May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.619014] /usr/bin/kirk[27566]: cve-2017-1000405: start (command: thp04)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.641040] /usr/bin/kirk[27566]: cve-2017-1000405: end (returncode: 32)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.651683] /usr/bin/kirk[27566]: cve-2018-5803: start (command: sctp_big_chunk)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.680332] /usr/bin/kirk[27566]: cve-2018-5803: end (returncode: 32)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.691933] /usr/bin/kirk[27566]: cve-2018-6927: start (command: futex_cmp_requeue02)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.720987] /usr/bin/kirk[27566]: cve-2018-6927: end (returncode: 0)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.733676] /usr/bin/kirk[27566]: cve-2018-7566: start (command: snd_seq01)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.762603] /usr/bin/kirk[27566]: cve-2018-7566: end (returncode: 32)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.774080] /usr/bin/kirk[27566]: cve-2018-8897: start (command: ptrace09)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.805493] /usr/bin/kirk[27566]: cve-2018-8897: end (returncode: 0)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.818288] /usr/bin/kirk[27566]: cve-2018-9568: start (command: connect02)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.893356] /usr/bin/kirk[27566]: cve-2018-9568: end (returncode: 0)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.903623] /usr/bin/kirk[27566]: cve-2018-10124: start (command: kill13)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.933989] /usr/bin/kirk[27566]: cve-2018-10124: end (returncode: 32)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.946771] /usr/bin/kirk[27566]: cve-2018-11508: start (command: adjtimex03)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.977714] /usr/bin/kirk[27566]: cve-2018-11508: end (returncode: 0)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4727.990371] /usr/bin/kirk[27566]: cve-2018-12896: start (command: timer_settime03)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4728.022726] /usr/bin/kirk[27566]: cve-2018-12896: end (returncode: 0)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4728.035701] /usr/bin/kirk[27566]: cve-2018-18445: start (command: bpf_prog04)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4728.067371] /usr/bin/kirk[27566]: cve-2018-18445: end (returncode: 0)
May  6 13:34:36 qemux86-64 user.warn kernel: [ 4728.080174] /usr/bin/kirk[27566]: cve-2018-18559: start (command: bind06)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.869958] /usr/bin/kirk[27566]: cve-2018-18559: end (returncode: 0)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.875273] /usr/bin/kirk[27566]: cve-2018-18955: start (command: userns08)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.892047] /usr/bin/kirk[27566]: cve-2018-18955: end (returncode: 0)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.897198] /usr/bin/kirk[27566]: cve-2018-19854: start (command: crypto_user01)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.911273] /usr/bin/kirk[27566]: cve-2018-19854: end (returncode: 32)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.916512] /usr/bin/kirk[27566]: cve-2018-1000001: start (command: realpath01)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.929071] /usr/bin/kirk[27566]: cve-2018-1000001: end (returncode: 0)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.934233] /usr/bin/kirk[27566]: cve-2018-1000199: start (command: ptrace08)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.953437] /usr/bin/kirk[27566]: cve-2018-1000199: end (returncode: 0)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.962371] /usr/bin/kirk[27566]: cve-2018-1000204: start (command: ioctl_sg01)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.981801] /usr/bin/kirk[27566]: cve-2018-1000204: end (returncode: 32)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4728.992749] /usr/bin/kirk[27566]: cve-2019-8912: start (command: af_alg07)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.018624] /usr/bin/kirk[27566]: cve-2019-8912: end (returncode: 32)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.026229] /usr/bin/kirk[27566]: cve-2020-11494: start (command: pty04)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.055406] /usr/bin/kirk[27566]: cve-2020-11494: end (returncode: 32)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.068021] /usr/bin/kirk[27566]: cve-2020-14386: start (command: sendto03)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.105413] /usr/bin/kirk[27566]: cve-2020-14386: end (returncode: 0)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.117761] /usr/bin/kirk[27566]: cve-2020-14416: start (command: pty03)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.168302] /usr/bin/kirk[27566]: cve-2020-14416: end (returncode: 32)
May  6 13:34:37 qemux86-64 user.warn kernel: [ 4729.180770] /usr/bin/kirk[27566]: cve-2020-25705: start (command: icmp_rate_limit01)
May  6 13:34:41 qemux86-64 user.warn kernel: [ 4733.228766] /usr/bin/kirk[27566]: cve-2020-25705: end (returncode: 0)
May  6 13:34:41 qemux86-64 user.warn kernel: [ 4733.242235] /usr/bin/kirk[27566]: cve-2020-29373: start (command: io_uring02)
May  6 13:34:41 qemux86-64 user.warn kernel: [ 4733.274498] /usr/bin/kirk[27566]: cve-2020-29373: end (returncode: 0)
May  6 13:34:41 qemux86-64 user.warn kernel: [ 4733.287126] /usr/bin/kirk[27566]: cve-2021-3444: start (command: bpf_prog05)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.516792] /usr/bin/kirk[27566]: cve-2021-3444: end (returncode: 32)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.529955] /usr/bin/kirk[27566]: cve-2021-3609: start (command: can_bcm01)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.555720] /usr/bin/kirk[27566]: cve-2021-3609: end (returncode: 32)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.568434] /usr/bin/kirk[27566]: cve-2021-4034: start (command: execve06)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.601228] /usr/bin/kirk[27566]: cve-2021-4034: end (returncode: 0)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.614168] /usr/bin/kirk[27566]: cve-2021-4197_1: start (command: cgroup_core01)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.656515] /usr/bin/kirk[27566]: cve-2021-4197_1: end (returncode: 0)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.669370] /usr/bin/kirk[27566]: cve-2021-4197_2: start (command: cgroup_core02)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.703091] /usr/bin/kirk[27566]: cve-2021-4197_2: end (returncode: 32)
May  6 13:34:46 qemux86-64 user.warn kernel: [ 4737.715975] /usr/bin/kirk[27566]: cve-2021-4204: start (command: bpf_prog06)
May  6 13:34:50 qemux86-64 user.warn kernel: [ 4741.945070] /usr/bin/kirk[27566]: cve-2021-4204: end (returncode: 32)
May  6 13:34:50 qemux86-64 user.warn kernel: [ 4741.958064] /usr/bin/kirk[27566]: cve-2021-22555: start (command: setsockopt08 -i 100)
May  6 13:34:50 qemux86-64 user.warn kernel: [ 4741.995064] /usr/bin/kirk[27566]: cve-2021-22555: end (returncode: 32)
May  6 13:34:50 qemux86-64 user.warn kernel: [ 4742.008141] /usr/bin/kirk[27566]: cve-2021-26708: start (command: vsock01)
May  6 13:34:57 qemux86-64 daemon.warn connmand[558]: Interface ltp_ns_veth2 [ ethernet ] IPv4 online check to http://ipv4.connman.net/online/status.html failed: Invalid argument
May  6 13:35:42 qemux86-64 user.warn kernel: [ 4793.719043] /usr/bin/kirk[27566]: cve-2021-26708: end (returncode: 0)
May  6 13:35:42 qemux86-64 user.warn kernel: [ 4793.731983] /usr/bin/kirk[27566]: cve-2021-22600: start (command: setsockopt09)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.738289] /usr/bin/kirk[27566]: cve-2021-22600: end (returncode: 0)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.751463] /usr/bin/kirk[27566]: cve-2021-38604: start (command: mq_notify03)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.783421] /usr/bin/kirk[27566]: cve-2021-38604: end (returncode: 0)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.796445] /usr/bin/kirk[27566]: cve-2022-0847: start (command: dirtypipe)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.827420] /usr/bin/kirk[27566]: cve-2022-0847: end (returncode: 0)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.840073] /usr/bin/kirk[27566]: cve-2022-2590: start (command: dirtyc0w_shmem)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.876034] /usr/bin/kirk[27566]: cve-2022-2590: end (returncode: 32)
May  6 13:35:43 qemux86-64 user.warn kernel: [ 4794.888898] /usr/bin/kirk[27566]: cve-2022-23222: start (command: bpf_prog07)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.120898] /usr/bin/kirk[27566]: cve-2022-23222: end (returncode: 32)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.134427] /usr/bin/kirk[27566]: cve-2023-1829: start (command: tcindex01)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.165235] /usr/bin/kirk[27566]: cve-2023-1829: end (returncode: 32)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.178231] /usr/bin/kirk[27566]: cve-2023-0461: start (command: setsockopt10)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.207933] /usr/bin/kirk[27566]: cve-2023-0461: end (returncode: 32)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.220766] /usr/bin/kirk[27566]: cve-2023-31248: start (command: nft02)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.257076] /usr/bin/kirk[27566]: cve-2023-31248: end (returncode: 0)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.270000] /usr/bin/kirk[27566]: cve-2020-25704: start (command: perf_event_open03)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.301107] /usr/bin/kirk[27566]: cve-2020-25704: end (returncode: 32)
May  6 13:35:47 qemux86-64 user.warn kernel: [ 4799.314070] /usr/bin/kirk[27566]: cve-2022-0185: start (command: fsconfig03)
May  6 13:35:47 qemux86-64 kern.info kernel: [ 4799.357361] loop0: detected capacity change from 0 to 614400
May  6 13:35:47 qemux86-64 kern.err kernel: [ 4799.369903] /dev/zero: Can't lookup blockdev
May  6 13:35:47 qemux86-64 kern.err kernel: [ 4799.376692] /dev/zero: Can't lookup blockdev
May  6 13:35:47 qemux86-64 kern.err kernel: [ 4799.383017] /dev/zero: Can't lookup blockdev
May  6 13:35:47 qemux86-64 kern.err kernel: [ 4799.395144] /dev/zero: Can't lookup blockdev
May  6 13:35:48 qemux86-64 kern.err kernel: [ 4799.436569] operation not supported error, dev loop0, sector 614272 op 0x9:(WRITE_ZEROES) flags 0x20000800 phys_seg 0 prio class 2
May  6 13:35:48 qemux86-64 user.notice root: udev/mount.sh [/dev/loop0] is marked to ignore
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.673869] /usr/bin/kirk[27566]: cve-2022-0185: end (returncode: 0)
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.686886] /usr/bin/kirk[27566]: cve-2022-4378: start (command: cve-2022-4378)
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.720810] /usr/bin/kirk[27566]: cve-2022-4378: end (returncode: 0)
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.733039] /usr/bin/kirk[27566]: cve-2025-38236: start (command: cve-2025-38236)
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.767127] /usr/bin/kirk[27566]: cve-2025-38236: end (returncode: 0)
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.778891] /usr/bin/kirk[27566]: cve-2025-21756: start (command: cve-2025-21756)
May  6 13:35:48 qemux86-64 user.warn kernel: [ 4799.810502] /usr/bin/kirk[27566]: cve-2025-21756: end (returncode: 0)
May  6 13:35:48 qemux86-64 authpriv.info dropbear[27565]: Exit (root) from <192.168.7.1:41606>: Disconnect received
May  6 13:35:48 qemux86-64 authpriv.info dropbear[29670]: Child connection from 192.168.7.1:51020
May  6 13:35:48 qemux86-64 authpriv.notice dropbear[29670]: Auth succeeded with blank password for 'root' from 192.168.7.1:51020
May  6 13:35:48 qemux86-64 authpriv.info dropbear[29670]: Exit (root) from <192.168.7.1:51020>: Disconnect received
May  6 13:35:48 qemux86-64 authpriv.info dropbear[29672]: Child connection from 192.168.7.1:51034
May  6 13:35:48 qemux86-64 authpriv.notice dropbear[29672]: Auth succeeded with blank password for 'root' from 192.168.7.1:51034
May  6 13:35:48 qemux86-64 authpriv.info dropbear[29672]: Exit (root) from <192.168.7.1:51034>: Disconnect received
May  6 13:35:49 qemux86-64 authpriv.info dropbear[29674]: Child connection from 192.168.7.1:51048
May  6 13:35:49 qemux86-64 authpriv.notice dropbear[29674]: Auth succeeded with blank password for 'root' from 192.168.7.1:51048
May  6 13:35:50 qemux86-64 authpriv.info dropbear[29674]: Exit (root) from <192.168.7.1:51048>: Disconnect received
May  6 13:35:50 qemux86-64 authpriv.info dropbear[29960]: Child connection from 192.168.7.1:51062
May  6 13:35:50 qemux86-64 authpriv.notice dropbear[29960]: Auth succeeded with blank password for 'root' from 192.168.7.1:51062
May  6 13:35:55 qemux86-64 kern.info kernel: [ 4807.209869] mmap_6-1.run-te[30093]: segfault at 7f9f0d634000 ip 00005612564411e5 sp 00007ffc7b025d00 error 6 in mmap_6-1.run-test[11e5,561256441000+1000] likely on CPU 2 (core 2, socket 0)
May  6 13:35:55 qemux86-64 kern.info kernel: [ 4807.220560] Code: 65 01 00 00 45 31 c9 31 ff 41 89 e8 b9 01 00 00 00 ba 01 00 00 00 be 00 04 00 00 e8 a5 fe ff ff 48 83 f8 ff 0f 84 72 01 00 00 <c6> 00 62 31 c0 48 81 c4 18 10 00 00 5b 5d c3 ba 02 00 00 00 48 8d
May  6 13:35:55 qemux86-64 kern.info kernel: [ 4807.235908] mmap_6-2.run-te[30097]: segfault at 7efc19e6d000 ip 000055ff29ec529a sp 00007ffd575a6c80 error 4 in mmap_6-2.run-test[129a,55ff29ec5000+1000] likely on CPU 0 (core 0, socket 0)
May  6 13:35:55 qemux86-64 kern.info kernel: [ 4807.246370] Code: 00 0f 85 bb 00 00 00 45 31 c9 31 d2 31 ff 45 89 e0 b9 01 00 00 00 be 00 04 00 00 e8 00 fe ff ff 48 83 f8 ff 0f 84 41 01 00 00 <80> 38 61 0f 85 c2 00 00 00 31 c0 e9 77 ff ff ff e8 a1 fd ff ff 8b
May  6 13:35:55 qemux86-64 kern.info kernel: [ 4807.261629] mmap_6-3.run-te[30101]: segfault at 7fc2ef0f1000 ip 000055f6e87eb24c sp 00007ffdd05d8b60 error 6 in mmap_6-3.run-test[124c,55f6e87eb000+1000] likely on CPU 0 (core 0, socket 0)
May  6 13:35:55 qemux86-64 kern.info kernel: [ 4807.271791] Code: 18 10 00 00 5b 5d c3 45 31 c9 31 d2 31 ff 41 89 e8 b9 01 00 00 00 be 00 04 00 00 e8 3e fe ff ff 48 83 f8 ff 0f 84 af 00 00 00 <c6> 00 62 31 c0 eb cc 83 e1 7f 31 c0 bf 01 00 00 00 89 cb 41 89 c8
May  6 13:36:06 qemux86-64 authpriv.info dropbear[29960]: Exit (root) from <192.168.7.1:51062>: Disconnect received
May  6 13:36:07 qemux86-64 authpriv.info dropbear[31270]: Child connection from 192.168.7.1:42584
May  6 13:36:07 qemux86-64 authpriv.notice dropbear[31270]: Auth succeeded with blank password for 'root' from 192.168.7.1:42584
May  6 13:37:13 qemux86-64 authpriv.info dropbear[31270]: Exit (root) from <192.168.7.1:42584>: Disconnect received
May  6 13:37:13 qemux86-64 authpriv.info dropbear[31686]: Child connection from 192.168.7.1:50800
May  6 13:37:13 qemux86-64 authpriv.notice dropbear[31686]: Auth succeeded with blank password for 'root' from 192.168.7.1:50800
May  6 13:37:21 qemux86-64 daemon.warn connmand[558]: Interface ltp_ns_veth2 [ ethernet ] IPv4 online check to http://ipv4.connman.net/online/status.html failed: Invalid argument
May  6 13:37:28 qemux86-64 authpriv.info dropbear[31686]: Exit (root) from <192.168.7.1:50800>: Disconnect received
May  6 13:37:28 qemux86-64 authpriv.info dropbear[31920]: Child connection from 192.168.7.1:52400
May  6 13:37:28 qemux86-64 authpriv.notice dropbear[31920]: Auth succeeded with blank password for 'root' from 192.168.7.1:52400
May  6 13:39:45 qemux86-64 daemon.warn connmand[558]: Interface ltp_ns_veth2 [ ethernet ] IPv4 online check to http://ipv4.connman.net/online/status.html failed: Invalid argument
May  6 13:42:09 qemux86-64 daemon.warn connmand[558]: Interface ltp_ns_veth2 [ ethernet ] IPv4 online check to http://ipv4.connman.net/online/status.html failed: Invalid argument
May  6 13:43:39 qemux86-64 authpriv.info dropbear[31920]: Exit (root) from <192.168.7.1:52400>: Disconnect received
May  6 13:43:44 qemux86-64 authpriv.info dropbear[1501]: Child connection from 192.168.7.1:59790
May  6 13:43:44 qemux86-64 authpriv.notice dropbear[1501]: Auth succeeded with blank password for 'root' from 192.168.7.1:59790
May  6 13:43:44 qemux86-64 authpriv.info dropbear[1501]: Exit (root) from <192.168.7.1:59790>: Disconnect received
May  6 13:43:44 qemux86-64 authpriv.info dropbear[1503]: Child connection from 192.168.7.1:59792
May  6 13:43:44 qemux86-64 authpriv.notice dropbear[1503]: Auth succeeded with blank password for 'root' from 192.168.7.1:59792
May  6 13:43:44 qemux86-64 authpriv.info dropbear[1503]: Exit (root) from <192.168.7.1:59792>: Disconnect received
May  6 13:43:45 qemux86-64 authpriv.info dropbear[1505]: Child connection from 192.168.7.1:59800
May  6 13:43:45 qemux86-64 authpriv.notice dropbear[1505]: Auth succeeded with blank password for 'root' from 192.168.7.1:59800
May  6 13:43:45 qemux86-64 authpriv.info dropbear[1505]: Exit (root) from <192.168.7.1:59800>: Disconnect received
May  6 13:43:45 qemux86-64 authpriv.info dropbear[1507]: Child connection from 192.168.7.1:59812
May  6 13:43:45 qemux86-64 authpriv.notice dropbear[1507]: Auth succeeded with blank password for 'root' from 192.168.7.1:59812
May  6 13:43:45 qemux86-64 authpriv.info dropbear[1507]: Exit (root) from <192.168.7.1:59812>: Disconnect received
May  6 13:43:46 qemux86-64 authpriv.info dropbear[1509]: Child connection from 192.168.7.1:59816
May  6 13:43:46 qemux86-64 authpriv.notice dropbear[1509]: Auth succeeded with blank password for 'root' from 192.168.7.1:59816
May  6 13:43:46 qemux86-64 authpriv.info dropbear[1509]: Exit (root) from <192.168.7.1:59816>: Disconnect received
May  6 13:43:46 qemux86-64 authpriv.info dropbear[1511]: Child connection from 192.168.7.1:59828
May  6 13:43:46 qemux86-64 authpriv.notice dropbear[1511]: Auth succeeded with blank password for 'root' from 192.168.7.1:59828
May  6 13:43:46 qemux86-64 authpriv.info dropbear[1511]: Exit (root) from <192.168.7.1:59828>: Disconnect received
May  6 13:43:46 qemux86-64 authpriv.info dropbear[1513]: Child connection from 192.168.7.1:59840
May  6 13:43:46 qemux86-64 authpriv.notice dropbear[1513]: Auth succeeded with blank password for 'root' from 192.168.7.1:59840
