7月 12 14:11:46 localhost kernel: Linux version 6.1.8-3.0.0.8.oe1.x86_64 (abuild@ecs-obsworker-203) (gcc_old (GCC) 10.3.1, GNU ld (GNU Binutils) 2.37) #1 SMP PREEMPT_DYNAMIC Mon Jul 10 16:16:39 UTC 2023 7月 12 14:11:46 localhost kernel: Command line: BOOT_IMAGE=/vmlinuz-6.1.8-3.0.0.8.oe1.x86_64 root=/dev/mapper/openeuler-root ro resume=/dev/mapper/openeuler-swap rd.lvm.lv=openeuler/root rd.lvm.lv=openeuler/swap cgroup_disable=files apparmor=0 crashkernel=512M 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' 7月 12 14:11:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 7月 12 14:11:46 localhost kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 7月 12 14:11:46 localhost kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. 7月 12 14:11:46 localhost kernel: signal: max sigframe size: 3632 7月 12 14:11:46 localhost kernel: BIOS-provided physical RAM map: 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffd8fff] usable 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x00000000bffd9000-0x00000000bfffffff] reserved 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved 7月 12 14:11:46 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable 7月 12 14:11:46 localhost kernel: NX (Execute Disable) protection: active 7月 12 14:11:46 localhost kernel: SMBIOS 2.8 present. 7月 12 14:11:46 localhost kernel: DMI: Red Hat KVM, BIOS 1.11.0-2.el7 04/01/2014 7月 12 14:11:46 localhost kernel: Hypervisor detected: KVM 7月 12 14:11:46 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 7月 12 14:11:46 localhost kernel: kvm-clock: using sched offset of 6408579938 cycles 7月 12 14:11:46 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns 7月 12 14:11:46 localhost kernel: tsc: Detected 2300.000 MHz processor 7月 12 14:11:46 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved 7月 12 14:11:46 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable 7月 12 14:11:46 localhost kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 7月 12 14:11:46 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT 7月 12 14:11:46 localhost kernel: last_pfn = 0xbffd9 max_arch_pfn = 0x400000000 7月 12 14:11:46 localhost kernel: found SMP MP-table at [mem 0x000f6370-0x000f637f] 7月 12 14:11:46 localhost kernel: Using GB pages for direct mapping 7月 12 14:11:46 localhost kernel: RAMDISK: [mem 0x3444b000-0x3621dfff] 7月 12 14:11:46 localhost kernel: ACPI: Early table checksum verification disabled 7月 12 14:11:46 localhost kernel: ACPI: RSDP 0x00000000000F6130 000014 (v00 BOCHS ) 7月 12 14:11:46 localhost kernel: ACPI: RSDT 0x00000000BFFE14D1 00002C (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) 7月 12 14:11:46 localhost kernel: ACPI: FACP 0x00000000BFFE13E5 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) 7月 12 14:11:46 localhost kernel: ACPI: DSDT 0x00000000BFFE0040 0013A5 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) 7月 12 14:11:46 localhost kernel: ACPI: FACS 0x00000000BFFE0000 000040 7月 12 14:11:46 localhost kernel: ACPI: APIC 0x00000000BFFE1459 000078 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) 7月 12 14:11:46 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe13e5-0xbffe1458] 7月 12 14:11:46 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe13e4] 7月 12 14:11:46 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] 7月 12 14:11:46 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1459-0xbffe14d0] 7月 12 14:11:46 localhost kernel: No NUMA configuration found 7月 12 14:11:46 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] 7月 12 14:11:46 localhost kernel: NODE_DATA(0) allocated [mem 0x13ffd3000-0x13fffdfff] 7月 12 14:11:46 localhost kernel: Reserving 512MB of memory at 2544MB for crashkernel (System RAM: 4095MB) 7月 12 14:11:46 localhost kernel: Zone ranges: 7月 12 14:11:46 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] 7月 12 14:11:46 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] 7月 12 14:11:46 localhost kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] 7月 12 14:11:46 localhost kernel: Device empty 7月 12 14:11:46 localhost kernel: Movable zone start for each node 7月 12 14:11:46 localhost kernel: Early memory node ranges 7月 12 14:11:46 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] 7月 12 14:11:46 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffd8fff] 7月 12 14:11:46 localhost kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] 7月 12 14:11:46 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] 7月 12 14:11:46 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges 7月 12 14:11:46 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges 7月 12 14:11:46 localhost kernel: On node 0, zone Normal: 39 pages in unavailable ranges 7月 12 14:11:46 localhost kernel: ACPI: PM-Timer IO Port: 0x608 7月 12 14:11:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) 7月 12 14:11:46 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 7月 12 14:11:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) 7月 12 14:11:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) 7月 12 14:11:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) 7月 12 14:11:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) 7月 12 14:11:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) 7月 12 14:11:46 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information 7月 12 14:11:46 localhost kernel: TSC deadline timer available 7月 12 14:11:46 localhost kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffd9000-0xbfffffff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] 7月 12 14:11:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] 7月 12 14:11:46 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices 7月 12 14:11:46 localhost kernel: Booting paravirtualized kernel on KVM 7月 12 14:11:46 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns 7月 12 14:11:46 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:1 nr_cpu_ids:1 nr_node_ids:1 7月 12 14:11:46 localhost kernel: percpu: Embedded 60 pages/cpu s208896 r8192 d28672 u2097152 7月 12 14:11:46 localhost kernel: pcpu-alloc: s208896 r8192 d28672 u2097152 alloc=1*2097152 7月 12 14:11:46 localhost kernel: pcpu-alloc: [0] 0 7月 12 14:11:46 localhost kernel: kvm-guest: PV spinlocks disabled, single CPU 7月 12 14:11:46 localhost kernel: Fallback order for Node 0: 0 7月 12 14:11:46 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031897 7月 12 14:11:46 localhost kernel: Policy zone: Normal 7月 12 14:11:46 localhost kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-6.1.8-3.0.0.8.oe1.x86_64 root=/dev/mapper/openeuler-root ro resume=/dev/mapper/openeuler-swap rd.lvm.lv=openeuler/root rd.lvm.lv=openeuler/swap cgroup_disable=files apparmor=0 crashkernel=512M 7月 12 14:11:46 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=/vmlinuz-6.1.8-3.0.0.8.oe1.x86_64", will be passed to user space. 7月 12 14:11:46 localhost kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) 7月 12 14:11:46 localhost kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) 7月 12 14:11:46 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off 7月 12 14:11:46 localhost kernel: software IO TLB: area num 1. 7月 12 14:11:46 localhost kernel: Memory: 2609872K/4193756K available (14343K kernel code, 5495K rwdata, 9140K rodata, 2708K init, 5436K bss, 739040K reserved, 0K cma-reserved) 7月 12 14:11:46 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 7月 12 14:11:46 localhost kernel: Kernel/User page tables isolation: enabled 7月 12 14:11:46 localhost kernel: ftrace: allocating 45708 entries in 179 pages 7月 12 14:11:46 localhost kernel: ftrace: allocated 179 pages with 5 groups 7月 12 14:11:46 localhost kernel: Dynamic Preempt: none 7月 12 14:11:46 localhost kernel: rcu: Preemptible hierarchical RCU implementation. 7月 12 14:11:46 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=1. 7月 12 14:11:46 localhost kernel: Trampoline variant of Tasks RCU enabled. 7月 12 14:11:46 localhost kernel: Rude variant of Tasks RCU enabled. 7月 12 14:11:46 localhost kernel: Tracing variant of Tasks RCU enabled. 7月 12 14:11:46 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. 7月 12 14:11:46 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1 7月 12 14:11:46 localhost kernel: NR_IRQS: 524544, nr_irqs: 256, preallocated irqs: 16 7月 12 14:11:46 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. 7月 12 14:11:46 localhost kernel: Console: colour VGA+ 80x25 7月 12 14:11:46 localhost kernel: printk: console [tty0] enabled 7月 12 14:11:46 localhost kernel: ACPI: Core revision 20220331 7月 12 14:11:46 localhost kernel: APIC: Switch to symmetric I/O mode setup 7月 12 14:11:46 localhost kernel: x2apic enabled 7月 12 14:11:46 localhost kernel: Switched APIC routing to physical x2apic. 7月 12 14:11:46 localhost kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns 7月 12 14:11:46 localhost kernel: Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS (lpj=2300000) 7月 12 14:11:46 localhost kernel: pid_max: default: 32768 minimum: 301 7月 12 14:11:46 localhost kernel: LSM: Security Framework initializing 7月 12 14:11:46 localhost kernel: Yama: becoming mindful. 7月 12 14:11:46 localhost kernel: SELinux: Initializing. 7月 12 14:11:46 localhost kernel: SELinux: CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is non-zero. This is deprecated and will be rejected in a future kernel release. 7月 12 14:11:46 localhost kernel: SELinux: https://github.com/SELinuxProject/selinux-kernel/wiki/DEPRECATE-checkreqprot 7月 12 14:11:46 localhost kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) 7月 12 14:11:46 localhost kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) 7月 12 14:11:46 localhost kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 7月 12 14:11:46 localhost kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 7月 12 14:11:46 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization 7月 12 14:11:46 localhost kernel: Spectre V2 : Mitigation: IBRS 7月 12 14:11:46 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch 7月 12 14:11:46 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT 7月 12 14:11:46 localhost kernel: RETBleed: Mitigation: IBRS 7月 12 14:11:46 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier 7月 12 14:11:46 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl 7月 12 14:11:46 localhost kernel: MDS: Mitigation: Clear CPU buffers 7月 12 14:11:46 localhost kernel: TAA: Mitigation: Clear CPU buffers 7月 12 14:11:46 localhost kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode 7月 12 14:11:46 localhost kernel: Freeing SMP alternatives memory: 36K 7月 12 14:11:46 localhost kernel: smpboot: CPU0: Intel Xeon Processor (Skylake, IBRS) (family: 0x6, model: 0x55, stepping: 0x4) 7月 12 14:11:46 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. 7月 12 14:11:46 localhost kernel: cblist_init_generic: Setting shift to 0 and lim to 1. 7月 12 14:11:46 localhost kernel: cblist_init_generic: Setting shift to 0 and lim to 1. 7月 12 14:11:46 localhost kernel: cblist_init_generic: Setting shift to 0 and lim to 1. 7月 12 14:11:46 localhost kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. 7月 12 14:11:46 localhost kernel: rcu: Hierarchical SRCU implementation. 7月 12 14:11:46 localhost kernel: rcu: Max phase no-delay instances is 400. 7月 12 14:11:46 localhost kernel: NMI watchdog: Perf NMI watchdog permanently disabled 7月 12 14:11:46 localhost kernel: smp: Bringing up secondary CPUs ... 7月 12 14:11:46 localhost kernel: smp: Brought up 1 node, 1 CPU 7月 12 14:11:46 localhost kernel: smpboot: Max logical packages: 1 7月 12 14:11:46 localhost kernel: smpboot: Total of 1 processors activated (4600.00 BogoMIPS) 7月 12 14:11:46 localhost kernel: node 0 deferred pages initialised in 7ms 7月 12 14:11:46 localhost kernel: devtmpfs: initialized 7月 12 14:11:46 localhost kernel: x86/mm: Memory block size: 128MB 7月 12 14:11:46 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns 7月 12 14:11:46 localhost kernel: futex hash table entries: 256 (order: 2, 16384 bytes, linear) 7月 12 14:11:46 localhost kernel: pinctrl core: initialized pinctrl subsystem 7月 12 14:11:46 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family 7月 12 14:11:46 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations 7月 12 14:11:46 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations 7月 12 14:11:46 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations 7月 12 14:11:46 localhost kernel: audit: initializing netlink subsys (disabled) 7月 12 14:11:46 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' 7月 12 14:11:46 localhost kernel: thermal_sys: Registered thermal governor 'bang_bang' 7月 12 14:11:46 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' 7月 12 14:11:46 localhost kernel: thermal_sys: Registered thermal governor 'user_space' 7月 12 14:11:46 localhost kernel: audit: type=2000 audit(1689142227.119:1): state=initialized audit_enabled=0 res=1 7月 12 14:11:46 localhost kernel: cpuidle: using governor menu 7月 12 14:11:46 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 7月 12 14:11:46 localhost kernel: PCI: Using configuration type 1 for base access 7月 12 14:11:46 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. 7月 12 14:11:46 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages 7月 12 14:11:46 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page 7月 12 14:11:46 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages 7月 12 14:11:46 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page 7月 12 14:11:46 localhost kernel: cryptd: max_cpu_qlen set to 1000 7月 12 14:11:46 localhost kernel: ACPI: Added _OSI(Module Device) 7月 12 14:11:46 localhost kernel: ACPI: Added _OSI(Processor Device) 7月 12 14:11:46 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) 7月 12 14:11:46 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) 7月 12 14:11:46 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded 7月 12 14:11:46 localhost kernel: ACPI: Interpreter enabled 7月 12 14:11:46 localhost kernel: ACPI: PM: (supports S0 S5) 7月 12 14:11:46 localhost kernel: ACPI: Using IOAPIC for interrupt routing 7月 12 14:11:46 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug 7月 12 14:11:46 localhost kernel: PCI: Using E820 reservations for host bridge windows 7月 12 14:11:46 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F 7月 12 14:11:46 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) 7月 12 14:11:46 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] 7月 12 14:11:46 localhost kernel: acpi PNP0A03:00: _OSC: not requesting OS control; OS requires [ExtendedConfig ASPM ClockPM MSI] 7月 12 14:11:46 localhost kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. 7月 12 14:11:46 localhost kernel: acpiphp: Slot [3] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [4] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [6] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [7] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [8] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [9] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [10] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [11] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [12] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [13] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [14] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [15] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [16] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [17] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [18] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [19] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [20] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [21] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [22] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [23] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [24] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [25] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [26] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [27] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [28] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [29] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [30] registered 7月 12 14:11:46 localhost kernel: acpiphp: Slot [31] registered 7月 12 14:11:46 localhost kernel: PCI host bridge to bus 0000:00 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x140000000-0x1bfffffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] 7月 12 14:11:46 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 7月 12 14:11:46 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 7月 12 14:11:46 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 7月 12 14:11:46 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc160-0xc16f] 7月 12 14:11:46 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] 7月 12 14:11:46 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] 7月 12 14:11:46 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] 7月 12 14:11:46 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] 7月 12 14:11:46 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 7月 12 14:11:46 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI 7月 12 14:11:46 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: [1b36:0100] type 00 class 0x030000 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xf4000000-0xf7ffffff] 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: reg 0x14: [mem 0xf8000000-0xfbffffff] 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfc054000-0xfc055fff] 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: reg 0x1c: [io 0xc080-0xc09f] 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfc040000-0xfc04ffff pref] 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] 7月 12 14:11:46 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 7月 12 14:11:46 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] 7月 12 14:11:46 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfc056000-0xfc056fff] 7月 12 14:11:46 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfebec000-0xfebeffff 64bit pref] 7月 12 14:11:46 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfc000000-0xfc03ffff pref] 7月 12 14:11:46 localhost kernel: pci 0000:00:04.0: [8086:2668] type 00 class 0x040300 7月 12 14:11:46 localhost kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfc050000-0xfc053fff] 7月 12 14:11:46 localhost kernel: pci 0000:00:05.0: [8086:2934] type 00 class 0x0c0300 7月 12 14:11:46 localhost kernel: pci 0000:00:05.0: reg 0x20: [io 0xc0c0-0xc0df] 7月 12 14:11:46 localhost kernel: pci 0000:00:05.1: [8086:2935] type 00 class 0x0c0300 7月 12 14:11:46 localhost kernel: pci 0000:00:05.1: reg 0x20: [io 0xc0e0-0xc0ff] 7月 12 14:11:46 localhost kernel: pci 0000:00:05.2: [8086:2936] type 00 class 0x0c0300 7月 12 14:11:46 localhost kernel: pci 0000:00:05.2: reg 0x20: [io 0xc100-0xc11f] 7月 12 14:11:46 localhost kernel: pci 0000:00:05.7: [8086:293a] type 00 class 0x0c0320 7月 12 14:11:46 localhost kernel: pci 0000:00:05.7: reg 0x10: [mem 0xfc057000-0xfc057fff] 7月 12 14:11:46 localhost kernel: pci 0000:00:06.0: [1af4:1003] type 00 class 0x078000 7月 12 14:11:46 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc03f] 7月 12 14:11:46 localhost kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfc058000-0xfc058fff] 7月 12 14:11:46 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfebf0000-0xfebf3fff 64bit pref] 7月 12 14:11:46 localhost kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 7月 12 14:11:46 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0xc040-0xc07f] 7月 12 14:11:46 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfc059000-0xfc059fff] 7月 12 14:11:46 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfebf4000-0xfebf7fff 64bit pref] 7月 12 14:11:46 localhost kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 7月 12 14:11:46 localhost kernel: pci 0000:00:08.0: reg 0x10: [io 0xc120-0xc13f] 7月 12 14:11:46 localhost kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfebf8000-0xfebfbfff 64bit pref] 7月 12 14:11:46 localhost kernel: pci 0000:00:09.0: [1af4:1005] type 00 class 0x00ff00 7月 12 14:11:46 localhost kernel: pci 0000:00:09.0: reg 0x10: [io 0xc140-0xc15f] 7月 12 14:11:46 localhost kernel: pci 0000:00:09.0: reg 0x20: [mem 0xfebfc000-0xfebfffff 64bit pref] 7月 12 14:11:46 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 7月 12 14:11:46 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 7月 12 14:11:46 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 7月 12 14:11:46 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 7月 12 14:11:46 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 7月 12 14:11:46 localhost kernel: iommu: Default domain type: Passthrough 7月 12 14:11:46 localhost kernel: SCSI subsystem initialized 7月 12 14:11:46 localhost kernel: ACPI: bus type USB registered 7月 12 14:11:46 localhost kernel: usbcore: registered new interface driver usbfs 7月 12 14:11:46 localhost kernel: usbcore: registered new interface driver hub 7月 12 14:11:46 localhost kernel: usbcore: registered new device driver usb 7月 12 14:11:46 localhost kernel: pps_core: LinuxPPS API ver. 1 registered 7月 12 14:11:46 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti 7月 12 14:11:46 localhost kernel: PTP clock support registered 7月 12 14:11:46 localhost kernel: EDAC MC: Ver: 3.0.0 7月 12 14:11:46 localhost kernel: NetLabel: Initializing 7月 12 14:11:46 localhost kernel: NetLabel: domain hash size = 128 7月 12 14:11:46 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO 7月 12 14:11:46 localhost kernel: NetLabel: unlabeled traffic allowed by default 7月 12 14:11:46 localhost kernel: PCI: Using ACPI for IRQ routing 7月 12 14:11:46 localhost kernel: PCI: pci_cache_line_size set to 64 bytes 7月 12 14:11:46 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] 7月 12 14:11:46 localhost kernel: e820: reserve RAM buffer [mem 0xbffd9000-0xbfffffff] 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible 7月 12 14:11:46 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none 7月 12 14:11:46 localhost kernel: vgaarb: loaded 7月 12 14:11:46 localhost kernel: clocksource: Switched to clocksource kvm-clock 7月 12 14:11:46 localhost kernel: VFS: Disk quotas dquot_6.6.0 7月 12 14:11:46 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) 7月 12 14:11:46 localhost kernel: pnp: PnP ACPI init 7月 12 14:11:46 localhost kernel: pnp 00:03: [dma 2] 7月 12 14:11:46 localhost kernel: pnp: PnP ACPI: found 5 devices 7月 12 14:11:46 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns 7月 12 14:11:46 localhost kernel: NET: Registered PF_INET protocol family 7月 12 14:11:46 localhost kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) 7月 12 14:11:46 localhost kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) 7月 12 14:11:46 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) 7月 12 14:11:46 localhost kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) 7月 12 14:11:46 localhost kernel: TCP bind hash table entries: 32768 (order: 8, 1048576 bytes, linear) 7月 12 14:11:46 localhost kernel: TCP: Hash tables configured (established 32768 bind 32768) 7月 12 14:11:46 localhost kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) 7月 12 14:11:46 localhost kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) 7月 12 14:11:46 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family 7月 12 14:11:46 localhost kernel: NET: Registered PF_XDP protocol family 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] 7月 12 14:11:46 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x140000000-0x1bfffffff window] 7月 12 14:11:46 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release 7月 12 14:11:46 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers 7月 12 14:11:46 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 7月 12 14:11:46 localhost kernel: pci 0000:00:05.0: quirk_usb_early_handoff+0x0/0x140 took 54729 usecs 7月 12 14:11:46 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 11 7月 12 14:11:46 localhost kernel: pci 0000:00:05.1: quirk_usb_early_handoff+0x0/0x140 took 54226 usecs 7月 12 14:11:46 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 7月 12 14:11:46 localhost kernel: pci 0000:00:05.2: quirk_usb_early_handoff+0x0/0x140 took 54289 usecs 7月 12 14:11:46 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 7月 12 14:11:46 localhost kernel: pci 0000:00:05.7: quirk_usb_early_handoff+0x0/0x140 took 55344 usecs 7月 12 14:11:46 localhost kernel: PCI: CLS 0 bytes, default 64 7月 12 14:11:46 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) 7月 12 14:11:46 localhost kernel: software IO TLB: mapped [mem 0x000000009b000000-0x000000009f000000] (64MB) 7月 12 14:11:46 localhost kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns 7月 12 14:11:46 localhost kernel: Trying to unpack rootfs image as initramfs... 7月 12 14:11:46 localhost kernel: Initialise system trusted keyrings 7月 12 14:11:46 localhost kernel: Key type blacklist registered 7月 12 14:11:46 localhost kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0 7月 12 14:11:46 localhost kernel: zbud: loaded 7月 12 14:11:46 localhost kernel: integrity: Platform Keyring initialized 7月 12 14:11:46 localhost kernel: NET: Registered PF_ALG protocol family 7月 12 14:11:46 localhost kernel: Key type asymmetric registered 7月 12 14:11:46 localhost kernel: Asymmetric key parser 'x509' registered 7月 12 14:11:46 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247) 7月 12 14:11:46 localhost kernel: io scheduler mq-deadline registered 7月 12 14:11:46 localhost kernel: io scheduler kyber registered 7月 12 14:11:46 localhost kernel: io scheduler bfq registered 7月 12 14:11:46 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 7月 12 14:11:46 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 7月 12 14:11:46 localhost kernel: ACPI: button: Power Button [PWRF] 7月 12 14:11:46 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled 7月 12 14:11:46 localhost kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A 7月 12 14:11:46 localhost kernel: Non-volatile memory driver v1.3 7月 12 14:11:46 localhost kernel: rdac: device handler registered 7月 12 14:11:46 localhost kernel: hp_sw: device handler registered 7月 12 14:11:46 localhost kernel: emc: device handler registered 7月 12 14:11:46 localhost kernel: random: crng init done 7月 12 14:11:46 localhost kernel: alua: device handler registered 7月 12 14:11:46 localhost kernel: ehci-pci 0000:00:05.7: EHCI Host Controller 7月 12 14:11:46 localhost kernel: ehci-pci 0000:00:05.7: new USB bus registered, assigned bus number 1 7月 12 14:11:46 localhost kernel: ehci-pci 0000:00:05.7: irq 10, io mem 0xfc057000 7月 12 14:11:46 localhost kernel: ehci-pci 0000:00:05.7: USB 2.0 started, EHCI 1.00 7月 12 14:11:46 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.01 7月 12 14:11:46 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 7月 12 14:11:46 localhost kernel: usb usb1: Product: EHCI Host Controller 7月 12 14:11:46 localhost kernel: usb usb1: Manufacturer: Linux 6.1.8-3.0.0.8.oe1.x86_64 ehci_hcd 7月 12 14:11:46 localhost kernel: usb usb1: SerialNumber: 0000:00:05.7 7月 12 14:11:46 localhost kernel: hub 1-0:1.0: USB hub found 7月 12 14:11:46 localhost kernel: hub 1-0:1.0: 6 ports detected 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.0: UHCI Host Controller 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.0: new USB bus registered, assigned bus number 2 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.0: detected 2 ports 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.0: irq 10, io port 0x0000c0c0 7月 12 14:11:46 localhost kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 6.01 7月 12 14:11:46 localhost kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 7月 12 14:11:46 localhost kernel: usb usb2: Product: UHCI Host Controller 7月 12 14:11:46 localhost kernel: usb usb2: Manufacturer: Linux 6.1.8-3.0.0.8.oe1.x86_64 uhci_hcd 7月 12 14:11:46 localhost kernel: usb usb2: SerialNumber: 0000:00:05.0 7月 12 14:11:46 localhost kernel: hub 2-0:1.0: USB hub found 7月 12 14:11:46 localhost kernel: hub 2-0:1.0: 2 ports detected 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.1: UHCI Host Controller 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.1: new USB bus registered, assigned bus number 3 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.1: detected 2 ports 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.1: irq 11, io port 0x0000c0e0 7月 12 14:11:46 localhost kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 6.01 7月 12 14:11:46 localhost kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 7月 12 14:11:46 localhost kernel: usb usb3: Product: UHCI Host Controller 7月 12 14:11:46 localhost kernel: usb usb3: Manufacturer: Linux 6.1.8-3.0.0.8.oe1.x86_64 uhci_hcd 7月 12 14:11:46 localhost kernel: usb usb3: SerialNumber: 0000:00:05.1 7月 12 14:11:46 localhost kernel: hub 3-0:1.0: USB hub found 7月 12 14:11:46 localhost kernel: hub 3-0:1.0: 2 ports detected 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.2: UHCI Host Controller 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.2: new USB bus registered, assigned bus number 4 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.2: detected 2 ports 7月 12 14:11:46 localhost kernel: uhci_hcd 0000:00:05.2: irq 11, io port 0x0000c100 7月 12 14:11:46 localhost kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 6.01 7月 12 14:11:46 localhost kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 7月 12 14:11:46 localhost kernel: usb usb4: Product: UHCI Host Controller 7月 12 14:11:46 localhost kernel: usb usb4: Manufacturer: Linux 6.1.8-3.0.0.8.oe1.x86_64 uhci_hcd 7月 12 14:11:46 localhost kernel: usb usb4: SerialNumber: 0000:00:05.2 7月 12 14:11:46 localhost kernel: usb 1-1: new high-speed USB device number 2 using ehci-pci 7月 12 14:11:46 localhost kernel: hub 4-0:1.0: USB hub found 7月 12 14:11:46 localhost kernel: hub 4-0:1.0: 2 ports detected 7月 12 14:11:46 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 7月 12 14:11:46 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 7月 12 14:11:46 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 7月 12 14:11:46 localhost kernel: mousedev: PS/2 mouse device common for all mice 7月 12 14:11:46 localhost kernel: rtc_cmos 00:00: RTC can wake from S4 7月 12 14:11:46 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 7月 12 14:11:46 localhost kernel: rtc_cmos 00:00: registered as rtc0 7月 12 14:11:46 localhost kernel: rtc_cmos 00:00: setting system clock to 2023-07-12T06:11:45 UTC (1689142305) 7月 12 14:11:46 localhost kernel: rtc_cmos 00:00: alarms up to one day, y3k, 114 bytes nvram 7月 12 14:11:46 localhost kernel: intel_pstate: CPU model not supported 7月 12 14:11:46 localhost kernel: hid: raw HID events driver (C) Jiri Kosina 7月 12 14:11:46 localhost kernel: usbcore: registered new interface driver usbhid 7月 12 14:11:46 localhost kernel: usbhid: USB HID core driver 7月 12 14:11:46 localhost kernel: drop_monitor: Initializing network drop monitor service 7月 12 14:11:46 localhost kernel: Initializing XFRM netlink socket 7月 12 14:11:46 localhost kernel: NET: Registered PF_INET6 protocol family 7月 12 14:11:46 localhost kernel: Segment Routing with IPv6 7月 12 14:11:46 localhost kernel: In-situ OAM (IOAM) with IPv6 7月 12 14:11:46 localhost kernel: NET: Registered PF_PACKET protocol family 7月 12 14:11:46 localhost kernel: mpls_gso: MPLS GSO support 7月 12 14:11:46 localhost kernel: No MBM correction factor available 7月 12 14:11:46 localhost kernel: IPI shorthand broadcast: enabled 7月 12 14:11:46 localhost kernel: AVX2 version of gcm_enc/dec engaged. 7月 12 14:11:46 localhost kernel: AES CTR mode by8 optimization enabled 7月 12 14:11:46 localhost kernel: sched_clock: Marking stable (1348339982, 99501687)->(1570799918, -122958249) 7月 12 14:11:46 localhost kernel: registered taskstats version 1 7月 12 14:11:46 localhost kernel: Loading compiled-in X.509 certificates 7月 12 14:11:46 localhost kernel: Freeing initrd memory: 30540K 7月 12 14:11:46 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 7月 12 14:11:46 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 7月 12 14:11:46 localhost kernel: usb 1-1: Product: QEMU USB Tablet 7月 12 14:11:46 localhost kernel: usb 1-1: Manufacturer: QEMU 7月 12 14:11:46 localhost kernel: usb 1-1: SerialNumber: 42 7月 12 14:11:46 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:05.7/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input4 7月 12 14:11:46 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:05.7-1/input0 7月 12 14:11:46 localhost kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 3c8d97b94d944e8366d52cb6af9a01d196caa3a0' 7月 12 14:11:46 localhost kernel: zswap: loaded using pool lzo/zbud 7月 12 14:11:46 localhost kernel: Key type encrypted registered 7月 12 14:11:46 localhost kernel: ima: No TPM chip found, activating TPM-bypass! 7月 12 14:11:46 localhost kernel: ima: Allocated hash algorithm: sha256 7月 12 14:11:46 localhost kernel: ima: No architecture policies found 7月 12 14:11:46 localhost kernel: evm: Initialising EVM extended attributes: 7月 12 14:11:46 localhost kernel: evm: security.selinux 7月 12 14:11:46 localhost kernel: evm: security.SMACK64 (disabled) 7月 12 14:11:46 localhost kernel: evm: security.SMACK64EXEC (disabled) 7月 12 14:11:46 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) 7月 12 14:11:46 localhost kernel: evm: security.SMACK64MMAP (disabled) 7月 12 14:11:46 localhost kernel: evm: security.apparmor 7月 12 14:11:46 localhost kernel: evm: security.ima 7月 12 14:11:46 localhost kernel: evm: security.capability 7月 12 14:11:46 localhost kernel: evm: HMAC attrs: 0x1 7月 12 14:11:46 localhost kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 7月 12 14:11:46 localhost kernel: integrity: Unable to open file: /etc/keys/x509_ima.der (-2) 7月 12 14:11:46 localhost kernel: integrity: Unable to open file: /etc/keys/x509_evm.der (-2) 7月 12 14:11:46 localhost kernel: Freeing unused decrypted memory: 2036K 7月 12 14:11:46 localhost kernel: Freeing unused kernel image (initmem) memory: 2708K 7月 12 14:11:46 localhost kernel: Write protecting the kernel read-only data: 26624k 7月 12 14:11:46 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K 7月 12 14:11:46 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 1100K 7月 12 14:11:46 localhost kernel: Run /init as init process 7月 12 14:11:46 localhost kernel: with arguments: 7月 12 14:11:46 localhost kernel: /init 7月 12 14:11:46 localhost kernel: with environment: 7月 12 14:11:46 localhost kernel: HOME=/ 7月 12 14:11:46 localhost kernel: TERM=linux 7月 12 14:11:46 localhost kernel: BOOT_IMAGE=/vmlinuz-6.1.8-3.0.0.8.oe1.x86_64 7月 12 14:11:46 localhost systemd[1]: systemd v249-52.oe1 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA -SMACK +SECCOMP +GCRYPT +GNUTLS -OPENSSL +ACL +BLKID -CURL -ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD -LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB -ZSTD +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=legacy) 7月 12 14:11:46 localhost systemd[1]: Detected virtualization kvm. 7月 12 14:11:46 localhost systemd[1]: Detected architecture x86-64. 7月 12 14:11:46 localhost systemd[1]: Running in initial RAM disk. 7月 12 14:11:46 localhost systemd[1]: No hostname configured, using default hostname. 7月 12 14:11:46 localhost systemd[1]: Hostname set to . 7月 12 14:11:46 localhost systemd[1]: Queued start job for default target Initrd Default Target. 7月 12 14:11:46 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. 7月 12 14:11:46 localhost systemd[1]: Reached target Local File Systems. 7月 12 14:11:46 localhost systemd[1]: Reached target Path Units. 7月 12 14:11:46 localhost systemd[1]: Reached target Slice Units. 7月 12 14:11:46 localhost systemd[1]: Reached target Swaps. 7月 12 14:11:46 localhost systemd[1]: Reached target Timer Units. 7月 12 14:11:46 localhost systemd[1]: Listening on Journal Socket (/dev/log). 7月 12 14:11:46 localhost systemd[1]: Listening on Journal Socket. 7月 12 14:11:46 localhost systemd[1]: Listening on udev Control Socket. 7月 12 14:11:46 localhost systemd[1]: Listening on udev Kernel Socket. 7月 12 14:11:46 localhost systemd[1]: Reached target Socket Units. 7月 12 14:11:46 localhost systemd[1]: Starting Create List of Static Device Nodes... 7月 12 14:11:46 localhost systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. 7月 12 14:11:46 localhost systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. 7月 12 14:11:46 localhost systemd[1]: (This warning is only shown for the first unit using IP firewalling.) 7月 12 14:11:46 localhost systemd[1]: Starting Journal Service... 7月 12 14:11:46 localhost systemd[1]: Condition check resulted in Load Kernel Modules being skipped. 7月 12 14:11:46 localhost systemd[1]: Starting Apply Kernel Variables... 7月 12 14:11:46 localhost systemd[1]: Starting Setup Virtual Console... 7月 12 14:11:46 localhost systemd[1]: Finished Create List of Static Device Nodes. 7月 12 14:11:46 localhost systemd[1]: Finished Apply Kernel Variables. 7月 12 14:11:46 localhost systemd[1]: Starting Create Static Device Nodes in /dev... 7月 12 14:11:46 localhost systemd-journald[219]: Journal started 7月 12 14:11:46 localhost systemd-journald[219]: Runtime Journal (/run/log/journal/dafee7947a1d4048bfe3d76cb3e0077a) is 8.0M, max 68.2M, 60.2M free. 7月 12 14:11:46 localhost rngd[218]: Initializing available sources 7月 12 14:11:46 localhost rngd[218]: [hwrng ]: Initialized 7月 12 14:11:46 localhost rngd[218]: [rdrand]: Enabling RDSEED rng support 7月 12 14:11:46 localhost rngd[218]: [rdrand]: Initialized 7月 12 14:11:46 localhost rngd[218]: [jitter]: JITTER timeout set to 5 sec 7月 12 14:11:46 localhost rngd[218]: [jitter]: Initializing AES buffer 7月 12 14:11:46 localhost systemd[1]: Started Journal Service. 7月 12 14:11:46 localhost systemd[1]: Finished Create Static Device Nodes in /dev. 7月 12 14:11:46 localhost systemd[1]: Starting Create Volatile Files and Directories... 7月 12 14:11:46 localhost systemd[1]: Finished Create Volatile Files and Directories. 7月 12 14:11:47 localhost systemd[1]: Finished Setup Virtual Console. 7月 12 14:11:47 localhost systemd[1]: Condition check resulted in dracut ask for additional cmdline parameters being skipped. 7月 12 14:11:47 localhost systemd[1]: Starting dracut cmdline hook... 7月 12 14:11:47 localhost dracut-cmdline[233]: dracut-20.03 (LTS) dracut-059-3.oe1 7月 12 14:11:47 localhost dracut-cmdline[233]: Using kernel command line parameters: BOOT_IMAGE=/vmlinuz-6.1.8-3.0.0.8.oe1.x86_64 root=/dev/mapper/openeuler-root ro resume=/dev/mapper/openeuler-swap rd.lvm.lv=openeuler/root rd.lvm.lv=openeuler/swap cgroup_disable=files apparmor=0 crashkernel=512M 7月 12 14:11:47 localhost systemd[1]: Finished dracut cmdline hook. 7月 12 14:11:47 localhost systemd[1]: Starting dracut pre-udev hook... 7月 12 14:11:47 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. 7月 12 14:11:47 localhost kernel: device-mapper: uevent: version 1.0.3 7月 12 14:11:47 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com 7月 12 14:11:47 localhost systemd[1]: Finished dracut pre-udev hook. 7月 12 14:11:47 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... 7月 12 14:11:47 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. 7月 12 14:11:47 localhost systemd[1]: Condition check resulted in dracut pre-trigger hook being skipped. 7月 12 14:11:47 localhost systemd[1]: Starting Coldplug All udev Devices... 7月 12 14:11:47 localhost systemd[1]: Created slice Slice /system/modprobe. 7月 12 14:11:47 localhost systemd[1]: Starting Load Kernel Module configfs... 7月 12 14:11:47 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. 7月 12 14:11:47 localhost systemd[1]: Finished Load Kernel Module configfs. 7月 12 14:11:47 localhost systemd[1]: Mounting Kernel Configuration File System... 7月 12 14:11:47 localhost systemd[1]: Mounted Kernel Configuration File System. 7月 12 14:11:47 localhost systemd[1]: Finished Coldplug All udev Devices. 7月 12 14:11:47 localhost systemd[1]: Reached target System Initialization. 7月 12 14:11:47 localhost systemd[1]: Reached target Basic System. 7月 12 14:11:47 localhost systemd[1]: System is tainted: cgroupsv1 7月 12 14:11:47 localhost systemd[1]: Starting dracut initqueue hook... 7月 12 14:11:48 localhost kernel: virtio_blk virtio2: 1/0/0 default/read/poll queues 7月 12 14:11:48 localhost kernel: virtio_blk virtio2: [vda] 104857600 512-byte logical blocks (53.7 GB/50.0 GiB) 7月 12 14:11:48 localhost kernel: vda: vda1 vda2 7月 12 14:11:48 localhost systemd-udevd[376]: Using default interface naming scheme 'v249'. 7月 12 14:11:48 localhost kernel: virtio_net virtio0 ens3: renamed from eth0 7月 12 14:11:48 localhost systemd-udevd[376]: eth0: Network interface 2 is renamed from 'eth0' to 'ens3' 7月 12 14:11:48 localhost kernel: libata version 3.00 loaded. 7月 12 14:11:48 localhost kernel: ata_piix 0000:00:01.1: version 2.13 7月 12 14:11:48 localhost kernel: scsi host0: ata_piix 7月 12 14:11:48 localhost systemd-udevd[394]: Using default interface naming scheme 'v249'. 7月 12 14:11:48 localhost kernel: scsi host1: ata_piix 7月 12 14:11:48 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc160 irq 14 7月 12 14:11:48 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc168 irq 15 7月 12 14:11:48 localhost kernel: ata1: found unknown device (class 0) 7月 12 14:11:48 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 7月 12 14:11:48 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 7月 12 14:11:48 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray 7月 12 14:11:48 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 7月 12 14:11:48 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 7月 12 14:11:49 localhost dracut-initqueue[472]: Scanning devices vda2 for LVM logical volumes openeuler/root 7月 12 14:11:49 localhost dracut-initqueue[472]: openeuler/swap 7月 12 14:11:49 localhost dracut-initqueue[472]: openeuler/root linear 7月 12 14:11:49 localhost dracut-initqueue[472]: openeuler/swap linear 7月 12 14:11:49 localhost dmsetup[498]: DM_VG_NAME='openeuler' 7月 12 14:11:49 localhost dmsetup[498]: DM_LV_NAME='root' 7月 12 14:11:49 localhost dmsetup[498]: DM_LV_LAYER='' 7月 12 14:11:49 localhost dmsetup[499]: DM_NAME=openeuler-root 7月 12 14:11:49 localhost dmsetup[499]: DM_UUID=LVM-D811uJZ44M1KYpHMerFEWEVbACEFnidI8RMDfsf64P49h8O45gtkheek6GLBK6JA 7月 12 14:11:49 localhost dmsetup[499]: DM_SUSPENDED=Active 7月 12 14:11:49 localhost dmsetup[499]: DM_READONLY=Writeable 7月 12 14:11:49 localhost dmsetup[499]: DM_MAJOR=253 7月 12 14:11:49 localhost dmsetup[499]: DM_MINOR=0 7月 12 14:11:49 localhost dmsetup[499]: DM_OPEN=0 7月 12 14:11:49 localhost dmsetup[499]: DM_TABLES_LOADED=Live 7月 12 14:11:49 localhost dmsetup[499]: DM_NAMES_USING_DEV= 7月 12 14:11:49 localhost dmsetup[500]: Complete cookie 0xd4d5d49 success. 7月 12 14:11:49 localhost systemd[1]: Found device /dev/mapper/openeuler-root. 7月 12 14:11:49 localhost systemd[1]: Reached target Initrd Root Device. 7月 12 14:11:49 localhost dmsetup[505]: DM_VG_NAME='openeuler' 7月 12 14:11:49 localhost dmsetup[505]: DM_LV_NAME='swap' 7月 12 14:11:49 localhost dmsetup[505]: DM_LV_LAYER='' 7月 12 14:11:49 localhost dmsetup[506]: DM_NAME=openeuler-swap 7月 12 14:11:49 localhost dmsetup[506]: DM_UUID=LVM-D811uJZ44M1KYpHMerFEWEVbACEFnidIfblIQ0RmL3hic6HQprfbQosZ0fBDsNpC 7月 12 14:11:49 localhost dmsetup[506]: DM_SUSPENDED=Active 7月 12 14:11:49 localhost dmsetup[506]: DM_READONLY=Writeable 7月 12 14:11:49 localhost dmsetup[506]: DM_MAJOR=253 7月 12 14:11:49 localhost dmsetup[506]: DM_MINOR=1 7月 12 14:11:49 localhost dmsetup[506]: DM_OPEN=0 7月 12 14:11:49 localhost dmsetup[506]: DM_TABLES_LOADED=Live 7月 12 14:11:49 localhost dmsetup[506]: DM_NAMES_USING_DEV= 7月 12 14:11:49 localhost dmsetup[507]: Complete cookie 0xd4d0e4b success. 7月 12 14:11:49 localhost systemd[1]: Finished dracut initqueue hook. 7月 12 14:11:49 localhost systemd[1]: Reached target Preparation for Remote File Systems. 7月 12 14:11:49 localhost systemd[1]: Reached target Remote File Systems. 7月 12 14:11:49 localhost systemd[1]: Starting dracut pre-mount hook... 7月 12 14:11:49 localhost systemd[1]: Finished dracut pre-mount hook. 7月 12 14:11:49 localhost systemd[1]: Starting File System Check on /dev/mapper/openeuler-root... 7月 12 14:11:49 localhost systemd-fsck[524]: /dev/mapper/openeuler-root: clean, 43546/2957312 files, 598477/11806720 blocks 7月 12 14:11:49 localhost systemd[1]: Finished File System Check on /dev/mapper/openeuler-root. 7月 12 14:11:49 localhost dmsetup[525]: DM_VG_NAME='openeuler' 7月 12 14:11:49 localhost dmsetup[525]: DM_LV_NAME='root' 7月 12 14:11:49 localhost systemd[1]: Mounting /sysroot... 7月 12 14:11:49 localhost dmsetup[525]: DM_LV_LAYER='' 7月 12 14:11:49 localhost dmsetup[528]: DM_NAME=openeuler-root 7月 12 14:11:49 localhost dmsetup[528]: DM_UUID=LVM-D811uJZ44M1KYpHMerFEWEVbACEFnidI8RMDfsf64P49h8O45gtkheek6GLBK6JA 7月 12 14:11:49 localhost dmsetup[528]: DM_SUSPENDED=Active 7月 12 14:11:49 localhost dmsetup[528]: DM_READONLY=Writeable 7月 12 14:11:49 localhost dmsetup[528]: DM_MAJOR=253 7月 12 14:11:49 localhost dmsetup[528]: DM_MINOR=0 7月 12 14:11:49 localhost dmsetup[528]: DM_OPEN=0 7月 12 14:11:49 localhost dmsetup[528]: DM_TABLES_LOADED=Live 7月 12 14:11:49 localhost dmsetup[528]: DM_NAMES_USING_DEV= 7月 12 14:11:49 localhost kernel: EXT4-fs (dm-0): mounted filesystem with ordered data mode. Quota mode: none. 7月 12 14:11:49 localhost systemd[1]: Mounted /sysroot. 7月 12 14:11:49 localhost systemd[1]: Reached target Initrd Root File System. 7月 12 14:11:49 localhost systemd[1]: Starting Reload Configuration from the Real Root... 7月 12 14:11:49 localhost systemctl[533]: [systemctl daemon-reload] called by PID 1 (/init) 7月 12 14:11:49 localhost systemd[1]: Reloading. 7月 12 14:11:50 localhost systemctl[565]: [systemctl --no-block start initrd-fs.target] called by PID 1 (/init) 7月 12 14:11:50 localhost systemctl[567]: [systemctl --no-block start initrd-cleanup.service] called by PID 1 (/init) 7月 12 14:11:50 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Finished Reload Configuration from the Real Root. 7月 12 14:11:50 localhost systemd[1]: Reached target Initrd File Systems. 7月 12 14:11:50 localhost systemd[1]: Reached target Initrd Default Target. 7月 12 14:11:50 localhost systemd[1]: Condition check resulted in dracut mount hook being skipped. 7月 12 14:11:50 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... 7月 12 14:11:50 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. 7月 12 14:11:50 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... 7月 12 14:11:50 localhost systemctl[596]: [systemctl --no-block isolate initrd-switch-root.target] called by PID 1 (/init) 7月 12 14:11:50 localhost systemd[1]: Stopped target Timer Units. 7月 12 14:11:50 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. 7月 12 14:11:50 localhost systemd[1]: Stopped target Initrd Default Target. 7月 12 14:11:50 localhost systemd[1]: Stopped target Basic System. 7月 12 14:11:50 localhost systemd[1]: Stopped target Initrd Root Device. 7月 12 14:11:50 localhost systemd[1]: Stopped target Path Units. 7月 12 14:11:50 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. 7月 12 14:11:50 localhost systemd[1]: Stopped target Remote File Systems. 7月 12 14:11:50 localhost systemd[1]: Stopped target Preparation for Remote File Systems. 7月 12 14:11:50 localhost systemd[1]: Stopped target Slice Units. 7月 12 14:11:50 localhost systemd[1]: Stopped target Socket Units. 7月 12 14:11:50 localhost systemd[1]: Stopped target System Initialization. 7月 12 14:11:50 localhost systemd[1]: Stopped target Swaps. 7月 12 14:11:50 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped dracut pre-mount hook. 7月 12 14:11:50 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped dracut initqueue hook. 7月 12 14:11:50 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Apply Kernel Variables. 7月 12 14:11:50 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Create Volatile Files and Directories. 7月 12 14:11:50 localhost systemd[1]: Stopped target Local File Systems. 7月 12 14:11:50 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Coldplug All udev Devices. 7月 12 14:11:50 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... 7月 12 14:11:50 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Setup Virtual Console. 7月 12 14:11:50 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. 7月 12 14:11:50 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. 7月 12 14:11:50 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Closed udev Control Socket. 7月 12 14:11:50 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Closed udev Kernel Socket. 7月 12 14:11:50 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped dracut pre-udev hook. 7月 12 14:11:50 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped dracut cmdline hook. 7月 12 14:11:50 localhost systemd[1]: Starting Cleanup udev Database... 7月 12 14:11:50 localhost systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... 7月 12 14:11:50 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. 7月 12 14:11:50 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Create List of Static Device Nodes. 7月 12 14:11:50 localhost systemd[1]: rngd.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. 7月 12 14:11:50 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. 7月 12 14:11:50 localhost systemd[1]: Finished Cleanup udev Database. 7月 12 14:11:50 localhost systemd[1]: Reached target Switch Root. 7月 12 14:11:50 localhost systemd[1]: Starting Switch Root... 7月 12 14:11:50 localhost systemctl[604]: [systemctl --no-block switch-root /sysroot] called by PID 1 (/init) 7月 12 14:11:50 localhost systemd[1]: Switching root. 7月 12 14:11:50 localhost systemd-journald[219]: Journal stopped 7月 12 14:11:51 localhost systemd-journald[219]: Received SIGTERM from PID 1 (systemd). 7月 12 14:11:51 localhost kernel: audit: type=1404 audit(1689142310.542:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability network_peer_controls=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability open_perms=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability extended_socket_class=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability always_check_network=0 7月 12 14:11:51 localhost kernel: SELinux: policy capability cgroup_seclabel=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 7月 12 14:11:51 localhost kernel: SELinux: policy capability ioctl_skip_cloexec=0 7月 12 14:11:51 localhost kernel: audit: type=1403 audit(1689142310.640:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 7月 12 14:11:51 localhost systemd[1]: Successfully loaded SELinux policy in 102.806ms. 7月 12 14:11:51 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 31.471ms. 7月 12 14:11:51 localhost systemd[1]: systemd v249-52.oe1 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA -SMACK +SECCOMP +GCRYPT +GNUTLS -OPENSSL +ACL +BLKID -CURL -ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD -LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB -ZSTD +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=legacy) 7月 12 14:11:51 localhost systemd[1]: Detected virtualization kvm. 7月 12 14:11:51 localhost systemd[1]: Detected architecture x86-64. 7月 12 14:11:51 localhost systemd-rc-local-generator[615]: /etc/rc.d/rc.local is not marked executable, skipping. 7月 12 14:11:51 localhost systemd[1]: /usr/lib/systemd/system/dbus.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/dbus/system_bus_socket → /run/dbus/system_bus_socket; please update the unit file accordingly. 7月 12 14:11:51 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. 7月 12 14:11:51 localhost systemd[1]: Stopped Switch Root. 7月 12 14:11:51 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. 7月 12 14:11:51 localhost systemd[1]: Created slice Slice /system/getty. 7月 12 14:11:51 localhost systemd[1]: Created slice Slice /system/sshd-keygen. 7月 12 14:11:51 localhost systemd[1]: Created slice Slice /system/systemd-fsck. 7月 12 14:11:51 localhost systemd[1]: Created slice User and Session Slice. 7月 12 14:11:51 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. 7月 12 14:11:51 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. 7月 12 14:11:51 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. 7月 12 14:11:51 localhost systemd[1]: Stopped target Switch Root. 7月 12 14:11:51 localhost systemd[1]: Stopped target Initrd File Systems. 7月 12 14:11:51 localhost systemd[1]: Stopped target Initrd Root File System. 7月 12 14:11:51 localhost systemd[1]: Reached target Path Units. 7月 12 14:11:51 localhost systemd[1]: Reached target Remote File Systems. 7月 12 14:11:51 localhost systemd[1]: Reached target Slice Units. 7月 12 14:11:51 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. 7月 12 14:11:51 localhost systemd[1]: Listening on LVM2 poll daemon socket. 7月 12 14:11:51 localhost systemd[1]: Listening on Process Core Dump Socket. 7月 12 14:11:51 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. 7月 12 14:11:51 localhost systemd[1]: Listening on udev Control Socket. 7月 12 14:11:51 localhost systemd[1]: Listening on udev Kernel Socket. 7月 12 14:11:51 localhost systemd[1]: Activating swap /dev/mapper/openeuler-swap... 7月 12 14:11:51 localhost systemd[1]: Mounting Huge Pages File System... 7月 12 14:11:51 localhost kernel: Adding 4149244k swap on /dev/mapper/openeuler-swap. Priority:-2 extents:1 across:4149244k FS 7月 12 14:11:51 localhost systemd[1]: Mounting POSIX Message Queue File System... 7月 12 14:11:51 localhost systemd[1]: Mounting Kernel Debug File System... 7月 12 14:11:51 localhost systemd[1]: Mounting Kernel Trace File System... 7月 12 14:11:51 localhost systemd[1]: Starting Create List of Static Device Nodes... 7月 12 14:11:51 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... 7月 12 14:11:51 localhost systemd[1]: Starting Load Kernel Module configfs... 7月 12 14:11:51 localhost systemd[1]: Starting Load Kernel Module drm... 7月 12 14:11:51 localhost systemd[1]: Starting Load Kernel Module fuse... 7月 12 14:11:51 localhost systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. 7月 12 14:11:51 localhost systemd[1]: Stopped Journal Service. 7月 12 14:11:51 localhost kernel: fuse: init (API version 7.37) 7月 12 14:11:51 localhost systemd[1]: Starting Journal Service... 7月 12 14:11:51 localhost systemd[1]: Condition check resulted in Load Kernel Modules being skipped. 7月 12 14:11:51 localhost systemd[1]: Starting Remount Root and Kernel File Systems... 7月 12 14:11:51 localhost systemd[1]: Starting Apply Kernel Variables... 7月 12 14:11:51 localhost systemd[1]: Starting Coldplug All udev Devices... 7月 12 14:11:51 localhost kernel: EXT4-fs (dm-0): re-mounted. Quota mode: none. 7月 12 14:11:51 localhost systemd-journald[641]: Journal started 7月 12 14:11:51 localhost systemd-journald[641]: Runtime Journal (/run/log/journal/dafee7947a1d4048bfe3d76cb3e0077a) is 8.0M, max 68.2M, 60.2M free. 7月 12 14:11:50 localhost systemd[1]: Queued start job for default target Multi-User System. 7月 12 14:11:50 localhost systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. 7月 12 14:11:50 localhost systemd[1]: (This warning is only shown for the first unit using IP firewalling.) 7月 12 14:11:51 localhost systemd[1]: Activated swap /dev/mapper/openeuler-swap. 7月 12 14:11:50 localhost systemd[1]: systemd-journald.service: Deactivated successfully. 7月 12 14:11:51 localhost lvm[633]: 2 logical volume(s) in volume group "openeuler" monitored 7月 12 14:11:51 localhost systemd[1]: Started Journal Service. 7月 12 14:11:51 localhost kernel: ACPI: bus type drm_connector registered 7月 12 14:11:51 localhost systemd[1]: Mounted Huge Pages File System. 7月 12 14:11:51 localhost systemd[1]: Mounted POSIX Message Queue File System. 7月 12 14:11:51 localhost systemd[1]: Mounted Kernel Debug File System. 7月 12 14:11:51 localhost systemd[1]: Mounted Kernel Trace File System. 7月 12 14:11:51 localhost systemd[1]: Finished Create List of Static Device Nodes. 7月 12 14:11:51 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. 7月 12 14:11:51 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. 7月 12 14:11:51 localhost systemd[1]: Finished Load Kernel Module configfs. 7月 12 14:11:51 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. 7月 12 14:11:51 localhost systemd[1]: Finished Load Kernel Module drm. 7月 12 14:11:51 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. 7月 12 14:11:51 localhost systemd[1]: Finished Load Kernel Module fuse. 7月 12 14:11:51 localhost systemd[1]: Finished Remount Root and Kernel File Systems. 7月 12 14:11:51 localhost systemd[1]: Finished Apply Kernel Variables. 7月 12 14:11:51 localhost systemd[1]: Reached target Swaps. 7月 12 14:11:51 localhost systemd[1]: Mounting FUSE Control File System... 7月 12 14:11:51 localhost systemd[1]: Mounting Temporary Directory /tmp... 7月 12 14:11:51 localhost systemd[1]: Starting Rebuild Hardware Database... 7月 12 14:11:51 localhost systemd[1]: Starting Flush Journal to Persistent Storage... 7月 12 14:11:51 localhost systemd[1]: Starting Load/Save Random Seed... 7月 12 14:11:51 localhost systemd-journald[641]: Runtime Journal (/run/log/journal/dafee7947a1d4048bfe3d76cb3e0077a) is 8.0M, max 68.2M, 60.2M free. 7月 12 14:11:51 localhost systemd[1]: Starting Create System Users... 7月 12 14:11:51 localhost systemd[1]: Mounted FUSE Control File System. 7月 12 14:11:51 localhost systemd[1]: Mounted Temporary Directory /tmp. 7月 12 14:11:51 localhost systemd[1]: Finished Flush Journal to Persistent Storage. 7月 12 14:11:51 localhost systemd[1]: Finished Load/Save Random Seed. 7月 12 14:11:51 localhost systemd[1]: Condition check resulted in First Boot Complete being skipped. 7月 12 14:11:51 localhost systemd[1]: Finished Create System Users. 7月 12 14:11:51 localhost systemd[1]: Starting Create Static Device Nodes in /dev... 7月 12 14:11:51 localhost systemd-tmpfiles[665]: /usr/lib/tmpfiles.d/dbus.conf:13: Line references path below legacy directory /var/run/, updating /var/run/dbus/containers → /run/dbus/containers; please update the tmpfiles.d/ drop-in file accordingly. 7月 12 14:11:51 localhost systemd[1]: Finished Create Static Device Nodes in /dev. 7月 12 14:11:51 localhost systemd[1]: Reached target Preparation for Local File Systems. 7月 12 14:11:51 localhost systemd[1]: Finished Coldplug All udev Devices. 7月 12 14:11:52 localhost systemd[1]: Finished Rebuild Hardware Database. 7月 12 14:11:52 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... 7月 12 14:11:52 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. 7月 12 14:11:52 localhost systemd[1]: Starting Load Kernel Module configfs... 7月 12 14:11:52 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. 7月 12 14:11:52 localhost systemd[1]: Finished Load Kernel Module configfs. 7月 12 14:11:52 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 7月 12 14:11:52 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input5 7月 12 14:11:52 localhost systemd-udevd[682]: Using default interface naming scheme 'v249'. 7月 12 14:11:52 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/2e4e327a-c317-49db-bc97-c526736235d6 being skipped. 7月 12 14:11:52 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/2e4e327a-c317-49db-bc97-c526736235d6... 7月 12 14:11:52 localhost systemd-fsck[729]: /dev/vda1: clean, 380/65536 files, 45072/262144 blocks 7月 12 14:11:52 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/2e4e327a-c317-49db-bc97-c526736235d6. 7月 12 14:11:52 localhost systemd[1]: Mounting /boot... 7月 12 14:11:52 localhost kernel: sr 0:0:0:0: Attached scsi generic sg0 type 5 7月 12 14:11:52 localhost kernel: EXT4-fs (vda1): mounted filesystem with ordered data mode. Quota mode: none. 7月 12 14:11:52 localhost systemd[1]: Mounted /boot. 7月 12 14:11:52 localhost systemd[1]: Reached target Local File Systems. 7月 12 14:11:52 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... 7月 12 14:11:52 localhost systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. 7月 12 14:11:52 localhost systemd[1]: Starting Create Volatile Files and Directories... 7月 12 14:11:52 localhost systemd-tmpfiles[739]: /usr/lib/tmpfiles.d/dbus.conf:13: Line references path below legacy directory /var/run/, updating /var/run/dbus/containers → /run/dbus/containers; please update the tmpfiles.d/ drop-in file accordingly. 7月 12 14:11:52 localhost systemd[1]: Finished Create Volatile Files and Directories. 7月 12 14:11:52 localhost systemd[1]: Starting Security Auditing Service... 7月 12 14:11:52 localhost systemd[1]: Starting Rebuild Journal Catalog... 7月 12 14:11:52 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. 7月 12 14:11:52 localhost auditd[746]: No plugins found, not dispatching events 7月 12 14:11:52 localhost systemd[1]: Finished Rebuild Journal Catalog. 7月 12 14:11:52 localhost auditd[746]: Init complete, auditd 3.0.9 listening for events (startup state enable) 7月 12 14:11:52 localhost systemd[1]: Starting Update is Completed... 7月 12 14:11:52 localhost systemd[1]: Finished Update is Completed. 7月 12 14:11:53 localhost systemd[1]: Started Security Auditing Service. 7月 12 14:11:53 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... 7月 12 14:11:53 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. 7月 12 14:11:53 localhost systemd[1]: Reached target System Initialization. 7月 12 14:11:53 localhost systemd[1]: Started dnf makecache --timer. 7月 12 14:11:53 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. 7月 12 14:11:53 localhost systemd[1]: Reached target Timer Units. 7月 12 14:11:53 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. 7月 12 14:11:53 localhost systemd[1]: Listening on PC/SC Smart Card Daemon Activation Socket. 7月 12 14:11:53 localhost systemd[1]: Reached target Socket Units. 7月 12 14:11:53 localhost systemd[1]: Reached target Basic System. 7月 12 14:11:53 localhost systemd[1]: Starting NTP client/server... 7月 12 14:11:53 localhost systemd[1]: Starting D-Bus System Message Bus... 7月 12 14:11:53 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... 7月 12 14:11:53 localhost systemd[1]: Starting Update RTC With System Clock... 7月 12 14:11:53 localhost systemd[1]: Starting irqbalance daemon... 7月 12 14:11:53 localhost dbus-daemon[775]: [system] SELinux support is enabled 7月 12 14:11:53 localhost systemd[1]: Starting Authorization Manager... 7月 12 14:11:53 localhost /usr/sbin/irqbalance[783]: Balancing is ineffective on systems with a single cpu. Shutting down 7月 12 14:11:53 localhost systemd[1]: Starting Restorecon maintaining path file context... 7月 12 14:11:53 localhost systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. 7月 12 14:11:53 localhost dmsetup[767]: DM_VG_NAME='openeuler' 7月 12 14:11:53 localhost systemd[1]: Starting OpenSSH ecdsa Server Key Generation... 7月 12 14:11:53 localhost dmsetup[771]: DM_VG_NAME='openeuler' 7月 12 14:11:53 localhost systemd[1]: Starting OpenSSH ed25519 Server Key Generation... 7月 12 14:11:53 localhost rngd[786]: Initializing available sources 7月 12 14:11:53 localhost rngd[786]: [hwrng ]: Initialized 7月 12 14:11:53 localhost rngd[786]: [rdrand]: Enabling RDSEED rng support 7月 12 14:11:53 localhost rngd[786]: [rdrand]: Initialized 7月 12 14:11:53 localhost rngd[786]: [jitter]: JITTER timeout set to 10 sec 7月 12 14:11:53 localhost systemd[1]: Starting OpenSSH rsa Server Key Generation... 7月 12 14:11:53 localhost systemd[1]: Starting User Login Management... 7月 12 14:11:53 localhost restorecond[784]: Unable to watch (/root/.ssh/*) No such file or directory 7月 12 14:11:53 localhost dmsetup[771]: DM_LV_NAME='swap' 7月 12 14:11:53 localhost dmsetup[771]: DM_LV_LAYER='' 7月 12 14:11:53 localhost dmsetup[767]: DM_LV_NAME='root' 7月 12 14:11:53 localhost systemd[1]: Starting Run a configured list of systemtap scripts at system startup.... 7月 12 14:11:53 localhost dmsetup[767]: DM_LV_LAYER='' 7月 12 14:11:53 localhost systemd[1]: Started D-Bus System Message Bus. 7月 12 14:11:53 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. 7月 12 14:11:53 localhost systemd[1]: Finished Update RTC With System Clock. 7月 12 14:11:53 localhost chronyd[813]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) 7月 12 14:11:53 localhost systemd[1]: irqbalance.service: Deactivated successfully. 7月 12 14:11:53 localhost rngd[786]: [jitter]: Initializing AES buffer 7月 12 14:11:53 localhost systemd[1]: Started irqbalance daemon. 7月 12 14:11:53 localhost systemd[1]: Started NTP client/server. 7月 12 14:11:53 localhost systemd[1]: Started Restorecon maintaining path file context. 7月 12 14:11:53 localhost polkitd[782]: Started polkitd version 122 7月 12 14:11:53 localhost systemd[1]: sshd-keygen@ecdsa.service: Deactivated successfully. 7月 12 14:11:53 localhost systemd[1]: Finished OpenSSH ecdsa Server Key Generation. 7月 12 14:11:53 localhost polkitd[782]: Loading rules from directory /etc/polkit-1/rules.d 7月 12 14:11:53 localhost polkitd[782]: Loading rules from directory /usr/share/polkit-1/rules.d 7月 12 14:11:53 localhost polkitd[782]: Finished loading, compiling and executing 2 rules 7月 12 14:11:53 localhost systemd[1]: Started Authorization Manager. 7月 12 14:11:53 localhost polkitd[782]: Acquired the name org.freedesktop.PolicyKit1 on the system bus 7月 12 14:11:53 localhost systemd[1]: Starting firewalld - dynamic firewall daemon... 7月 12 14:11:53 localhost systemd[1]: sshd-keygen@ed25519.service: Deactivated successfully. 7月 12 14:11:53 localhost systemd[1]: Finished OpenSSH ed25519 Server Key Generation. 7月 12 14:11:53 localhost root[841]: Warning: No scripts exist. 7月 12 14:11:53 localhost systemtap-service[800]: Starting systemtap: [WARNING] 7月 12 14:11:53 localhost systemd[1]: Finished Run a configured list of systemtap scripts at system startup.. 7月 12 14:11:53 localhost systemd-logind[797]: Watching system buttons on /dev/input/event0 (Power Button) 7月 12 14:11:53 localhost systemd-logind[797]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) 7月 12 14:11:53 localhost systemd-logind[797]: New seat seat0. 7月 12 14:11:53 localhost systemd[1]: Started User Login Management. 7月 12 14:11:53 localhost lvm[700]: PV /dev/vda2 online, VG openeuler is complete. 7月 12 14:11:53 localhost kernel: qxl 0000:00:02.0: vgaarb: deactivate vga console 7月 12 14:11:53 localhost kernel: Console: switching to colour dummy device 80x25 7月 12 14:11:54 localhost kernel: [drm] Device Version 0.0 7月 12 14:11:54 localhost kernel: [drm] Compression level 0 log level 0 7月 12 14:11:54 localhost kernel: [drm] 12286 io pages at offset 0x1000000 7月 12 14:11:54 localhost kernel: [drm] 16777216 byte draw area at offset 0x0 7月 12 14:11:54 localhost kernel: [drm] RAM header offset: 0x3ffe000 7月 12 14:11:54 localhost kernel: [drm] qxl: 16M of VRAM memory size 7月 12 14:11:54 localhost kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) 7月 12 14:11:54 localhost kernel: [drm] qxl: 64M of Surface memory size 7月 12 14:11:54 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event openeuler. 7月 12 14:11:54 localhost kernel: [drm] slot 0 (main): base 0xf4000000, size 0x03ffe000 7月 12 14:11:54 localhost systemd[1]: Started firewalld - dynamic firewall daemon. 7月 12 14:11:54 localhost systemd[1]: Reached target Preparation for Network. 7月 12 14:11:54 localhost systemd[1]: Starting Network Manager... 7月 12 14:11:54 localhost kernel: [drm] slot 1 (surfaces): base 0xf8000000, size 0x04000000 7月 12 14:11:54 localhost kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 7月 12 14:11:54 localhost lvm[856]: 2 logical volume(s) in volume group "openeuler" now active 7月 12 14:11:54 localhost systemd[1]: lvm-activate-openeuler.service: Deactivated successfully. 7月 12 14:11:54 localhost kernel: fbcon: qxldrmfb (fb0) is primary device 7月 12 14:11:54 localhost NetworkManager[858]: [1689142314.8840] NetworkManager (version 1.32.12-18.oe1) is starting... (for the first time) 7月 12 14:11:54 localhost NetworkManager[858]: [1689142314.8894] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) 7月 12 14:11:54 localhost kernel: Console: switching to colour frame buffer device 128x48 7月 12 14:11:54 localhost systemd[1]: Started Network Manager. 7月 12 14:11:54 localhost NetworkManager[858]: [1689142314.9002] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" 7月 12 14:11:54 localhost NetworkManager[858]: [1689142314.9223] manager[0x55bdbabeb000]: monitoring kernel firmware directory '/lib/firmware'. 7月 12 14:11:54 localhost dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 14:11:54 localhost kernel: qxl 0000:00:02.0: [drm] fb0: qxldrmfb frame buffer device 7月 12 14:11:54 localhost systemd[1]: Reached target Network. 7月 12 14:11:54 localhost systemd[1]: Starting Network Manager Wait Online... 7月 12 14:11:55 localhost systemd[1]: Starting Hostname Service... 7月 12 14:11:55 localhost kernel: snd_hda_codec_generic hdaudioC0D0: autoconfig for Generic: line_outs=1 (0x3/0x0/0x0/0x0/0x0) type:line 7月 12 14:11:55 localhost kernel: snd_hda_codec_generic hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) 7月 12 14:11:55 localhost kernel: snd_hda_codec_generic hdaudioC0D0: hp_outs=0 (0x0/0x0/0x0/0x0/0x0) 7月 12 14:11:55 localhost kernel: snd_hda_codec_generic hdaudioC0D0: mono: mono_out=0x0 7月 12 14:11:55 localhost kernel: snd_hda_codec_generic hdaudioC0D0: inputs: 7月 12 14:11:55 localhost kernel: snd_hda_codec_generic hdaudioC0D0: Line=0x5 7月 12 14:11:55 localhost systemd[1]: Starting Permit User Sessions... 7月 12 14:11:55 localhost systemd[1]: Starting Dynamic System Tuning Daemon... 7月 12 14:11:55 localhost systemd[1]: Finished Permit User Sessions. 7月 12 14:11:55 localhost systemd[1]: Started Command Scheduler. 7月 12 14:11:55 localhost crond[878]: (CRON) STARTUP (1.6.1) 7月 12 14:11:55 localhost crond[878]: (CRON) INFO (Syslog will be used instead of sendmail.) 7月 12 14:11:55 localhost crond[878]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 27% if used.) 7月 12 14:11:55 localhost crond[878]: (CRON) INFO (running with inotify support) 7月 12 14:11:55 localhost systemd[1]: Started Getty on tty1. 7月 12 14:11:55 localhost systemd[1]: Reached target Login Prompts. 7月 12 14:11:55 localhost systemd[1]: Reached target Sound Card. 7月 12 14:11:55 localhost dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.hostname1' 7月 12 14:11:55 localhost systemd[1]: Started Hostname Service. 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.4905] hostname: hostname: using hostnamed 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.4910] dns-mgr[0x55bdbabd1250]: init: dns=default rc-manager=symlink 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5295] manager[0x55bdbabeb000]: rfkill: Wi-Fi hardware radio set enabled 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5296] manager[0x55bdbabeb000]: rfkill: WWAN hardware radio set enabled 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5375] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.32.12-18.oe1/libnm-device-plugin-team.so) 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5419] Loaded device plugin: NMAtmManager (/usr/lib64/NetworkManager/1.32.12-18.oe1/libnm-device-plugin-adsl.so) 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5433] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5445] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5452] manager: Networking is enabled by state file 7月 12 14:11:55 localhost dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5514] dhcp-init: Using DHCP client 'dhclient' 7月 12 14:11:55 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5729] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.32.12-18.oe1/libnm-settings-plugin-ifcfg-rh.so") 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.5763] settings: Loaded settings plugin: keyfile (internal) 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.6008] device (lo): carrier: link connected 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.6073] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.6203] manager: (ens3): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) 7月 12 14:11:55 localhost dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 14:11:55 localhost systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.6393] device (ens3): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.6533] device (ens3): carrier: link connected 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.7131] device (ens3): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed') 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.7233] policy: auto-activating connection 'ens3' (22ffbbb7-7187-403b-b4be-3009298f5fc7) 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.7306] device (ens3): Activation: starting connection 'ens3' (22ffbbb7-7187-403b-b4be-3009298f5fc7) 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.7315] device (ens3): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.7382] manager: NetworkManager state is now CONNECTING 7月 12 14:11:55 localhost NetworkManager[858]: [1689142315.7414] device (ens3): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') 7月 12 14:11:56 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:56 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:56 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:56 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:56 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:56 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost tuned[871]: libperf: mmap_per_cpu: nr cpu values 1 nr threads 1 7月 12 14:11:57 localhost tuned[871]: libperf: idx 0: mmapping fd 8 7月 12 14:11:57 localhost systemd[1]: sshd-keygen@rsa.service: Deactivated successfully. 7月 12 14:11:57 localhost systemd[1]: Finished OpenSSH rsa Server Key Generation. 7月 12 14:11:57 localhost systemd[1]: Reached target sshd-keygen.target. 7月 12 14:11:57 localhost systemd[1]: Starting OpenSSH server daemon... 7月 12 14:11:57 localhost systemd[1]: Started Dynamic System Tuning Daemon. 7月 12 14:11:57 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:57 localhost sshd[1209]: Server listening on 0.0.0.0 port 22. 7月 12 14:11:57 localhost sshd[1209]: Server listening on :: port 22. 7月 12 14:11:57 localhost systemd[1]: Started OpenSSH server daemon. 7月 12 14:11:57 localhost systemd[1]: Starting openEuler Security Tool... 7月 12 14:11:58 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:58 localhost security-tool.sh[1284]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:58 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:58 localhost security-tool.sh[1337]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:58 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:58 localhost security-tool.sh[1390]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:58 localhost security-tool.sh[1444]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:58 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:58 localhost security-tool.sh[1496]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:58 localhost firewalld[832]: ERROR: 'python-nftables' failed: internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_PREROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_POSTROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_OUTPUT’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory JSON blob: {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING", "type": "filter", "hook": "prerouting", "prio": -140}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING", "expr": [{"jump": {"target": "mangle_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING", "type": "nat", "hook": "prerouting", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING", "expr": [{"jump": {"target": "nat_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING", "type": "nat", "hook": "postrouting", "prio": 110}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING", "expr": [{"jump": {"target": "nat_POSTROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT", "type": "nat", "hook": "output", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_PREROUTING", "type": "filter", "hook": "prerouting", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT", "type": "filter", "hook": "input", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD", "type": "filter", "hook": "forward", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT", "type": "filter", "hook": "output", "prio": 10}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"jump": {"target": "filter_INPUT_ZONES"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_ZONES"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"jump": {"target": "filter_FORWARD_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"fib": {"flags": ["saddr", "iif", "mark"], "result": "oif"}}, "op": "==", "right": false}}, {"drop": null}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": {"set": ["nd-router-advert", "nd-neighbor-solicit"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "index": 1, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "index": 3, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "index": 6, "expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"goto": {"target": "filter_IN_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"goto": {"target": "nat_POST_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES", "expr": [{"goto": {"target": "filter_FWD_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"goto": {"target": "nat_PRE_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"goto": {"target": "mangle_PRE_public"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_POLICIES_pre", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-solicit"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-router-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-redirect"}}, {"accept": null}]}}}]} 7月 12 14:11:58 localhost firewalld[832]: ERROR: Failed to load user configuration. Falling back to full stock configuration. 7月 12 14:11:59 localhost security-tool.sh[1548]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:59 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:59 localhost security-tool.sh[1602]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:59 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:59 localhost security-tool.sh[1655]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:59 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:59 localhost security-tool.sh[1710]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:59 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:59 localhost security-tool.sh[1747]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:11:59 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:11:59 localhost security-tool.sh[1801]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:00 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:00 localhost security-tool.sh[1854]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:00 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:00 localhost security-tool.sh[1893]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:00 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:00 localhost security-tool.sh[1946]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:00 localhost security-tool.sh[2001]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:00 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:00 localhost security-tool.sh[2053]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:00 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:00 localhost security-tool.sh[2105]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:01 localhost security-tool.sh[2159]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost security-tool.sh[2213]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:01 localhost firewalld[832]: ERROR: 'python-nftables' failed: internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_PREROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_POSTROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_OUTPUT’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory JSON blob: {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING", "type": "filter", "hook": "prerouting", "prio": -140}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING", "expr": [{"jump": {"target": "mangle_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING", "type": "nat", "hook": "prerouting", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING", "expr": [{"jump": {"target": "nat_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING", "type": "nat", "hook": "postrouting", "prio": 110}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING", "expr": [{"jump": {"target": "nat_POSTROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT", "type": "nat", "hook": "output", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_PREROUTING", "type": "filter", "hook": "prerouting", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT", "type": "filter", "hook": "input", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD", "type": "filter", "hook": "forward", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT", "type": "filter", "hook": "output", "prio": 10}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"jump": {"target": "filter_INPUT_ZONES"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_ZONES"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"jump": {"target": "filter_FORWARD_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"fib": {"flags": ["saddr", "iif", "mark"], "result": "oif"}}, "op": "==", "right": false}}, {"drop": null}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": {"set": ["nd-router-advert", "nd-neighbor-solicit"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "index": 1, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "index": 3, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "index": 6, "expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"goto": {"target": "filter_IN_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"goto": {"target": "nat_POST_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES", "expr": [{"goto": {"target": "filter_FWD_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"goto": {"target": "nat_PRE_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"goto": {"target": "mangle_PRE_public"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_POLICIES_pre", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-solicit"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-router-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-redirect"}}, {"accept": null}]}}}]} 7月 12 14:12:01 localhost firewalld[832]: ERROR: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_PREROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_POSTROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_OUTPUT’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory JSON blob: {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING", "type": "filter", "hook": "prerouting", "prio": -140}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING", "expr": [{"jump": {"target": "mangle_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING", "type": "nat", "hook": "prerouting", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING", "expr": [{"jump": {"target": "nat_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING", "type": "nat", "hook": "postrouting", "prio": 110}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING", "expr": [{"jump": {"target": "nat_POSTROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT", "type": "nat", "hook": "output", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_PREROUTING", "type": "filter", "hook": "prerouting", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT", "type": "filter", "hook": "input", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD", "type": "filter", "hook": "forward", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT", "type": "filter", "hook": "output", "prio": 10}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"jump": {"target": "filter_INPUT_ZONES"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_ZONES"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"jump": {"target": "filter_FORWARD_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"fib": {"flags": ["saddr", "iif", "mark"], "result": "oif"}}, "op": "==", "right": false}}, {"drop": null}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": {"set": ["nd-router-advert", "nd-neighbor-solicit"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "index": 1, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "index": 3, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "index": 6, "expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"goto": {"target": "filter_IN_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"goto": {"target": "nat_POST_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES", "expr": [{"goto": {"target": "filter_FWD_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"goto": {"target": "nat_PRE_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"goto": {"target": "mangle_PRE_public"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_POLICIES_pre", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-solicit"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-router-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-redirect"}}, {"accept": null}]}}}]} 7月 12 14:12:01 localhost firewalld[832]: Traceback (most recent call last): File "/usr/lib/python3.10/site-packages/firewall/core/fw.py", line 629, in start self._start() File "/usr/lib/python3.10/site-packages/firewall/core/fw.py", line 593, in _start self._start_apply_objects(reload=reload, complete_reload=complete_reload) File "/usr/lib/python3.10/site-packages/firewall/core/fw.py", line 511, in _start_apply_objects transaction.execute(True) File "/usr/lib/python3.10/site-packages/firewall/core/fw_transaction.py", line 161, in execute raise FirewallError(errors.COMMAND_FAILED, errorMsg) firewall.errors.FirewallError: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_PREROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_POSTROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_OUTPUT’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory JSON blob: {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING", "type": "filter", "hook": "prerouting", "prio": -140}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING", "expr": [{"jump": {"target": "mangle_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING", "type": "nat", "hook": "prerouting", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING", "expr": [{"jump": {"target": "nat_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING", "type": "nat", "hook": "postrouting", "prio": 110}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING", "expr": [{"jump": {"target": "nat_POSTROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT", "type": "nat", "hook": "output", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_PREROUTING", "type": "filter", "hook": "prerouting", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT", "type": "filter", "hook": "input", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD", "type": "filter", "hook": "forward", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT", "type": "filter", "hook": "output", "prio": 10}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"jump": {"target": "filter_INPUT_ZONES"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_ZONES"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"jump": {"target": "filter_FORWARD_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"fib": {"flags": ["saddr", "iif", "mark"], "result": "oif"}}, "op": "==", "right": false}}, {"drop": null}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": {"set": ["nd-router-advert", "nd-neighbor-solicit"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "index": 1, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "index": 3, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "index": 6, "expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"goto": {"target": "filter_IN_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"goto": {"target": "nat_POST_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES", "expr": [{"goto": {"target": "filter_FWD_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"goto": {"target": "nat_PRE_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"goto": {"target": "mangle_PRE_public"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_POLICIES_pre", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-solicit"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-router-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-redirect"}}, {"accept": null}]}}}]} During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3.10/site-packages/firewall/core/fw.py", line 634, in start self._start_failsafe() File "/usr/lib/python3.10/site-packages/firewall/core/fw.py", line 625, in _start_failsafe self._start_apply_objects(reload=reload, complete_reload=complete_reload) File "/usr/lib/python3.10/site-packages/firewall/core/fw.py", line 511, in _start_apply_objects transaction.execute(True) File "/usr/lib/python3.10/site-packages/firewall/core/fw_transaction.py", line 161, in execute raise FirewallError(errors.COMMAND_FAILED, errorMsg) firewall.errors.FirewallError: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_PREROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_POSTROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_OUTPUT’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory JSON blob: {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING", "type": "filter", "hook": "prerouting", "prio": -140}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING", "expr": [{"jump": {"target": "mangle_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING", "type": "nat", "hook": "prerouting", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING", "expr": [{"jump": {"target": "nat_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING", "type": "nat", "hook": "postrouting", "prio": 110}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING", "expr": [{"jump": {"target": "nat_POSTROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT", "type": "nat", "hook": "output", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_PREROUTING", "type": "filter", "hook": "prerouting", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT", "type": "filter", "hook": "input", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD", "type": "filter", "hook": "forward", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT", "type": "filter", "hook": "output", "prio": 10}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"jump": {"target": "filter_INPUT_ZONES"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_ZONES"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"jump": {"target": "filter_FORWARD_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"fib": {"flags": ["saddr", "iif", "mark"], "result": "oif"}}, "op": "==", "right": false}}, {"drop": null}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": {"set": ["nd-router-advert", "nd-neighbor-solicit"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "index": 1, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "index": 3, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "index": 6, "expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"goto": {"target": "filter_IN_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"goto": {"target": "nat_POST_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES", "expr": [{"goto": {"target": "filter_FWD_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"goto": {"target": "nat_PRE_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"goto": {"target": "mangle_PRE_public"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_POLICIES_pre", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-solicit"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-router-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-redirect"}}, {"accept": null}]}}}]} 7月 12 14:12:01 localhost firewalld[832]: ERROR: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_PREROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_POSTROUTING’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: No such file or directory; did you mean chain ‘nat_OUTPUT’ in table inet ‘firewalld’? internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory internal:0:0-0: Error: Could not process rule: No such file or directory JSON blob: {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING", "type": "filter", "hook": "prerouting", "prio": -140}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING", "expr": [{"jump": {"target": "mangle_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING", "type": "nat", "hook": "prerouting", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PREROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING", "expr": [{"jump": {"target": "nat_PREROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING", "type": "nat", "hook": "postrouting", "prio": 110}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POSTROUTING_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING", "expr": [{"jump": {"target": "nat_POSTROUTING_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT", "type": "nat", "hook": "output", "prio": -90}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_OUTPUT", "expr": [{"jump": {"target": "nat_OUTPUT_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_PREROUTING", "type": "filter", "hook": "prerouting", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT", "type": "filter", "hook": "input", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD", "type": "filter", "hook": "forward", "prio": 10}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT", "type": "filter", "hook": "output", "prio": 10}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_ZONES"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_INPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"jump": {"target": "filter_INPUT_ZONES"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "status"}}, "op": "in", "right": "dnat"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["invalid"]}}}, {"drop": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_ZONES"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"jump": {"target": "filter_FORWARD_ZONES"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FORWARD_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["established", "related"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right": "lo"}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_pre"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_pre"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_OUTPUT_POLICIES_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "expr": [{"jump": {"target": "filter_OUTPUT_POLICIES_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"fib": {"flags": ["saddr", "iif", "mark"], "result": "oif"}}, "op": "==", "right": false}}, {"drop": null}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_PREROUTING", "expr": [{"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": {"set": ["nd-router-advert", "nd-neighbor-solicit"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_OUTPUT", "index": 1, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD", "index": 3, "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"set": [{"prefix": {"addr": "::0.0.0.0", "len": 96}}, {"prefix": {"addr": "::ffff:0.0.0.0", "len": 96}}, {"prefix": {"addr": "2002:0000::", "len": 24}}, {"prefix": {"addr": "2002:0a00::", "len": 24}}, {"prefix": {"addr": "2002:7f00::", "len": 24}}, {"prefix": {"addr": "2002:ac10::", "len": 28}}, {"prefix": {"addr": "2002:c0a8::", "len": 32}}, {"prefix": {"addr": "2002:a9fe::", "len": 32}}, {"prefix": {"addr": "2002:e000::", "len": 19}}]}}}, {"reject": {"type": "icmpv6", "expr": "addr-unreachable"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_IN_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 5353}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public_allow", "expr": [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}}, {"match": {"left": {"ct": {"key": "state"}}, "op": "in", "right": {"set": ["new", "untracked"]}}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_POST_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POST_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POST_public", "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_FWD_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FWD_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FWD_public", "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_public", "expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_public_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PRE_public_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_public", "expr": [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_public", "index": 6, "expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"goto": {"target": "filter_IN_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr": [{"goto": {"target": "nat_POST_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES", "expr": [{"goto": {"target": "filter_FWD_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES", "expr": [{"goto": {"target": "nat_PRE_public"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"goto": {"target": "mangle_PRE_public"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "filter_IN_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "nat_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6_post"}}]}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_pre"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_log"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_deny"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_allow"}}}, {"add": {"chain": {"family": "inet", "table": "firewalld", "name": "mangle_PRE_policy_allow-host-ipv6_post"}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_log"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_policy_allow-host-ipv6", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6_post"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_INPUT_POLICIES_pre", "expr": [{"jump": {"target": "filter_IN_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "nat_PRE_policy_allow-host-ipv6"}}]}}}, {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_POLICIES_pre", "expr": [{"jump": {"target": "mangle_PRE_policy_allow-host-ipv6"}}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-neighbor-solicit"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-router-advert"}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain": "filter_IN_policy_allow-host-ipv6_allow", "expr": [{"match": {"left": {"meta": {"key": "nfproto"}}, "op": "==", "right": "ipv6"}}, {"match": {"left": {"payload": {"protocol": "icmpv6", "field": "type"}}, "op": "==", "right": "nd-redirect"}}, {"accept": null}]}}}]} 7月 12 14:12:01 localhost firewalld[832]: ERROR: Failed to load full stock configuration. This likely indicates a system level issue, e.g. the firewall backend (nftables, iptables) is broken. All hope is lost. Exiting. 7月 12 14:12:01 localhost security-tool.sh[2265]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:01 localhost security-tool.sh[2302]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost security-tool.sh[2340]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:01 localhost security-tool.sh[2393]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:01 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:02 localhost security-tool.sh[2429]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:02 localhost kernel: missing module BTF, cannot register kfuncs 7月 12 14:12:02 localhost firewalld[832]: ERROR: Raising SystemExit in run_server 7月 12 14:12:02 localhost security-tool.sh[2485]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:02 localhost security-tool.sh[2489]: grep: warning: stray \ before / 7月 12 14:12:02 localhost security-tool.sh[2489]: grep: warning: stray \ before / 7月 12 14:12:02 localhost security-tool.sh[2489]: grep: warning: stray \ before / 7月 12 14:12:02 localhost security-tool.sh[2520]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:02 localhost systemd[1]: firewalld.service: Deactivated successfully. 7月 12 14:12:02 localhost NetworkManager[858]: [1689142322.4267] firewalld: [df0003cb94626900,change:"ens3"]: complete: request failed (Message recipient disconnected from message bus without replying) 7月 12 14:12:02 localhost NetworkManager[858]: [1689142322.4272] device (ens3): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') 7月 12 14:12:02 localhost NetworkManager[858]: [1689142322.4318] dhcp4 (ens3): activation: beginning transaction (timeout in 45 seconds) 7月 12 14:12:02 localhost NetworkManager[858]: [1689142322.4551] dhcp4 (ens3): dhclient started with pid 2539 7月 12 14:12:02 localhost dhclient[2539]: DHCPDISCOVER on ens3 to 255.255.255.255 port 67 interval 4 (xid=0xd5801516) 7月 12 14:12:02 localhost security-tool.sh[2561]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:02 localhost systemctl[2586]: [systemctl restart sshd.service] called by PID 1238 (/bin/sh /usr/sbin/security-tool.sh -d / -c /etc/openEuler_security/security.conf -u /etc/openEuler_security/usr-security.conf -l /var/log/openEuler-security.log -s) 7月 12 14:12:02 localhost systemd[1]: Stopping OpenSSH server daemon... 7月 12 14:12:02 localhost sshd[1209]: Received signal 15; terminating. 7月 12 14:12:02 localhost systemd[1]: sshd.service: Deactivated successfully. 7月 12 14:12:02 localhost systemd[1]: Stopped OpenSSH server daemon. 7月 12 14:12:02 localhost systemd[1]: Stopped target sshd-keygen.target. 7月 12 14:12:02 localhost systemd[1]: Stopping sshd-keygen.target... 7月 12 14:12:02 localhost systemd[1]: Condition check resulted in OpenSSH ecdsa Server Key Generation being skipped. 7月 12 14:12:02 localhost systemd[1]: Condition check resulted in OpenSSH ed25519 Server Key Generation being skipped. 7月 12 14:12:02 localhost systemd[1]: Condition check resulted in OpenSSH rsa Server Key Generation being skipped. 7月 12 14:12:02 localhost systemd[1]: Reached target sshd-keygen.target. 7月 12 14:12:02 localhost systemd[1]: Starting OpenSSH server daemon... 7月 12 14:12:02 localhost sshd[2588]: Server listening on 0.0.0.0 port 22. 7月 12 14:12:02 localhost sshd[2588]: Server listening on :: port 22. 7月 12 14:12:02 localhost systemd[1]: Started OpenSSH server daemon. 7月 12 14:12:02 localhost security-tool.sh[2633]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:03 localhost rngd[786]: [jitter]: Unable to obtain AES key, disabling JITTER source 7月 12 14:12:03 localhost rngd[786]: [jitter]: Initialization Failed 7月 12 14:12:03 localhost systemd[1]: Started PC/SC Smart Card Daemon. 7月 12 14:12:03 localhost security-tool.sh[2778]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:03 localhost rngd[786]: [pkcs11]: No pkcs11 slots available 7月 12 14:12:03 localhost rngd[786]: [pkcs11]: Initialization Failed 7月 12 14:12:03 localhost security-tool.sh[2925]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:03 localhost security-tool.sh[3067]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:03 localhost security-tool.sh[3368]: package at is not installed 7月 12 14:12:03 localhost security-tool.sh[1238]: [security-tool.sh:701] [error] package at does not exist 7月 12 14:12:04 localhost security-tool.sh[3395]: cronie-1.6.1-4.oe1.x86_64 7月 12 14:12:04 localhost dhclient[2539]: DHCPOFFER of 172.168.178.232 from 172.168.131.94 7月 12 14:12:04 localhost dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 255.255.255.255 port 67 (xid=0xd5801516) 7月 12 14:12:04 localhost security-tool.sh[3467]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost security-tool.sh[3517]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost security-tool.sh[3567]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost security-tool.sh[3617]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost security-tool.sh[3667]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost security-tool.sh[3717]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost security-tool.sh[3767]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.94 (xid=0xd5801516) 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5676] dhcp4 (ens3): address 172.168.178.232 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5676] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5677] dhcp4 (ens3): gateway 172.168.131.111 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5677] dhcp4 (ens3): lease time 3600 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5677] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5677] dhcp4 (ens3): state changed unknown -> bound, address=172.168.178.232 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5684] device (ens3): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5814] device (ens3): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5816] device (ens3): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5821] manager: NetworkManager state is now CONNECTED_LOCAL 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5824] manager: NetworkManager state is now CONNECTED_SITE 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5824] policy: set 'ens3' (ens3) as default for IPv4 routing and DNS 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5906] device (ens3): Activation: successful, device activated. 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5913] manager: NetworkManager state is now CONNECTED_GLOBAL 7月 12 14:12:04 localhost NetworkManager[858]: [1689142324.5916] manager: startup complete 7月 12 14:12:04 localhost systemd[1]: Finished Network Manager Wait Online. 7月 12 14:12:04 localhost systemd[1]: Reached target Network is Online. 7月 12 14:12:04 localhost systemd[1]: Starting Crash recovery kernel arming... 7月 12 14:12:04 localhost systemd[1]: Starting System Logging Service... 7月 12 14:12:04 localhost dhclient[2539]: bound to 172.168.178.232 -- renewal in 1588 seconds. 7月 12 14:12:04 localhost rsyslogd[3784]: [origin software="rsyslogd" swVersion="8.2210.0" x-pid="3784" x-info="https://www.rsyslog.com"] start 7月 12 14:12:04 localhost rsyslogd[3784]: imjournal: No statefile exists, /run/log/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2210.0 try https://www.rsyslog.com/e/2040 ] 7月 12 14:12:04 localhost kdumpctl[3805]: grep: warning: stray \ before - 7月 12 14:12:04 localhost kdumpctl[3805]: grep: warning: stray \ before - 7月 12 14:12:04 localhost kdumpctl[3806]: grep: warning: stray \ before - 7月 12 14:12:04 localhost systemd[1]: Started System Logging Service. 7月 12 14:12:04 localhost rsyslogd[3784]: imjournal: journal files changed, reloading... [v8.2210.0 try https://www.rsyslog.com/e/0 ] 7月 12 14:12:04 localhost kdumpctl[3877]: grep: warning: stray \ before - 7月 12 14:12:04 localhost kdumpctl[3877]: grep: warning: stray \ before - 7月 12 14:12:04 localhost security-tool.sh[3887]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:04 localhost kdumpctl[3800]: No kdump initial ramdisk found. 7月 12 14:12:04 localhost kdumpctl[3800]: Rebuilding /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 7月 12 14:12:05 localhost kdumpctl[3957]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[3957]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[3959]: grep: warning: stray \ before - 7月 12 14:12:05 localhost security-tool.sh[3980]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:05 localhost kdumpctl[3992]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[3992]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[3994]: grep: warning: stray \ before - 7月 12 14:12:05 localhost dmsetup[4051]: DM_VG_NAME='openeuler' 7月 12 14:12:05 localhost dmsetup[4051]: DM_LV_NAME='root' 7月 12 14:12:05 localhost dmsetup[4051]: DM_LV_LAYER='' 7月 12 14:12:05 localhost security-tool.sh[4065]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:05 localhost dmsetup[4067]: openeuler 7月 12 14:12:05 localhost security-tool.sh[4128]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:05 localhost kdumpctl[4197]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[4197]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[4199]: grep: warning: stray \ before - 7月 12 14:12:05 localhost security-tool.sh[4212]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:05 localhost kdumpctl[4243]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[4243]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[4245]: grep: warning: stray \ before - 7月 12 14:12:05 localhost dmsetup[4283]: DM_VG_NAME='openeuler' 7月 12 14:12:05 localhost dmsetup[4283]: DM_LV_NAME='root' 7月 12 14:12:05 localhost dmsetup[4283]: DM_LV_LAYER='' 7月 12 14:12:05 localhost security-tool.sh[4296]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:05 localhost dmsetup[4298]: openeuler 7月 12 14:12:05 localhost security-tool.sh[4362]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:05 localhost kdumpctl[4427]: grep: warning: stray \ before - 7月 12 14:12:05 localhost kdumpctl[4427]: grep: warning: stray \ before - 7月 12 14:12:05 localhost security-tool.sh[4429]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost security-tool.sh[4531]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost security-tool.sh[4605]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost dracut[4625]: dracut-059-3.oe1 7月 12 14:12:06 localhost security-tool.sh[4698]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost security-tool.sh[4748]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost dracut[4640]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o "plymouth dash resume ifcfg earlykdump" --mount "/dev/mapper/openeuler-root /sysroot ext4 defaults,noauto" --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64 7月 12 14:12:06 localhost security-tool.sh[4831]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost dmsetup[4845]: DM_VG_NAME='openeuler' 7月 12 14:12:06 localhost dmsetup[4845]: DM_LV_NAME='root' 7月 12 14:12:06 localhost dmsetup[4845]: DM_LV_LAYER='' 7月 12 14:12:06 localhost dmsetup[4866]: openeuler 7月 12 14:12:06 localhost security-tool.sh[4902]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:06 localhost security-tool.sh[4969]: egrep: warning: egrep is obsolescent; using grep -E 7月 12 14:12:07 localhost security-tool.sh[5066]: kernel.sysrq = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.ip_forward = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.all.send_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.default.send_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.all.accept_source_route = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.default.accept_source_route = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.all.accept_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.default.accept_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.all.secure_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.default.secure_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.icmp_echo_ignore_broadcasts = 1 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.icmp_ignore_bogus_error_responses = 1 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.all.rp_filter = 1 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.conf.default.rp_filter = 1 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv4.tcp_syncookies = 1 7月 12 14:12:07 localhost security-tool.sh[5066]: kernel.dmesg_restrict = 1 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv6.conf.all.accept_redirects = 0 7月 12 14:12:07 localhost security-tool.sh[5066]: net.ipv6.conf.default.accept_redirects = 0 7月 12 14:12:07 localhost systemctl[5079]: [systemctl disable openEuler-security.service] called by PID 1214 (/bin/sh /usr/sbin/security-tool.sh -d / -c /etc/openEuler_security/security.conf -u /etc/openEuler_security/usr-security.conf -l /var/log/openEuler-security.log -s) 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-integritysetup' will not be installed, because command '/usr/lib/systemd/systemd-integritysetup' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-integritysetup' will not be installed, because command '/usr/lib/systemd/system-generators/systemd-integritysetup-generator' could not be found! 7月 12 14:12:07 localhost security-tool.sh[5079]: Removed /etc/systemd/system/multi-user.target.wants/openEuler-security.service. 7月 12 14:12:07 localhost systemd[1]: Reloading. 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-pcrphase' will not be installed, because command '/usr/lib/systemd/systemd-pcrphase' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-portabled' will not be installed, because command 'portablectl' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-portabled' will not be installed, because command '/usr/lib/systemd/systemd-portabled' could not be found! 7月 12 14:12:07 localhost systemd-rc-local-generator[5100]: /etc/rc.d/rc.local is not marked executable, skipping. 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-pstore' will not be installed, because command '/usr/lib/systemd/systemd-pstore' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-repart' will not be installed, because command 'systemd-repart' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-rfkill' will not be installed, because command '/usr/lib/systemd/systemd-rfkill' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-sysext' will not be installed, because command 'systemd-sysext' could not be found! 7月 12 14:12:07 localhost systemd[1]: /usr/lib/systemd/system/dbus.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/dbus/system_bus_socket → /run/dbus/system_bus_socket; please update the unit file accordingly. 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-veritysetup' will not be installed, because command '/usr/lib/systemd/systemd-veritysetup' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'systemd-veritysetup' will not be installed, because command '/usr/lib/systemd/system-generators/systemd-veritysetup-generator' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found! 7月 12 14:12:07 localhost systemd[1]: Reached target Multi-User System. 7月 12 14:12:07 localhost dracut[4640]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'dbus-broker' will not be installed, because command 'dbus-broker' could not be found! 7月 12 14:12:07 localhost systemd[1]: Starting Record Runlevel Change in UTMP... 7月 12 14:12:07 localhost systemd[1]: Finished openEuler Security Tool. 7月 12 14:12:07 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. 7月 12 14:12:07 localhost systemd[1]: Finished Record Runlevel Change in UTMP. 7月 12 14:12:07 localhost dracut[4640]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'ifcfg' will not be installed, because it's in the list to be omitted! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'plymouth' will not be installed, because it's in the list to be omitted! 7月 12 14:12:07 localhost dracut[4640]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! 7月 12 14:12:07 localhost dracut[4640]: 90crypt: Could not find any command of '/usr/lib/systemd/systemd-cryptsetup cryptsetup'! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! 7月 12 14:12:07 localhost dmsetup[5239]: DM_VG_NAME='openeuler' 7月 12 14:12:07 localhost dmsetup[5239]: DM_LV_NAME='root' 7月 12 14:12:07 localhost dmsetup[5239]: DM_LV_LAYER='' 7月 12 14:12:07 localhost dmsetup[5242]: openeuler 7月 12 14:12:07 localhost dracut[4640]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! 7月 12 14:12:07 localhost dmsetup[5281]: DM_VG_NAME='openeuler' 7月 12 14:12:07 localhost dmsetup[5281]: DM_LV_NAME='root' 7月 12 14:12:07 localhost dmsetup[5281]: DM_LV_LAYER='' 7月 12 14:12:07 localhost dmsetup[5284]: openeuler 7月 12 14:12:07 localhost dmsetup[5323]: DM_VG_NAME='openeuler' 7月 12 14:12:07 localhost dmsetup[5323]: DM_LV_NAME='root' 7月 12 14:12:07 localhost dmsetup[5323]: DM_LV_LAYER='' 7月 12 14:12:07 localhost dmsetup[5326]: openeuler 7月 12 14:12:07 localhost dracut[4640]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! 7月 12 14:12:07 localhost dmsetup[5377]: DM_VG_NAME='openeuler' 7月 12 14:12:07 localhost dmsetup[5377]: DM_LV_NAME='root' 7月 12 14:12:07 localhost dmsetup[5377]: DM_LV_LAYER='' 7月 12 14:12:07 localhost dmsetup[5379]: openeuler 7月 12 14:12:07 localhost dracut[4640]: 95nfs: Could not find any command of 'rpcbind portmap'! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'resume' will not be installed, because it's in the list to be omitted! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! 7月 12 14:12:07 localhost dracut[4640]: dracut module 'earlykdump' will not be installed, because it's in the list to be omitted! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! 7月 12 14:12:08 localhost dracut[4640]: memstrack is not available 7月 12 14:12:08 localhost dracut[4640]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-integritysetup' will not be installed, because command '/usr/lib/systemd/systemd-integritysetup' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-integritysetup' will not be installed, because command '/usr/lib/systemd/system-generators/systemd-integritysetup-generator' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-pcrphase' will not be installed, because command '/usr/lib/systemd/systemd-pcrphase' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-portabled' will not be installed, because command 'portablectl' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-portabled' will not be installed, because command '/usr/lib/systemd/systemd-portabled' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-pstore' will not be installed, because command '/usr/lib/systemd/systemd-pstore' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-repart' will not be installed, because command 'systemd-repart' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-rfkill' will not be installed, because command '/usr/lib/systemd/systemd-rfkill' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-sysext' will not be installed, because command 'systemd-sysext' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-veritysetup' will not be installed, because command '/usr/lib/systemd/systemd-veritysetup' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'systemd-veritysetup' will not be installed, because command '/usr/lib/systemd/system-generators/systemd-veritysetup-generator' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'modsign' will not be installed, because command 'keyctl' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'dbus-broker' will not be installed, because command 'dbus-broker' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! 7月 12 14:12:08 localhost dracut[4640]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! 7月 12 14:12:08 localhost dracut[4640]: 90crypt: Could not find any command of '/usr/lib/systemd/systemd-cryptsetup cryptsetup'! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! 7月 12 14:12:08 localhost dmsetup[5511]: DM_VG_NAME='openeuler' 7月 12 14:12:08 localhost dmsetup[5511]: DM_LV_NAME='root' 7月 12 14:12:08 localhost dmsetup[5511]: DM_LV_LAYER='' 7月 12 14:12:08 localhost dmsetup[5514]: openeuler 7月 12 14:12:08 localhost dracut[4640]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! 7月 12 14:12:08 localhost dmsetup[5534]: DM_VG_NAME='openeuler' 7月 12 14:12:08 localhost dmsetup[5534]: DM_LV_NAME='root' 7月 12 14:12:08 localhost dmsetup[5534]: DM_LV_LAYER='' 7月 12 14:12:08 localhost dmsetup[5537]: openeuler 7月 12 14:12:08 localhost dmsetup[5575]: DM_VG_NAME='openeuler' 7月 12 14:12:08 localhost dmsetup[5575]: DM_LV_NAME='root' 7月 12 14:12:08 localhost dmsetup[5575]: DM_LV_LAYER='' 7月 12 14:12:08 localhost dmsetup[5578]: openeuler 7月 12 14:12:08 localhost dracut[4640]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! 7月 12 14:12:08 localhost dmsetup[5623]: DM_VG_NAME='openeuler' 7月 12 14:12:08 localhost dmsetup[5623]: DM_LV_NAME='root' 7月 12 14:12:08 localhost dmsetup[5623]: DM_LV_LAYER='' 7月 12 14:12:08 localhost dmsetup[5625]: openeuler 7月 12 14:12:08 localhost dracut[4640]: 95nfs: Could not find any command of 'rpcbind portmap'! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! 7月 12 14:12:08 localhost dracut[4640]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! 7月 12 14:12:08 localhost dracut[4640]: memstrack is not available 7月 12 14:12:08 localhost dracut[4640]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng 7月 12 14:12:08 localhost dracut[4640]: *** Including module: systemd *** 7月 12 14:12:08 localhost systemctl[5878]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants emergency.target systemd-vconsole-setup.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:08 localhost systemctl[5879]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants rescue.target systemd-vconsole-setup.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:08 localhost systemctl[5880]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants systemd-ask-password-console.service systemd-vconsole-setup.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:09 localhost systemctl[5882]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs set-default multi-user.target] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:09 localhost dracut[4640]: *** Including module: systemd-initrd *** 7月 12 14:12:09 localhost systemctl[5905]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs set-default initrd.target] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:09 localhost dracut[4640]: *** Including module: rngd *** 7月 12 14:12:09 localhost systemctl[5914]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants sysinit.target rngd.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:09 localhost dracut[4640]: *** Including module: i18n *** 7月 12 14:12:09 localhost dracut[4640]: *** Including module: drm *** 7月 12 14:12:09 localhost dracut[4640]: *** Including module: dm *** 7月 12 14:12:09 localhost dracut[4640]: Skipping udev rule: 64-device-mapper.rules 7月 12 14:12:09 localhost dracut[4640]: Skipping udev rule: 60-persistent-storage-dm.rules 7月 12 14:12:09 localhost dracut[4640]: Skipping udev rule: 55-dm.rules 7月 12 14:12:09 localhost dracut[4640]: *** Including module: kernel-modules *** 7月 12 14:12:09 localhost dmsetup[6271]: DM_VG_NAME='openeuler' 7月 12 14:12:09 localhost dmsetup[6271]: DM_LV_NAME='root' 7月 12 14:12:09 localhost dmsetup[6271]: DM_LV_LAYER='' 7月 12 14:12:09 localhost dmsetup[6292]: openeuler 7月 12 14:12:10 localhost dracut[4640]: *** Including module: kernel-modules-extra *** 7月 12 14:12:10 localhost dracut[4640]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist 7月 12 14:12:10 localhost dracut[4640]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist 7月 12 14:12:10 localhost dracut[4640]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" 7月 12 14:12:10 localhost dracut[4640]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra external built-in weak-updates" to the list of search directories 7月 12 14:12:10 localhost dracut[4640]: *** Including module: lvm *** 7月 12 14:12:10 localhost dmsetup[6461]: DM_VG_NAME='openeuler' 7月 12 14:12:10 localhost dmsetup[6461]: DM_LV_NAME='root' 7月 12 14:12:10 localhost dmsetup[6461]: DM_LV_LAYER='' 7月 12 14:12:10 localhost dracut[4640]: Skipping udev rule: 64-device-mapper.rules 7月 12 14:12:10 localhost dracut[4640]: Skipping udev rule: 56-lvm.rules 7月 12 14:12:10 localhost dracut[4640]: Skipping udev rule: 60-persistent-storage-lvm.rules 7月 12 14:12:10 localhost dmsetup[6508]: DM_VG_NAME='openeuler' 7月 12 14:12:10 localhost dmsetup[6508]: DM_LV_NAME='root' 7月 12 14:12:10 localhost dmsetup[6508]: DM_LV_LAYER='' 7月 12 14:12:10 localhost dracut[4640]: *** Including module: nvdimm *** 7月 12 14:12:10 localhost dracut[4640]: *** Including module: qemu *** 7月 12 14:12:10 localhost dracut[4640]: *** Including module: fstab-sys *** 7月 12 14:12:10 localhost dracut[4640]: *** Including module: rootfs-block *** 7月 12 14:12:10 localhost dracut[4640]: *** Including module: terminfo *** 7月 12 14:12:10 localhost dracut[4640]: *** Including module: udev-rules *** 7月 12 14:12:10 localhost dracut[4640]: Skipping udev rule: 40-redhat.rules 7月 12 14:12:10 localhost dracut[4640]: Skipping udev rule: 50-firmware.rules 7月 12 14:12:10 localhost dracut[4640]: Skipping udev rule: 50-udev.rules 7月 12 14:12:11 localhost dracut[4640]: Skipping udev rule: 91-permissions.rules 7月 12 14:12:11 localhost dracut[4640]: Skipping udev rule: 80-drivers-modprobe.rules 7月 12 14:12:11 localhost dracut[4640]: Skipping udev rule: 70-persistent-net.rules 7月 12 14:12:11 localhost dracut[4640]: *** Including module: virtiofs *** 7月 12 14:12:11 localhost dracut[4640]: *** Including module: dracut-systemd *** 7月 12 14:12:11 localhost systemctl[6798]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-cmdline.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6801]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-cmdline-ask.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6804]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-initqueue.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6807]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-mount.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6810]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-pre-mount.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6813]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-pre-pivot.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6816]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-pre-trigger.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost systemctl[6819]: [systemctl -q --root /var/tmp/dracut.mO6j2e/initramfs add-wants initrd.target dracut-pre-udev.service] called by PID 4535 (/bin/bash -p /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o plymouth dash resume ifcfg earlykdump --mount /dev/mapper/openeuler-root /sysroot ext4 defaults,noauto --no-hostonly-default-device -f /boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img 6.1.8-3.0.0.8.oe1.x86_64) 7月 12 14:12:11 localhost dracut[4640]: *** Including module: usrmount *** 7月 12 14:12:11 localhost dracut[4640]: *** Including module: base *** 7月 12 14:12:11 localhost dracut[4640]: *** Including module: fs-lib *** 7月 12 14:12:11 localhost dracut[4640]: *** Including module: kdumpbase *** 7月 12 14:12:11 localhost kdumpctl[6905]: grep: warning: stray \ before - 7月 12 14:12:11 localhost kdumpctl[6905]: grep: warning: stray \ before - 7月 12 14:12:11 localhost kdumpctl[6987]: grep: warning: stray \ before - 7月 12 14:12:11 localhost kdumpctl[6987]: grep: warning: stray \ before - 7月 12 14:12:11 localhost kdumpctl[6989]: grep: warning: stray \ before - 7月 12 14:12:11 localhost dracut[4640]: *** Including module: shutdown *** 7月 12 14:12:11 localhost dracut[4640]: *** Including module: squash *** 7月 12 14:12:11 localhost dracut[4640]: *** Including modules done *** 7月 12 14:12:11 localhost dracut[4640]: *** Installing kernel module dependencies *** 7月 12 14:12:12 localhost dracut[4640]: *** Installing kernel module dependencies done *** 7月 12 14:12:12 localhost dracut[4640]: *** Resolving executable dependencies *** 7月 12 14:12:12 localhost login[880]: pam_unix(login:session): session opened for user root(uid=0) by LOGIN(uid=0) 7月 12 14:12:12 localhost login[880]: ROOT LOGIN ON tty1 7月 12 14:12:13 localhost dracut[4640]: *** Resolving executable dependencies done *** 7月 12 14:12:13 localhost dracut[4640]: *** Hardlinking files *** 7月 12 14:12:13 localhost dracut[4640]: Mode: real 7月 12 14:12:13 localhost dracut[4640]: Files: 477 7月 12 14:12:13 localhost dracut[4640]: Linked: 1 files 7月 12 14:12:13 localhost dracut[4640]: Compared: 0 xattrs 7月 12 14:12:13 localhost dracut[4640]: Compared: 24 files 7月 12 14:12:13 localhost dracut[4640]: Saved: 339.72 KiB 7月 12 14:12:13 localhost dracut[4640]: Duration: 0.005525 seconds 7月 12 14:12:13 localhost dracut[4640]: *** Hardlinking files done *** 7月 12 14:12:13 localhost dracut[4640]: Could not find 'strip'. Not stripping the initramfs. 7月 12 14:12:13 localhost dracut[4640]: *** Generating early-microcode cpio image *** 7月 12 14:12:13 localhost dracut[4640]: *** Store current command line parameters *** 7月 12 14:12:13 localhost dracut[4640]: Stored kernel commandline: 7月 12 14:12:13 localhost dracut[4640]: rd.lvm.lv=openeuler/root 7月 12 14:12:13 localhost dracut[4640]: *** Install squash loader *** 7月 12 14:12:14 localhost dracut[4640]: *** Squashing the files inside the initramfs *** 7月 12 14:12:15 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 14:12:24 localhost NetworkManager[858]: [1689142344.6273] policy: set-hostname: set hostname to 'localhost.localdomain' (no hostname found) 7月 12 14:12:24 localhost.localdomain systemd-hostnamed[867]: Hostname set to (transient) 7月 12 14:12:24 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 14:12:24 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 14:12:24 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 14:12:24 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 14:12:26 localhost.localdomain dracut[4640]: *** Squashing the files inside the initramfs done *** 7月 12 14:12:26 localhost.localdomain dracut[4640]: *** Creating image file '/boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img' *** 7月 12 14:12:26 localhost.localdomain dracut[4640]: *** Creating initramfs image file '/boot/initramfs-6.1.8-3.0.0.8.oe1.x86_64kdump.img' done *** 7月 12 14:12:27 localhost.localdomain kdumpctl[3800]: kexec: loaded kdump kernel 7月 12 14:12:27 localhost.localdomain kdumpctl[3800]: Starting kdump: [OK] 7月 12 14:12:27 localhost.localdomain systemd[1]: Finished Crash recovery kernel arming. 7月 12 14:12:27 localhost.localdomain systemd[1]: Startup finished in 2.152s (kernel) + 4.173s (initrd) + 37.266s (userspace) = 43.592s. 7月 12 14:12:35 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 14:12:54 localhost.localdomain systemd[1]: systemd-hostnamed.service: Deactivated successfully. 7月 12 14:13:04 localhost.localdomain systemd[1]: pcscd.service: Deactivated successfully. 7月 12 14:13:16 localhost.localdomain sshd[8176]: Connection from 172.168.131.111 port 39478 on 172.168.178.232 port 22 rdomain "" 7月 12 14:13:24 localhost.localdomain sshd[8176]: Accepted password for root from 172.168.131.111 port 39478 ssh2 7月 12 14:13:24 localhost.localdomain sshd[8176]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) 7月 12 14:13:24 localhost.localdomain sshd[8176]: User child is on pid 8180 7月 12 14:13:24 localhost.localdomain sshd[8180]: Starting session: shell on pts/0 for root from 172.168.131.111 port 39478 id 0 7月 12 14:13:24 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.13' (uid=0 pid=8184 comm="/usr/bin/hostnamectl --transient" label="unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023") 7月 12 14:13:24 localhost.localdomain systemd[1]: Starting Hostname Service... 7月 12 14:13:24 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.hostname1' 7月 12 14:13:24 localhost.localdomain systemd[1]: Started Hostname Service. 7月 12 14:13:54 localhost.localdomain systemd[1]: systemd-hostnamed.service: Deactivated successfully. 7月 12 14:17:12 localhost.localdomain login[880]: pam_unix(login:session): session closed for user root 7月 12 14:17:12 localhost.localdomain systemd[1]: getty@tty1.service: Deactivated successfully. 7月 12 14:17:12 localhost.localdomain systemd[1]: getty@tty1.service: Scheduled restart job, restart counter is at 1. 7月 12 14:17:12 localhost.localdomain systemd[1]: Stopped Getty on tty1. 7月 12 14:17:12 localhost.localdomain systemd[1]: Started Getty on tty1. 7月 12 14:25:49 localhost.localdomain sshd[8180]: Received disconnect from 172.168.131.111 port 39478:11: disconnected by user 7月 12 14:25:49 localhost.localdomain sshd[8180]: Disconnected from user root 172.168.131.111 port 39478 7月 12 14:25:49 localhost.localdomain sshd[8176]: pam_unix(sshd:session): session closed for user root 7月 12 14:27:33 localhost.localdomain systemd[1]: Starting Cleanup of Temporary Directories... 7月 12 14:27:33 localhost.localdomain systemd-tmpfiles[8269]: /usr/lib/tmpfiles.d/dbus.conf:13: Line references path below legacy directory /var/run/, updating /var/run/dbus/containers → /run/dbus/containers; please update the tmpfiles.d/ drop-in file accordingly. 7月 12 14:27:33 localhost.localdomain systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. 7月 12 14:27:33 localhost.localdomain systemd[1]: Finished Cleanup of Temporary Directories. 7月 12 14:36:33 localhost.localdomain systemd[1]: Starting dnf makecache... 7月 12 14:36:33 localhost.localdomain dnf[8280]: Failed determining last makecache time. 7月 12 14:36:34 localhost.localdomain dnf[8280]: OS 5.8 MB/s | 2.7 MB 00:00 7月 12 14:36:35 localhost.localdomain dnf[8280]: everything 8.0 MB/s | 9.1 MB 00:01 7月 12 14:36:38 localhost.localdomain dnf[8280]: EPOL 1.8 MB/s | 911 kB 00:00 7月 12 14:36:39 localhost.localdomain dnf[8280]: debuginfo 3.7 MB/s | 2.8 MB 00:00 7月 12 14:36:40 localhost.localdomain dnf[8280]: source 2.0 MB/s | 816 kB 00:00 7月 12 14:36:42 localhost.localdomain dnf[8280]: update 9.2 MB/s | 17 MB 00:01 7月 12 14:36:47 localhost.localdomain dnf[8280]: Metadata cache created. 7月 12 14:36:47 localhost.localdomain systemd[1]: dnf-makecache.service: Deactivated successfully. 7月 12 14:36:47 localhost.localdomain systemd[1]: Finished dnf makecache. 7月 12 14:38:33 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 14:38:33 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 14:38:33 localhost.localdomain NetworkManager[858]: [1689143913.0804] dhcp4 (ens3): address 172.168.178.232 7月 12 14:38:33 localhost.localdomain NetworkManager[858]: [1689143913.0810] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 14:38:33 localhost.localdomain NetworkManager[858]: [1689143913.0810] dhcp4 (ens3): gateway 172.168.131.111 7月 12 14:38:33 localhost.localdomain NetworkManager[858]: [1689143913.0811] dhcp4 (ens3): lease time 3600 7月 12 14:38:33 localhost.localdomain NetworkManager[858]: [1689143913.0811] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 14:38:33 localhost.localdomain NetworkManager[858]: [1689143913.0811] dhcp4 (ens3): state changed bound -> extended, address=172.168.178.232 7月 12 14:38:33 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 14:38:33 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 14:38:33 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 14:38:33 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 14:38:33 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1569 seconds. 7月 12 14:38:43 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 14:44:37 localhost.localdomain chronyd[813]: Source 119.28.206.193 replaced with 193.182.111.12 (pool.ntp.org) 7月 12 15:01:01 localhost.localdomain CROND[8343]: (root) CMD (run-parts /etc/cron.hourly) 7月 12 15:01:01 localhost.localdomain run-parts[8346]: (/etc/cron.hourly) starting 0anacron 7月 12 15:01:01 localhost.localdomain anacron[8354]: Anacron started on 2023-07-12 7月 12 15:01:01 localhost.localdomain anacron[8354]: Will run job `cron.daily' in 17 min. 7月 12 15:01:01 localhost.localdomain anacron[8354]: Will run job `cron.weekly' in 37 min. 7月 12 15:01:01 localhost.localdomain anacron[8354]: Will run job `cron.monthly' in 57 min. 7月 12 15:01:01 localhost.localdomain anacron[8354]: Jobs will be executed sequentially 7月 12 15:01:01 localhost.localdomain run-parts[8356]: (/etc/cron.hourly) finished 0anacron 7月 12 15:01:01 localhost.localdomain CROND[8342]: (root) CMDEND (run-parts /etc/cron.hourly) 7月 12 15:04:42 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 15:04:42 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 15:04:42 localhost.localdomain NetworkManager[858]: [1689145482.6152] dhcp4 (ens3): address 172.168.178.232 7月 12 15:04:42 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 15:04:42 localhost.localdomain NetworkManager[858]: [1689145482.6155] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 15:04:42 localhost.localdomain NetworkManager[858]: [1689145482.6155] dhcp4 (ens3): gateway 172.168.131.111 7月 12 15:04:42 localhost.localdomain NetworkManager[858]: [1689145482.6155] dhcp4 (ens3): lease time 3600 7月 12 15:04:42 localhost.localdomain NetworkManager[858]: [1689145482.6155] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 15:04:42 localhost.localdomain NetworkManager[858]: [1689145482.6156] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 15:04:42 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 15:04:42 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 15:04:42 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 15:04:42 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1379 seconds. 7月 12 15:04:53 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 15:18:01 localhost.localdomain anacron[8354]: Job `cron.daily' started 7月 12 15:18:01 localhost.localdomain run-parts[8388]: (/etc/cron.daily) starting logrotate 7月 12 15:18:01 localhost.localdomain run-parts[8393]: (/etc/cron.daily) finished logrotate 7月 12 15:18:01 localhost.localdomain run-parts[8395]: (/etc/cron.daily) starting man-db.cron 7月 12 15:18:02 localhost.localdomain run-parts[8404]: (/etc/cron.daily) finished man-db.cron 7月 12 15:18:02 localhost.localdomain run-parts[8406]: (/etc/cron.daily) starting rpm 7月 12 15:18:03 localhost.localdomain run-parts[8415]: (/etc/cron.daily) finished rpm 7月 12 15:18:03 localhost.localdomain anacron[8354]: Job `cron.daily' terminated 7月 12 15:27:41 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 15:27:41 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 15:27:41 localhost.localdomain NetworkManager[858]: [1689146861.9849] dhcp4 (ens3): address 172.168.178.232 7月 12 15:27:41 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 15:27:41 localhost.localdomain NetworkManager[858]: [1689146861.9850] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 15:27:41 localhost.localdomain NetworkManager[858]: [1689146861.9850] dhcp4 (ens3): gateway 172.168.131.111 7月 12 15:27:41 localhost.localdomain NetworkManager[858]: [1689146861.9851] dhcp4 (ens3): lease time 3600 7月 12 15:27:41 localhost.localdomain NetworkManager[858]: [1689146861.9851] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 15:27:41 localhost.localdomain NetworkManager[858]: [1689146861.9851] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 15:27:41 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 15:27:42 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 15:27:42 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 15:27:42 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1427 seconds. 7月 12 15:27:52 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 15:38:01 localhost.localdomain anacron[8354]: Job `cron.weekly' started 7月 12 15:38:01 localhost.localdomain anacron[8354]: Job `cron.weekly' terminated 7月 12 15:49:33 localhost.localdomain systemd[1]: Starting dnf makecache... 7月 12 15:49:33 localhost.localdomain dnf[8458]: Metadata cache refreshed recently. 7月 12 15:49:33 localhost.localdomain systemd[1]: dnf-makecache.service: Deactivated successfully. 7月 12 15:49:33 localhost.localdomain systemd[1]: Finished dnf makecache. 7月 12 15:51:29 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 15:51:30 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 15:51:30 localhost.localdomain NetworkManager[858]: [1689148290.0530] dhcp4 (ens3): address 172.168.178.232 7月 12 15:51:30 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 15:51:30 localhost.localdomain NetworkManager[858]: [1689148290.0534] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 15:51:30 localhost.localdomain NetworkManager[858]: [1689148290.0534] dhcp4 (ens3): gateway 172.168.131.111 7月 12 15:51:30 localhost.localdomain NetworkManager[858]: [1689148290.0534] dhcp4 (ens3): lease time 3600 7月 12 15:51:30 localhost.localdomain NetworkManager[858]: [1689148290.0535] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 15:51:30 localhost.localdomain NetworkManager[858]: [1689148290.0535] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 15:51:30 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 15:51:30 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 15:51:30 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 15:51:30 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1790 seconds. 7月 12 15:51:40 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 15:57:48 localhost.localdomain chronyd[813]: Source 162.159.200.1 replaced with 202.112.31.197 (pool.ntp.org) 7月 12 15:58:01 localhost.localdomain anacron[8354]: Job `cron.monthly' started 7月 12 15:58:01 localhost.localdomain anacron[8354]: Job `cron.monthly' terminated 7月 12 15:58:01 localhost.localdomain anacron[8354]: Normal exit (3 jobs run) 7月 12 16:01:01 localhost.localdomain CROND[8491]: (root) CMD (run-parts /etc/cron.hourly) 7月 12 16:01:01 localhost.localdomain run-parts[8494]: (/etc/cron.hourly) starting 0anacron 7月 12 16:01:01 localhost.localdomain run-parts[8500]: (/etc/cron.hourly) finished 0anacron 7月 12 16:01:01 localhost.localdomain CROND[8490]: (root) CMDEND (run-parts /etc/cron.hourly) 7月 12 16:21:20 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 16:21:20 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 16:21:20 localhost.localdomain NetworkManager[858]: [1689150080.1448] dhcp4 (ens3): address 172.168.178.232 7月 12 16:21:20 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 16:21:20 localhost.localdomain NetworkManager[858]: [1689150080.1449] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 16:21:20 localhost.localdomain NetworkManager[858]: [1689150080.1449] dhcp4 (ens3): gateway 172.168.131.111 7月 12 16:21:20 localhost.localdomain NetworkManager[858]: [1689150080.1450] dhcp4 (ens3): lease time 3600 7月 12 16:21:20 localhost.localdomain NetworkManager[858]: [1689150080.1450] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 16:21:20 localhost.localdomain NetworkManager[858]: [1689150080.1450] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 16:21:20 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 16:21:20 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 16:21:20 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 16:21:20 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1478 seconds. 7月 12 16:21:30 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 16:32:18 localhost.localdomain chronyd[813]: Source 84.16.73.33 replaced with 162.159.200.1 (pool.ntp.org) 7月 12 16:45:58 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 16:45:59 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 16:45:59 localhost.localdomain NetworkManager[858]: [1689151559.1751] dhcp4 (ens3): address 172.168.178.232 7月 12 16:45:59 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 16:45:59 localhost.localdomain NetworkManager[858]: [1689151559.1753] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 16:45:59 localhost.localdomain NetworkManager[858]: [1689151559.1753] dhcp4 (ens3): gateway 172.168.131.111 7月 12 16:45:59 localhost.localdomain NetworkManager[858]: [1689151559.1753] dhcp4 (ens3): lease time 3600 7月 12 16:45:59 localhost.localdomain NetworkManager[858]: [1689151559.1754] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 16:45:59 localhost.localdomain NetworkManager[858]: [1689151559.1754] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 16:45:59 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 16:45:59 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 16:45:59 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 16:45:59 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1445 seconds. 7月 12 16:46:09 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 17:01:01 localhost.localdomain CROND[8579]: (root) CMD (run-parts /etc/cron.hourly) 7月 12 17:01:01 localhost.localdomain run-parts[8582]: (/etc/cron.hourly) starting 0anacron 7月 12 17:01:01 localhost.localdomain run-parts[8588]: (/etc/cron.hourly) finished 0anacron 7月 12 17:01:01 localhost.localdomain CROND[8578]: (root) CMDEND (run-parts /etc/cron.hourly) 7月 12 17:02:39 localhost.localdomain chronyd[813]: Source 193.182.111.12 replaced with 139.199.215.251 (pool.ntp.org) 7月 12 17:02:44 localhost.localdomain sshd[8591]: Connection from 172.168.131.111 port 39480 on 172.168.178.232 port 22 rdomain "" 7月 12 17:02:49 localhost.localdomain sshd[8591]: Accepted password for root from 172.168.131.111 port 39480 ssh2 7月 12 17:02:49 localhost.localdomain sshd[8591]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) 7月 12 17:02:49 localhost.localdomain sshd[8591]: User child is on pid 8595 7月 12 17:02:49 localhost.localdomain sshd[8595]: Starting session: shell on pts/0 for root from 172.168.131.111 port 39480 id 0 7月 12 17:02:49 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.23' (uid=0 pid=8599 comm="/usr/bin/hostnamectl --transient" label="unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023") 7月 12 17:02:49 localhost.localdomain systemd[1]: Starting Hostname Service... 7月 12 17:02:49 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.hostname1' 7月 12 17:02:49 localhost.localdomain systemd[1]: Started Hostname Service. 7月 12 17:03:19 localhost.localdomain systemd[1]: systemd-hostnamed.service: Deactivated successfully. 7月 12 17:09:23 localhost.localdomain sshd[8595]: Received disconnect from 172.168.131.111 port 39480:11: disconnected by user 7月 12 17:09:23 localhost.localdomain sshd[8595]: Disconnected from user root 172.168.131.111 port 39480 7月 12 17:09:23 localhost.localdomain sshd[8591]: pam_unix(sshd:session): session closed for user root 7月 12 17:10:04 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 17:10:05 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 17:10:05 localhost.localdomain NetworkManager[858]: [1689153005.6263] dhcp4 (ens3): address 172.168.178.232 7月 12 17:10:05 localhost.localdomain NetworkManager[858]: [1689153005.6267] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 17:10:05 localhost.localdomain NetworkManager[858]: [1689153005.6267] dhcp4 (ens3): gateway 172.168.131.111 7月 12 17:10:05 localhost.localdomain NetworkManager[858]: [1689153005.6268] dhcp4 (ens3): lease time 3600 7月 12 17:10:05 localhost.localdomain NetworkManager[858]: [1689153005.6268] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 17:10:05 localhost.localdomain NetworkManager[858]: [1689153005.6268] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 17:10:05 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 17:10:05 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 17:10:05 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 17:10:05 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 17:10:05 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1749 seconds. 7月 12 17:10:16 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. 7月 12 17:16:33 localhost.localdomain systemd[1]: Starting dnf makecache... 7月 12 17:16:33 localhost.localdomain dnf[8697]: Metadata cache refreshed recently. 7月 12 17:16:33 localhost.localdomain systemd[1]: dnf-makecache.service: Deactivated successfully. 7月 12 17:16:33 localhost.localdomain systemd[1]: Finished dnf makecache. 7月 12 17:36:29 localhost.localdomain sshd[8710]: Connection from 172.168.131.111 port 39672 on 172.168.178.232 port 22 rdomain "" 7月 12 17:36:34 localhost.localdomain sshd[8710]: Accepted password for root from 172.168.131.111 port 39672 ssh2 7月 12 17:36:34 localhost.localdomain sshd[8710]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) 7月 12 17:36:34 localhost.localdomain sshd[8710]: User child is on pid 8714 7月 12 17:36:34 localhost.localdomain sshd[8714]: Starting session: shell on pts/0 for root from 172.168.131.111 port 39672 id 0 7月 12 17:36:34 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.27' (uid=0 pid=8718 comm="/usr/bin/hostnamectl --transient" label="unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023") 7月 12 17:36:34 localhost.localdomain systemd[1]: Starting Hostname Service... 7月 12 17:36:34 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.hostname1' 7月 12 17:36:34 localhost.localdomain systemd[1]: Started Hostname Service. 7月 12 17:37:04 localhost.localdomain systemd[1]: systemd-hostnamed.service: Deactivated successfully. 7月 12 17:39:14 localhost.localdomain dhclient[2539]: DHCPREQUEST for 172.168.178.232 on ens3 to 172.168.131.94 port 67 (xid=0xd5801516) 7月 12 17:39:15 localhost.localdomain dhclient[2539]: DHCPACK of 172.168.178.232 from 172.168.131.111 (xid=0xd5801516) 7月 12 17:39:15 localhost.localdomain NetworkManager[858]: [1689154755.3248] dhcp4 (ens3): address 172.168.178.232 7月 12 17:39:15 localhost.localdomain dbus-daemon[775]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.4' (uid=0 pid=858 comm="/usr/sbin/NetworkManager --no-daemon" label="system_u:system_r:NetworkManager_t:s0") 7月 12 17:39:15 localhost.localdomain NetworkManager[858]: [1689154755.3252] dhcp4 (ens3): plen 22 (255.255.252.0) 7月 12 17:39:15 localhost.localdomain NetworkManager[858]: [1689154755.3252] dhcp4 (ens3): gateway 172.168.131.111 7月 12 17:39:15 localhost.localdomain NetworkManager[858]: [1689154755.3253] dhcp4 (ens3): lease time 3600 7月 12 17:39:15 localhost.localdomain NetworkManager[858]: [1689154755.3253] dhcp4 (ens3): nameserver '114.114.114.114' 7月 12 17:39:15 localhost.localdomain NetworkManager[858]: [1689154755.3253] dhcp4 (ens3): state changed extended -> extended, address=172.168.178.232 7月 12 17:39:15 localhost.localdomain systemd[1]: Starting Network Manager Script Dispatcher Service... 7月 12 17:39:15 localhost.localdomain dbus-daemon[775]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 7月 12 17:39:15 localhost.localdomain systemd[1]: Started Network Manager Script Dispatcher Service. 7月 12 17:39:15 localhost.localdomain dhclient[2539]: bound to 172.168.178.232 -- renewal in 1392 seconds. 7月 12 17:39:25 localhost.localdomain systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully.