07-10T00:35:34.732983405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.732997 containerd[1877]: time="2025-07-10T00:35:34.732993313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733069 containerd[1877]: time="2025-07-10T00:35:34.733003352Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733069 containerd[1877]: time="2025-07-10T00:35:34.733013070Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733069 containerd[1877]: time="2025-07-10T00:35:34.733023861Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:35:34.733126 containerd[1877]: time="2025-07-10T00:35:34.733070889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733126 containerd[1877]: time="2025-07-10T00:35:34.733081298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733126 containerd[1877]: time="2025-07-10T00:35:34.733092209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733126 containerd[1877]: time="2025-07-10T00:35:34.733103059Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:35:34.733126 containerd[1877]: time="2025-07-10T00:35:34.733114951Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:35:34.733126 containerd[1877]: time="2025-07-10T00:35:34.733123527Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:35:34.733242 containerd[1877]: time="2025-07-10T00:35:34.733154786Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:35:34.733242 containerd[1877]: time="2025-07-10T00:35:34.733187828Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:35:34.733425 containerd[1877]: time="2025-07-10T00:35:34.733375590Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:35:34.733521 containerd[1877]: time="2025-07-10T00:35:34.733426425Z" level=info msg="Connect containerd service" Jul 10 00:35:34.733521 containerd[1877]: time="2025-07-10T00:35:34.733450461Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:35:34.733913 containerd[1877]: time="2025-07-10T00:35:34.733889604Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:35:34.734331 containerd[1877]: time="2025-07-10T00:35:34.734317667Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:35:34.734376 containerd[1877]: time="2025-07-10T00:35:34.734354977Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:35:34.734376 containerd[1877]: time="2025-07-10T00:35:34.734368903Z" level=info msg="containerd successfully booted in 0.030202s" Jul 10 00:35:34.734452 containerd[1877]: time="2025-07-10T00:35:34.734417414Z" level=info msg="Start subscribing containerd event" Jul 10 00:35:34.734489 containerd[1877]: time="2025-07-10T00:35:34.734470223Z" level=info msg="Start recovering state" Jul 10 00:35:34.734600 containerd[1877]: time="2025-07-10T00:35:34.734588445Z" level=info msg="Start event monitor" Jul 10 00:35:34.734656 containerd[1877]: time="2025-07-10T00:35:34.734645331Z" level=info msg="Start snapshots syncer" Jul 10 00:35:34.734685 containerd[1877]: time="2025-07-10T00:35:34.734658957Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:35:34.734685 containerd[1877]: time="2025-07-10T00:35:34.734666481Z" level=info msg="Start streaming server" Jul 10 00:35:34.740928 dockerd[1878]: time="2025-07-10T00:35:34.740897246Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 10 00:35:34.740928 dockerd[1878]: time="2025-07-10T00:35:34.740914909Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 10 00:35:34.740928 dockerd[1878]: time="2025-07-10T00:35:34.740926932Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 10 00:35:34.741017 dockerd[1878]: time="2025-07-10T00:35:34.740934506Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 10 00:35:34.752913 dockerd[1878]: time="2025-07-10T00:35:34.752878325Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jul 10 00:35:34.762528 dockerd[1878]: time="2025-07-10T00:35:34.762469562Z" level=info msg="Loading containers: start." Jul 10 00:35:34.765000 audit[1910]: NETFILTER_CFG table=nat:26 family=2 entries=1 op=nft_unregister_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.765000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=268 a0=3 a1=7ffe91c06510 a2=0 a3=7ffe91c064fc items=0 ppid=1878 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 10 00:35:34.775000 audit[1911]: NETFILTER_CFG table=nat:27 family=2 entries=1 op=nft_unregister_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.775000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=360 a0=3 a1=7fffa7e8c6e0 a2=0 a3=7fffa7e8c6cc items=0 ppid=1878 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.775000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D44004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C0000002D2D647374003132372E302E302E302F38002D6A00444F434B4552 Jul 10 00:35:34.787000 audit[1915]: NETFILTER_CFG table=nat:28 family=2 entries=1 op=nft_unregister_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.787000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7ffc18bb90f0 a2=0 a3=7ffc18bb90dc items=0 ppid=1878 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4600444F434B4552 Jul 10 00:35:34.792000 audit[1916]: NETFILTER_CFG table=nat:29 family=2 entries=1 op=nft_unregister_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.792000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7780bd80 a2=0 a3=7ffc7780bd6c items=0 ppid=1878 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D5800444F434B4552 Jul 10 00:35:34.804000 audit[1919]: NETFILTER_CFG table=filter:30 family=2 entries=2 op=nft_unregister_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.804000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffea4212950 a2=0 a3=7ffea421293c items=0 ppid=1878 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:34.816000 audit[1921]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_unregister_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.816000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa7881040 a2=0 a3=7fffa788102c items=0 ppid=1878 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:34.821000 audit[1922]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_unregister_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.821000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=120 a0=3 a1=7ffe37000860 a2=0 a3=7ffe3700084c items=0 ppid=1878 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D5800444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:34.827000 audit[1926]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.827000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7fffcb43e000 a2=0 a3=7fffcb43dfec items=0 ppid=1878 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 10 00:35:34.830000 audit[1930]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.830000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc8e6b4230 a2=0 a3=7ffc8e6b421c items=0 ppid=1878 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:34.832000 audit[1932]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.832000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb1185110 a2=0 a3=7fffb11850fc items=0 ppid=1878 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 10 00:35:34.833000 audit[1934]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.833000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc093a8f70 a2=0 a3=7ffc093a8f5c items=0 ppid=1878 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.833000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 10 00:35:34.838000 audit[1939]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.838000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdad3908f0 a2=0 a3=7ffdad3908dc items=0 ppid=1878 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 10 00:35:34.842000 audit[1944]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.842000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=276 a0=3 a1=7ffdf4560810 a2=0 a3=7ffdf45607fc items=0 ppid=1878 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.842000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 10 00:35:34.843000 audit[1946]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.843000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=368 a0=3 a1=7ffcfb23e880 a2=0 a3=7ffcfb23e86c items=0 ppid=1878 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.843000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 10 00:35:34.848000 audit[1952]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_unregister_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.848000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7ffe8675f6f0 a2=0 a3=7ffe8675f6dc items=0 ppid=1878 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.848000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:34.857000 audit[1953]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.857000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff81119890 a2=0 a3=7fff8111987c items=0 ppid=1878 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.857000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:34.859000 audit[1955]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.859000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe69142230 a2=0 a3=7ffe6914221c items=0 ppid=1878 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:34.861000 audit[1957]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.861000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffffa355c80 a2=0 a3=7ffffa355c6c items=0 ppid=1878 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.861000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 10 00:35:34.866000 audit[1959]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_unregister_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.866000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=404 a0=3 a1=7fffcff64ea0 a2=0 a3=7fffcff64e8c items=0 ppid=1878 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.866000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 10 00:35:34.871000 audit[1961]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_unregister_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.871000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=280 a0=3 a1=7ffd90847c70 a2=0 a3=7ffd90847c5c items=0 ppid=1878 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 10 00:35:34.877000 audit[1963]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_unregister_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.877000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffd3ed12380 a2=0 a3=7ffd3ed1236c items=0 ppid=1878 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.877000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 10 00:35:34.885000 audit[1965]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_unregister_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.885000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7fff9655a770 a2=0 a3=7fff9655a75c items=0 ppid=1878 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 10 00:35:34.893000 audit[1968]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_unregister_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.893000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe9aad2280 a2=0 a3=7ffe9aad226c items=0 ppid=1878 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 10 00:35:34.900000 audit[1971]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_unregister_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.900000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=512 a0=3 a1=7ffd578fbd30 a2=0 a3=7ffd578fbd1c items=0 ppid=1878 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 10 00:35:34.907000 audit[1973]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_unregister_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.907000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=420 a0=3 a1=7ffebcf63b30 a2=0 a3=7ffebcf63b1c items=0 ppid=1878 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.907000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:34.917000 audit[1975]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_unregister_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.917000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff43ed6e40 a2=0 a3=7fff43ed6e2c items=0 ppid=1878 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 10 00:35:34.926370 dockerd[1878]: time="2025-07-10T00:35:34.926333545Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 10 00:35:34.926000 audit[1977]: NETFILTER_CFG table=nat:52 family=2 entries=1 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.926000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=412 a0=3 a1=7ffccdad85c0 a2=0 a3=7ffccdad85ac items=0 ppid=1878 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 10 00:35:34.928000 audit[1979]: NETFILTER_CFG table=nat:53 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.928000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd13fe3e60 a2=0 a3=7ffd13fe3e4c items=0 ppid=1878 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 10 00:35:34.931000 audit[1982]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.931000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffefc88a0e0 a2=0 a3=7ffefc88a0cc items=0 ppid=1878 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.931000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 10 00:35:34.932000 audit[1984]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.932000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcc279b600 a2=0 a3=7ffcc279b5ec items=0 ppid=1878 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 10 00:35:34.937000 audit[1990]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.937000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe272c67d0 a2=0 a3=7ffe272c67bc items=0 ppid=1878 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 10 00:35:34.938000 audit[1992]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.938000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc74437480 a2=0 a3=7ffc7443746c items=0 ppid=1878 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.938000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 10 00:35:34.940000 audit[1994]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_unregister_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.940000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7ffe13112cd0 a2=0 a3=7ffe13112cbc items=0 ppid=1878 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:34.944000 audit[1995]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.944000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffeff27cb40 a2=0 a3=7ffeff27cb2c items=0 ppid=1878 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:35:34.946000 audit[1997]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.946000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff2127f0f0 a2=0 a3=7fff2127f0dc items=0 ppid=1878 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:35:34.948000 audit[1999]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.948000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd0cee8b0 a2=0 a3=7fffd0cee89c items=0 ppid=1878 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.948000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 10 00:35:34.955000 audit[2003]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_unregister_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.955000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff40d92ee0 a2=0 a3=7fff40d92ecc items=0 ppid=1878 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:34.960000 audit[2004]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:35:34.960000 audit[2004]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc30955780 a2=0 a3=7ffc3095576c items=0 ppid=1878 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:34.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:35:34.962350 dockerd[1878]: time="2025-07-10T00:35:34.962311707Z" level=info msg="Loading containers: done." Jul 10 00:35:34.984370 dockerd[1878]: time="2025-07-10T00:35:34.984322074Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 10 00:35:34.984601 dockerd[1878]: time="2025-07-10T00:35:34.984473017Z" level=info msg="Docker daemon" commit=6051f14 graphdriver(s)=overlay2 version=20.10.23 Jul 10 00:35:34.984601 dockerd[1878]: time="2025-07-10T00:35:34.984502062Z" level=info msg="Daemon has completed initialization" Jul 10 00:35:34.992847 systemd[1]: Started docker.service. Jul 10 00:35:34.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.993888 sudo[1781]: pam_unix(sudo:session): session closed for user root Jul 10 00:35:34.992000 audit[1781]: USER_END pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.992000 audit[1781]: CRED_DISP pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.995169 sshd[1777]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:34.994000 audit[1777]: USER_END pid=1777 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.994000 audit[1777]: CRED_DISP pid=1777 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:34.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.24:22-10.0.0.1:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:34.999999 systemd[1]: Started sshd@14-10.0.0.24:22-10.0.0.1:54798.service. Jul 10 00:35:35.002504 systemd-logind[1174]: Session 14 logged out. Waiting for processes to exit. Jul 10 00:35:35.005526 dockerd[1878]: time="2025-07-10T00:35:35.005452917Z" level=info msg="API listen on /run/docker.sock" Jul 10 00:35:35.030000 audit[2024]: USER_ACCT pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:35.032421 sshd[2024]: Accepted publickey for core from 10.0.0.1 port 54798 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:35:35.032000 audit[2024]: CRED_ACQ pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:35.032000 audit[2024]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73ca2b20 a2=3 a3=0 items=0 ppid=1 pid=2024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:35:35.033646 sshd[2024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:35:35.037159 systemd-logind[1174]: New session 15 of user core. Jul 10 00:35:35.038110 systemd[1]: Started session-15.scope. Jul 10 00:35:35.040000 audit[2024]: USER_START pid=2024 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:35.043000 audit[2026]: CRED_ACQ pid=2026 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:35.046354 systemd[1]: sshd@13-10.0.0.24:22-10.0.0.1:54796.service: Deactivated successfully. Jul 10 00:35:35.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.24:22-10.0.0.1:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:35.046992 systemd[1]: session-14.scope: Deactivated successfully. Jul 10 00:35:35.047720 systemd-logind[1174]: Removed session 14. Jul 10 00:35:35.598374 kernel: docker0: port 1(vetha156208) entered blocking state Jul 10 00:35:35.598507 kernel: docker0: port 1(vetha156208) entered disabled state Jul 10 00:35:35.598528 kernel: device vetha156208 entered promiscuous mode Jul 10 00:35:35.595000 audit: ANOM_PROMISCUOUS dev=vetha156208 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 10 00:35:35.595000 audit[1878]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=e a1=c00012ccf0 a2=28 a3=0 items=0 ppid=1 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.595000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 10 00:35:35.599421 systemd-networkd[1018]: vetha156208: Link UP Jul 10 00:35:35.637874 containerd[1877]: time="2025-07-10T00:35:35.637703245Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:35:35.637874 containerd[1877]: time="2025-07-10T00:35:35.637744865Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:35:35.637874 containerd[1877]: time="2025-07-10T00:35:35.637756568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:35:35.638228 containerd[1877]: time="2025-07-10T00:35:35.637994214Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5 pid=2048 runtime=io.containerd.runc.v2 Jul 10 00:35:35.648148 systemd[1]: Started docker-d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5.scope. Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit: BPF prog-id=80 op=LOAD Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64396562383461393266663633363732646630343534636535 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64396562383461393266663633363732646630343534636535 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit: BPF prog-id=81 op=LOAD Jul 10 00:35:35.654000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002191f0 items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64396562383461393266663633363732646630343534636535 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit: BPF prog-id=82 op=LOAD Jul 10 00:35:35.654000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219238 items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64396562383461393266663633363732646630343534636535 Jul 10 00:35:35.654000 audit: BPF prog-id=82 op=UNLOAD Jul 10 00:35:35.654000 audit: BPF prog-id=81 op=UNLOAD Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:35:35.654000 audit: BPF prog-id=83 op=LOAD Jul 10 00:35:35.654000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219698 items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F64396562383461393266663633363732646630343534636535 Jul 10 00:35:35.720300 kernel: eth0: renamed from vethf804c6d Jul 10 00:35:35.729460 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): vetha156208: link becomes ready Jul 10 00:35:35.729502 kernel: docker0: port 1(vetha156208) entered blocking state Jul 10 00:35:35.729520 kernel: docker0: port 1(vetha156208) entered forwarding state Jul 10 00:35:35.730415 systemd-networkd[1018]: vetha156208: Gained carrier Jul 10 00:35:35.730595 systemd-networkd[1018]: docker0: Gained carrier Jul 10 00:35:35.733879 systemd-resolved[1128]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:35:35.756111 systemd[1]: docker-d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5.scope: Deactivated successfully. Jul 10 00:35:35.755000 audit: BPF prog-id=80 op=UNLOAD Jul 10 00:35:35.760553 containerd[1877]: time="2025-07-10T00:35:35.760457342Z" level=warning msg="error from *cgroupsv2.Manager.EventChan" error="failed to add inotify watch for \"/sys/fs/cgroup/system.slice/docker-d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5.scope/memory.events\": no such file or directory" Jul 10 00:35:35.771159 dockerd[1878]: time="2025-07-10T00:35:35.771103744Z" level=info msg="ignoring event" container=d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 10 00:35:35.771508 containerd[1877]: time="2025-07-10T00:35:35.771294680Z" level=info msg="shim disconnected" id=d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5 Jul 10 00:35:35.771508 containerd[1877]: time="2025-07-10T00:35:35.771342562Z" level=warning msg="cleaning up after shim disconnected" id=d9eb84a92ff63672df0454ce5a11255e3d22eed5dee64bfafd1d35d65a2352f5 namespace=moby Jul 10 00:35:35.771508 containerd[1877]: time="2025-07-10T00:35:35.771353433Z" level=info msg="cleaning up dead shim" Jul 10 00:35:35.777561 containerd[1877]: time="2025-07-10T00:35:35.777504936Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:35:35Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2104 runtime=io.containerd.runc.v2\n" Jul 10 00:35:35.782061 systemd-networkd[1018]: vetha156208: Lost carrier Jul 10 00:35:35.782736 kernel: docker0: port 1(vetha156208) entered disabled state Jul 10 00:35:35.782783 kernel: vethf804c6d: renamed from eth0 Jul 10 00:35:35.797826 systemd-networkd[1018]: vetha156208: Link DOWN Jul 10 00:35:35.799670 kernel: docker0: port 1(vetha156208) entered disabled state Jul 10 00:35:35.799725 kernel: device vetha156208 left promiscuous mode Jul 10 00:35:35.799749 kernel: docker0: port 1(vetha156208) entered disabled state Jul 10 00:35:35.796000 audit: ANOM_PROMISCUOUS dev=vetha156208 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 10 00:35:35.796000 audit[1878]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=e a1=c000349fa0 a2=20 a3=0 items=0 ppid=1 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:35:35.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 10 00:35:35.866000 audit: BPF prog-id=83 op=UNLOAD Jul 10 00:35:35.929012 sshd[2024]: pam_unix(sshd:session): session closed for user core Jul 10 00:35:35.928000 audit[2024]: USER_END pid=2024 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:35.928000 audit[2024]: CRED_DISP pid=2024 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:35:35.931458 systemd[1]: sshd@14-10.0.0.24:22-10.0.0.1:54798.service: Deactivated successfully. Jul 10 00:35:35.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.24:22-10.0.0.1:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:35:35.932106 systemd[1]: session-15.scope: Deactivated successfully. Jul 10 00:35:35.932539 systemd-logind[1174]: Session 15 logged out. Waiting for processes to exit. Jul 10 00:35:35.933154 systemd-logind[1174]: Removed session 15. Jul 10 00:35:36.220119 systemd[1]: var-lib-docker-overlay2-154b013abdc6112b4ba9b9a11b64d514b5a3b2d0db1ecb90623ec98dd9be8015-merged.mount: Deactivated successfully. Jul 10 00:35:36.614592 systemd-networkd[1018]: docker0: Lost carrier