Oct 2 23:37:38.567674 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 23:37:38.567686 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 23:37:38.567693 kernel: BIOS-provided physical RAM map: Oct 2 23:37:38.567697 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Oct 2 23:37:38.567701 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Oct 2 23:37:38.567705 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Oct 2 23:37:38.567710 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Oct 2 23:37:38.567714 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Oct 2 23:37:38.567717 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000825d8fff] usable Oct 2 23:37:38.567721 kernel: BIOS-e820: [mem 0x00000000825d9000-0x00000000825d9fff] ACPI NVS Oct 2 23:37:38.567726 kernel: BIOS-e820: [mem 0x00000000825da000-0x00000000825dafff] reserved Oct 2 23:37:38.567730 kernel: BIOS-e820: [mem 0x00000000825db000-0x000000008afccfff] usable Oct 2 23:37:38.567734 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Oct 2 23:37:38.567738 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Oct 2 23:37:38.567743 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Oct 2 23:37:38.567748 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Oct 2 23:37:38.567753 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Oct 2 23:37:38.567757 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Oct 2 23:37:38.567761 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Oct 2 23:37:38.567765 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Oct 2 23:37:38.567770 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Oct 2 23:37:38.567774 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 2 23:37:38.567778 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Oct 2 23:37:38.567782 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Oct 2 23:37:38.567786 kernel: NX (Execute Disable) protection: active Oct 2 23:37:38.567791 kernel: SMBIOS 3.2.1 present. Oct 2 23:37:38.567796 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Oct 2 23:37:38.567800 kernel: tsc: Detected 3400.000 MHz processor Oct 2 23:37:38.567804 kernel: tsc: Detected 3399.906 MHz TSC Oct 2 23:37:38.567809 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 23:37:38.567814 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 23:37:38.567818 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Oct 2 23:37:38.567823 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 23:37:38.567827 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Oct 2 23:37:38.567831 kernel: Using GB pages for direct mapping Oct 2 23:37:38.567836 kernel: ACPI: Early table checksum verification disabled Oct 2 23:37:38.567841 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Oct 2 23:37:38.567845 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Oct 2 23:37:38.567850 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Oct 2 23:37:38.567854 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Oct 2 23:37:38.567861 kernel: ACPI: FACS 0x000000008C66CF80 000040 Oct 2 23:37:38.567865 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Oct 2 23:37:38.567871 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Oct 2 23:37:38.567876 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Oct 2 23:37:38.567880 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Oct 2 23:37:38.567885 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Oct 2 23:37:38.567890 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Oct 2 23:37:38.567895 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Oct 2 23:37:38.567899 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Oct 2 23:37:38.567904 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 23:37:38.567910 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Oct 2 23:37:38.567915 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Oct 2 23:37:38.567919 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 23:37:38.567924 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 23:37:38.567929 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Oct 2 23:37:38.567934 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Oct 2 23:37:38.567938 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 23:37:38.567943 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Oct 2 23:37:38.567948 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Oct 2 23:37:38.567953 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Oct 2 23:37:38.567958 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Oct 2 23:37:38.567963 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Oct 2 23:37:38.567967 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Oct 2 23:37:38.567972 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Oct 2 23:37:38.567977 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Oct 2 23:37:38.567982 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Oct 2 23:37:38.567986 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Oct 2 23:37:38.567992 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Oct 2 23:37:38.567997 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Oct 2 23:37:38.568001 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Oct 2 23:37:38.568006 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Oct 2 23:37:38.568011 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Oct 2 23:37:38.568016 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Oct 2 23:37:38.568020 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Oct 2 23:37:38.568025 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Oct 2 23:37:38.568030 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Oct 2 23:37:38.568035 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Oct 2 23:37:38.568040 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Oct 2 23:37:38.568045 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Oct 2 23:37:38.568049 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Oct 2 23:37:38.568054 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Oct 2 23:37:38.568059 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Oct 2 23:37:38.568063 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Oct 2 23:37:38.568068 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Oct 2 23:37:38.568074 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Oct 2 23:37:38.568078 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Oct 2 23:37:38.568083 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Oct 2 23:37:38.568088 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Oct 2 23:37:38.568092 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Oct 2 23:37:38.568097 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Oct 2 23:37:38.568102 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Oct 2 23:37:38.568107 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Oct 2 23:37:38.568111 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Oct 2 23:37:38.568117 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Oct 2 23:37:38.568121 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Oct 2 23:37:38.568126 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Oct 2 23:37:38.568131 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Oct 2 23:37:38.568135 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Oct 2 23:37:38.568140 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Oct 2 23:37:38.568145 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Oct 2 23:37:38.568150 kernel: No NUMA configuration found Oct 2 23:37:38.568154 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Oct 2 23:37:38.568160 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Oct 2 23:37:38.568185 kernel: Zone ranges: Oct 2 23:37:38.568190 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 23:37:38.568195 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 23:37:38.568200 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Oct 2 23:37:38.568222 kernel: Movable zone start for each node Oct 2 23:37:38.568227 kernel: Early memory node ranges Oct 2 23:37:38.568245 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Oct 2 23:37:38.568250 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Oct 2 23:37:38.568254 kernel: node 0: [mem 0x0000000040400000-0x00000000825d8fff] Oct 2 23:37:38.568260 kernel: node 0: [mem 0x00000000825db000-0x000000008afccfff] Oct 2 23:37:38.568264 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Oct 2 23:37:38.568269 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Oct 2 23:37:38.568274 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Oct 2 23:37:38.568278 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Oct 2 23:37:38.568283 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 23:37:38.568291 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Oct 2 23:37:38.568296 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Oct 2 23:37:38.568301 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Oct 2 23:37:38.568306 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Oct 2 23:37:38.568312 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Oct 2 23:37:38.568317 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Oct 2 23:37:38.568322 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Oct 2 23:37:38.568327 kernel: ACPI: PM-Timer IO Port: 0x1808 Oct 2 23:37:38.568332 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 2 23:37:38.568337 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 2 23:37:38.568342 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 2 23:37:38.568348 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 2 23:37:38.568353 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 2 23:37:38.568358 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 2 23:37:38.568362 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 2 23:37:38.568367 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 2 23:37:38.568372 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 2 23:37:38.568377 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 2 23:37:38.568382 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 2 23:37:38.568387 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 2 23:37:38.568393 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 2 23:37:38.568398 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 2 23:37:38.568403 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 2 23:37:38.568408 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 2 23:37:38.568413 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Oct 2 23:37:38.568418 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 23:37:38.568423 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 23:37:38.568427 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 23:37:38.568432 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 23:37:38.568438 kernel: TSC deadline timer available Oct 2 23:37:38.568443 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Oct 2 23:37:38.568448 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Oct 2 23:37:38.568453 kernel: Booting paravirtualized kernel on bare hardware Oct 2 23:37:38.568458 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 23:37:38.568463 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 2 23:37:38.568468 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Oct 2 23:37:38.568473 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Oct 2 23:37:38.568478 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 2 23:37:38.568483 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Oct 2 23:37:38.568488 kernel: Policy zone: Normal Oct 2 23:37:38.568494 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 23:37:38.568499 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 23:37:38.568504 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Oct 2 23:37:38.568509 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Oct 2 23:37:38.568514 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 23:37:38.568520 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 728000K reserved, 0K cma-reserved) Oct 2 23:37:38.568525 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 2 23:37:38.568530 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 23:37:38.568535 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 23:37:38.568540 kernel: rcu: Hierarchical RCU implementation. Oct 2 23:37:38.568546 kernel: rcu: RCU event tracing is enabled. Oct 2 23:37:38.568551 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 2 23:37:38.568556 kernel: Rude variant of Tasks RCU enabled. Oct 2 23:37:38.568561 kernel: Tracing variant of Tasks RCU enabled. Oct 2 23:37:38.568566 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 23:37:38.568572 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 2 23:37:38.568577 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Oct 2 23:37:38.568581 kernel: random: crng init done Oct 2 23:37:38.568586 kernel: Console: colour dummy device 80x25 Oct 2 23:37:38.568591 kernel: printk: console [tty0] enabled Oct 2 23:37:38.568596 kernel: printk: console [ttyS1] enabled Oct 2 23:37:38.568601 kernel: ACPI: Core revision 20210730 Oct 2 23:37:38.568606 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Oct 2 23:37:38.568611 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 23:37:38.568617 kernel: DMAR: Host address width 39 Oct 2 23:37:38.568622 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Oct 2 23:37:38.568627 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Oct 2 23:37:38.568632 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Oct 2 23:37:38.568637 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Oct 2 23:37:38.568641 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Oct 2 23:37:38.568646 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Oct 2 23:37:38.568651 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Oct 2 23:37:38.568656 kernel: x2apic enabled Oct 2 23:37:38.568662 kernel: Switched APIC routing to cluster x2apic. Oct 2 23:37:38.568667 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Oct 2 23:37:38.568672 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Oct 2 23:37:38.568677 kernel: CPU0: Thermal monitoring enabled (TM1) Oct 2 23:37:38.568682 kernel: process: using mwait in idle threads Oct 2 23:37:38.568687 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 23:37:38.568692 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 23:37:38.568697 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 23:37:38.568702 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 2 23:37:38.568708 kernel: Spectre V2 : Mitigation: Enhanced IBRS Oct 2 23:37:38.568713 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 23:37:38.568717 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 2 23:37:38.568722 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 2 23:37:38.568727 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 23:37:38.568732 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 23:37:38.568737 kernel: TAA: Mitigation: TSX disabled Oct 2 23:37:38.568742 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Oct 2 23:37:38.568747 kernel: SRBDS: Mitigation: Microcode Oct 2 23:37:38.568752 kernel: GDS: Vulnerable: No microcode Oct 2 23:37:38.568757 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 23:37:38.568762 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 23:37:38.568767 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 23:37:38.568772 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 23:37:38.568777 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 23:37:38.568782 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 23:37:38.568787 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 23:37:38.568792 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 23:37:38.568797 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Oct 2 23:37:38.568801 kernel: Freeing SMP alternatives memory: 32K Oct 2 23:37:38.568806 kernel: pid_max: default: 32768 minimum: 301 Oct 2 23:37:38.568811 kernel: LSM: Security Framework initializing Oct 2 23:37:38.568816 kernel: SELinux: Initializing. Oct 2 23:37:38.568822 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 23:37:38.568827 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 23:37:38.568831 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Oct 2 23:37:38.568836 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 2 23:37:38.568841 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Oct 2 23:37:38.568846 kernel: ... version: 4 Oct 2 23:37:38.568851 kernel: ... bit width: 48 Oct 2 23:37:38.568856 kernel: ... generic registers: 4 Oct 2 23:37:38.568861 kernel: ... value mask: 0000ffffffffffff Oct 2 23:37:38.568866 kernel: ... max period: 00007fffffffffff Oct 2 23:37:38.568872 kernel: ... fixed-purpose events: 3 Oct 2 23:37:38.568877 kernel: ... event mask: 000000070000000f Oct 2 23:37:38.568882 kernel: signal: max sigframe size: 2032 Oct 2 23:37:38.568886 kernel: rcu: Hierarchical SRCU implementation. Oct 2 23:37:38.568891 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Oct 2 23:37:38.568896 kernel: smp: Bringing up secondary CPUs ... Oct 2 23:37:38.568901 kernel: x86: Booting SMP configuration: Oct 2 23:37:38.568906 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Oct 2 23:37:38.568911 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 23:37:38.568917 kernel: #9 #10 #11 #12 #13 #14 #15 Oct 2 23:37:38.568922 kernel: smp: Brought up 1 node, 16 CPUs Oct 2 23:37:38.568927 kernel: smpboot: Max logical packages: 1 Oct 2 23:37:38.568932 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Oct 2 23:37:38.568937 kernel: devtmpfs: initialized Oct 2 23:37:38.568942 kernel: x86/mm: Memory block size: 128MB Oct 2 23:37:38.568947 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x825d9000-0x825d9fff] (4096 bytes) Oct 2 23:37:38.568952 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Oct 2 23:37:38.568958 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 23:37:38.568963 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 2 23:37:38.568968 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 23:37:38.568973 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 23:37:38.568978 kernel: audit: initializing netlink subsys (disabled) Oct 2 23:37:38.568983 kernel: audit: type=2000 audit(1696289853.040:1): state=initialized audit_enabled=0 res=1 Oct 2 23:37:38.568987 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 23:37:38.568992 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 23:37:38.568997 kernel: cpuidle: using governor menu Oct 2 23:37:38.569003 kernel: ACPI: bus type PCI registered Oct 2 23:37:38.569008 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 23:37:38.569013 kernel: dca service started, version 1.12.1 Oct 2 23:37:38.569018 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Oct 2 23:37:38.569023 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Oct 2 23:37:38.569028 kernel: PCI: Using configuration type 1 for base access Oct 2 23:37:38.569033 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Oct 2 23:37:38.569038 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 23:37:38.569043 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 23:37:38.569048 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 23:37:38.569053 kernel: ACPI: Added _OSI(Module Device) Oct 2 23:37:38.569058 kernel: ACPI: Added _OSI(Processor Device) Oct 2 23:37:38.569063 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 23:37:38.569068 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 23:37:38.569073 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 23:37:38.569078 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 23:37:38.569083 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 23:37:38.569088 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Oct 2 23:37:38.569094 kernel: ACPI: Dynamic OEM Table Load: Oct 2 23:37:38.569099 kernel: ACPI: SSDT 0xFFFF8BDE8020E300 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Oct 2 23:37:38.569104 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Oct 2 23:37:38.569109 kernel: ACPI: Dynamic OEM Table Load: Oct 2 23:37:38.569114 kernel: ACPI: SSDT 0xFFFF8BDE81AE4C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Oct 2 23:37:38.569118 kernel: ACPI: Dynamic OEM Table Load: Oct 2 23:37:38.569123 kernel: ACPI: SSDT 0xFFFF8BDE81A54000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Oct 2 23:37:38.569128 kernel: ACPI: Dynamic OEM Table Load: Oct 2 23:37:38.569133 kernel: ACPI: SSDT 0xFFFF8BDE81A54800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Oct 2 23:37:38.569138 kernel: ACPI: Dynamic OEM Table Load: Oct 2 23:37:38.569143 kernel: ACPI: SSDT 0xFFFF8BDE8014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Oct 2 23:37:38.569148 kernel: ACPI: Dynamic OEM Table Load: Oct 2 23:37:38.569153 kernel: ACPI: SSDT 0xFFFF8BDE81AE4400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Oct 2 23:37:38.569158 kernel: ACPI: Interpreter enabled Oct 2 23:37:38.569165 kernel: ACPI: PM: (supports S0 S5) Oct 2 23:37:38.569170 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 23:37:38.569193 kernel: HEST: Enabling Firmware First mode for corrected errors. Oct 2 23:37:38.569198 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Oct 2 23:37:38.569203 kernel: HEST: Table parsing has been initialized. Oct 2 23:37:38.569209 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Oct 2 23:37:38.569214 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 23:37:38.569219 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Oct 2 23:37:38.569238 kernel: ACPI: PM: Power Resource [USBC] Oct 2 23:37:38.569243 kernel: ACPI: PM: Power Resource [V0PR] Oct 2 23:37:38.569248 kernel: ACPI: PM: Power Resource [V1PR] Oct 2 23:37:38.569253 kernel: ACPI: PM: Power Resource [V2PR] Oct 2 23:37:38.569258 kernel: ACPI: PM: Power Resource [WRST] Oct 2 23:37:38.569263 kernel: ACPI: PM: Power Resource [FN00] Oct 2 23:37:38.569268 kernel: ACPI: PM: Power Resource [FN01] Oct 2 23:37:38.569273 kernel: ACPI: PM: Power Resource [FN02] Oct 2 23:37:38.569278 kernel: ACPI: PM: Power Resource [FN03] Oct 2 23:37:38.569283 kernel: ACPI: PM: Power Resource [FN04] Oct 2 23:37:38.569288 kernel: ACPI: PM: Power Resource [PIN] Oct 2 23:37:38.569293 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Oct 2 23:37:38.569356 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 23:37:38.569400 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Oct 2 23:37:38.569442 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Oct 2 23:37:38.569449 kernel: PCI host bridge to bus 0000:00 Oct 2 23:37:38.569491 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 23:37:38.569528 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 23:37:38.569563 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 23:37:38.569598 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Oct 2 23:37:38.569633 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Oct 2 23:37:38.569670 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Oct 2 23:37:38.569720 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Oct 2 23:37:38.569769 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Oct 2 23:37:38.569811 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.569856 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Oct 2 23:37:38.569897 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Oct 2 23:37:38.569943 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Oct 2 23:37:38.569984 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Oct 2 23:37:38.570029 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Oct 2 23:37:38.570071 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Oct 2 23:37:38.570112 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Oct 2 23:37:38.570158 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Oct 2 23:37:38.570237 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Oct 2 23:37:38.570277 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Oct 2 23:37:38.570323 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Oct 2 23:37:38.570364 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 23:37:38.570410 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Oct 2 23:37:38.570451 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 23:37:38.570494 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Oct 2 23:37:38.570537 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Oct 2 23:37:38.570577 kernel: pci 0000:00:16.0: PME# supported from D3hot Oct 2 23:37:38.570621 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Oct 2 23:37:38.570661 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Oct 2 23:37:38.570701 kernel: pci 0000:00:16.1: PME# supported from D3hot Oct 2 23:37:38.570744 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Oct 2 23:37:38.570786 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Oct 2 23:37:38.570826 kernel: pci 0000:00:16.4: PME# supported from D3hot Oct 2 23:37:38.570869 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Oct 2 23:37:38.570909 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Oct 2 23:37:38.570948 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Oct 2 23:37:38.570988 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Oct 2 23:37:38.571027 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Oct 2 23:37:38.571074 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Oct 2 23:37:38.571115 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Oct 2 23:37:38.571156 kernel: pci 0000:00:17.0: PME# supported from D3hot Oct 2 23:37:38.571223 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Oct 2 23:37:38.571278 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.571322 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Oct 2 23:37:38.571363 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.571411 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Oct 2 23:37:38.571452 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.571497 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Oct 2 23:37:38.571537 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.571582 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Oct 2 23:37:38.571624 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.571669 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Oct 2 23:37:38.571710 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 23:37:38.571756 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Oct 2 23:37:38.571802 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Oct 2 23:37:38.571842 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Oct 2 23:37:38.571883 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Oct 2 23:37:38.571928 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Oct 2 23:37:38.571969 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Oct 2 23:37:38.572014 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Oct 2 23:37:38.572059 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Oct 2 23:37:38.572102 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Oct 2 23:37:38.572143 kernel: pci 0000:01:00.0: PME# supported from D3cold Oct 2 23:37:38.572209 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 23:37:38.572270 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 23:37:38.572317 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Oct 2 23:37:38.572358 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Oct 2 23:37:38.572402 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Oct 2 23:37:38.572444 kernel: pci 0000:01:00.1: PME# supported from D3cold Oct 2 23:37:38.572485 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 23:37:38.572526 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 23:37:38.572568 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 23:37:38.572609 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Oct 2 23:37:38.572650 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 23:37:38.572690 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Oct 2 23:37:38.572737 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Oct 2 23:37:38.572780 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Oct 2 23:37:38.572821 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Oct 2 23:37:38.572864 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Oct 2 23:37:38.572905 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.573001 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Oct 2 23:37:38.573041 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 23:37:38.573085 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 23:37:38.573130 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Oct 2 23:37:38.573196 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Oct 2 23:37:38.573260 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Oct 2 23:37:38.573301 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Oct 2 23:37:38.573346 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Oct 2 23:37:38.573387 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Oct 2 23:37:38.573428 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 23:37:38.573470 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 23:37:38.573511 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Oct 2 23:37:38.573557 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Oct 2 23:37:38.573600 kernel: pci 0000:06:00.0: enabling Extended Tags Oct 2 23:37:38.573642 kernel: pci 0000:06:00.0: supports D1 D2 Oct 2 23:37:38.573685 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 23:37:38.573725 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Oct 2 23:37:38.573766 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Oct 2 23:37:38.573808 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Oct 2 23:37:38.573855 kernel: pci_bus 0000:07: extended config space not accessible Oct 2 23:37:38.573904 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Oct 2 23:37:38.573948 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Oct 2 23:37:38.573992 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Oct 2 23:37:38.574037 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Oct 2 23:37:38.574081 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 23:37:38.574126 kernel: pci 0000:07:00.0: supports D1 D2 Oct 2 23:37:38.574173 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 23:37:38.574261 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Oct 2 23:37:38.574302 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Oct 2 23:37:38.574344 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 23:37:38.574351 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Oct 2 23:37:38.574357 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Oct 2 23:37:38.574364 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Oct 2 23:37:38.574369 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Oct 2 23:37:38.574374 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Oct 2 23:37:38.574380 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Oct 2 23:37:38.574385 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Oct 2 23:37:38.574390 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Oct 2 23:37:38.574395 kernel: iommu: Default domain type: Translated Oct 2 23:37:38.574401 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 23:37:38.574444 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Oct 2 23:37:38.574489 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 23:37:38.574533 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Oct 2 23:37:38.574541 kernel: vgaarb: loaded Oct 2 23:37:38.574546 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 23:37:38.574552 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 23:37:38.574557 kernel: PTP clock support registered Oct 2 23:37:38.574563 kernel: PCI: Using ACPI for IRQ routing Oct 2 23:37:38.574568 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 23:37:38.574573 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Oct 2 23:37:38.574580 kernel: e820: reserve RAM buffer [mem 0x825d9000-0x83ffffff] Oct 2 23:37:38.574585 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Oct 2 23:37:38.574590 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Oct 2 23:37:38.574595 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Oct 2 23:37:38.574600 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Oct 2 23:37:38.574605 kernel: clocksource: Switched to clocksource tsc-early Oct 2 23:37:38.574610 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 23:37:38.574616 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 23:37:38.574621 kernel: pnp: PnP ACPI init Oct 2 23:37:38.574663 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Oct 2 23:37:38.574705 kernel: pnp 00:02: [dma 0 disabled] Oct 2 23:37:38.574745 kernel: pnp 00:03: [dma 0 disabled] Oct 2 23:37:38.574786 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Oct 2 23:37:38.574824 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Oct 2 23:37:38.574864 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Oct 2 23:37:38.574906 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Oct 2 23:37:38.574943 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Oct 2 23:37:38.574979 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Oct 2 23:37:38.575016 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Oct 2 23:37:38.575052 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Oct 2 23:37:38.575088 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Oct 2 23:37:38.575124 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Oct 2 23:37:38.575165 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Oct 2 23:37:38.575249 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Oct 2 23:37:38.575287 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Oct 2 23:37:38.575323 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Oct 2 23:37:38.575360 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Oct 2 23:37:38.575395 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Oct 2 23:37:38.575431 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Oct 2 23:37:38.575470 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Oct 2 23:37:38.575510 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Oct 2 23:37:38.575518 kernel: pnp: PnP ACPI: found 10 devices Oct 2 23:37:38.575524 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 23:37:38.575529 kernel: NET: Registered PF_INET protocol family Oct 2 23:37:38.575534 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 23:37:38.575540 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 23:37:38.575545 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 23:37:38.575552 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 23:37:38.575557 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 23:37:38.575562 kernel: TCP: Hash tables configured (established 262144 bind 65536) Oct 2 23:37:38.575568 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 23:37:38.575573 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 23:37:38.575578 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 23:37:38.575584 kernel: NET: Registered PF_XDP protocol family Oct 2 23:37:38.575626 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Oct 2 23:37:38.575668 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Oct 2 23:37:38.575709 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Oct 2 23:37:38.575750 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 23:37:38.575793 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 23:37:38.575836 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 23:37:38.575878 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 23:37:38.575918 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 23:37:38.575959 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Oct 2 23:37:38.576001 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 23:37:38.576041 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Oct 2 23:37:38.576082 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Oct 2 23:37:38.576122 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 23:37:38.576164 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 23:37:38.576247 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Oct 2 23:37:38.576286 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 23:37:38.576328 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 23:37:38.576368 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Oct 2 23:37:38.576410 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Oct 2 23:37:38.576451 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Oct 2 23:37:38.576493 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 23:37:38.576533 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Oct 2 23:37:38.576574 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Oct 2 23:37:38.576617 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Oct 2 23:37:38.576653 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Oct 2 23:37:38.576690 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 23:37:38.576725 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 23:37:38.576760 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 23:37:38.576795 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Oct 2 23:37:38.576831 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Oct 2 23:37:38.576872 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Oct 2 23:37:38.576912 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 23:37:38.576955 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Oct 2 23:37:38.576993 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Oct 2 23:37:38.577035 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Oct 2 23:37:38.577073 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Oct 2 23:37:38.577114 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Oct 2 23:37:38.577153 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Oct 2 23:37:38.577216 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Oct 2 23:37:38.577277 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Oct 2 23:37:38.577285 kernel: PCI: CLS 64 bytes, default 64 Oct 2 23:37:38.577290 kernel: DMAR: No ATSR found Oct 2 23:37:38.577296 kernel: DMAR: No SATC found Oct 2 23:37:38.577301 kernel: DMAR: dmar0: Using Queued invalidation Oct 2 23:37:38.577340 kernel: pci 0000:00:00.0: Adding to iommu group 0 Oct 2 23:37:38.577383 kernel: pci 0000:00:01.0: Adding to iommu group 1 Oct 2 23:37:38.577424 kernel: pci 0000:00:08.0: Adding to iommu group 2 Oct 2 23:37:38.577466 kernel: pci 0000:00:12.0: Adding to iommu group 3 Oct 2 23:37:38.577506 kernel: pci 0000:00:14.0: Adding to iommu group 4 Oct 2 23:37:38.577546 kernel: pci 0000:00:14.2: Adding to iommu group 4 Oct 2 23:37:38.577586 kernel: pci 0000:00:15.0: Adding to iommu group 5 Oct 2 23:37:38.577625 kernel: pci 0000:00:15.1: Adding to iommu group 5 Oct 2 23:37:38.577666 kernel: pci 0000:00:16.0: Adding to iommu group 6 Oct 2 23:37:38.577707 kernel: pci 0000:00:16.1: Adding to iommu group 6 Oct 2 23:37:38.577747 kernel: pci 0000:00:16.4: Adding to iommu group 6 Oct 2 23:37:38.577787 kernel: pci 0000:00:17.0: Adding to iommu group 7 Oct 2 23:37:38.577828 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Oct 2 23:37:38.577869 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Oct 2 23:37:38.577910 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Oct 2 23:37:38.577950 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Oct 2 23:37:38.577991 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Oct 2 23:37:38.578032 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Oct 2 23:37:38.578073 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Oct 2 23:37:38.578114 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Oct 2 23:37:38.578153 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Oct 2 23:37:38.578215 kernel: pci 0000:01:00.0: Adding to iommu group 1 Oct 2 23:37:38.578276 kernel: pci 0000:01:00.1: Adding to iommu group 1 Oct 2 23:37:38.578318 kernel: pci 0000:03:00.0: Adding to iommu group 15 Oct 2 23:37:38.578361 kernel: pci 0000:04:00.0: Adding to iommu group 16 Oct 2 23:37:38.578404 kernel: pci 0000:06:00.0: Adding to iommu group 17 Oct 2 23:37:38.578448 kernel: pci 0000:07:00.0: Adding to iommu group 17 Oct 2 23:37:38.578456 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Oct 2 23:37:38.578462 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 23:37:38.578467 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Oct 2 23:37:38.578472 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Oct 2 23:37:38.578478 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Oct 2 23:37:38.578483 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Oct 2 23:37:38.578490 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Oct 2 23:37:38.578532 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Oct 2 23:37:38.578540 kernel: Initialise system trusted keyrings Oct 2 23:37:38.578546 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Oct 2 23:37:38.578551 kernel: Key type asymmetric registered Oct 2 23:37:38.578556 kernel: Asymmetric key parser 'x509' registered Oct 2 23:37:38.578562 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 23:37:38.578567 kernel: io scheduler mq-deadline registered Oct 2 23:37:38.578573 kernel: io scheduler kyber registered Oct 2 23:37:38.578579 kernel: io scheduler bfq registered Oct 2 23:37:38.578620 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Oct 2 23:37:38.578661 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Oct 2 23:37:38.578703 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Oct 2 23:37:38.578743 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Oct 2 23:37:38.578784 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Oct 2 23:37:38.578824 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Oct 2 23:37:38.578872 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Oct 2 23:37:38.578880 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Oct 2 23:37:38.578886 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Oct 2 23:37:38.578891 kernel: pstore: Registered erst as persistent store backend Oct 2 23:37:38.578896 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 23:37:38.578902 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 23:37:38.578907 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 23:37:38.578912 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 23:37:38.578919 kernel: hpet_acpi_add: no address or irqs in _CRS Oct 2 23:37:38.578961 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Oct 2 23:37:38.578969 kernel: i8042: PNP: No PS/2 controller found. Oct 2 23:37:38.579005 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Oct 2 23:37:38.579044 kernel: rtc_cmos rtc_cmos: registered as rtc0 Oct 2 23:37:38.579080 kernel: rtc_cmos rtc_cmos: setting system clock to 2023-10-02T23:37:37 UTC (1696289857) Oct 2 23:37:38.579117 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Oct 2 23:37:38.579124 kernel: fail to initialize ptp_kvm Oct 2 23:37:38.579131 kernel: intel_pstate: Intel P-state driver initializing Oct 2 23:37:38.579136 kernel: intel_pstate: Disabling energy efficiency optimization Oct 2 23:37:38.579141 kernel: intel_pstate: HWP enabled Oct 2 23:37:38.579147 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Oct 2 23:37:38.579152 kernel: vesafb: scrolling: redraw Oct 2 23:37:38.579157 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Oct 2 23:37:38.579164 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000ad4c49c1, using 768k, total 768k Oct 2 23:37:38.579192 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 23:37:38.579197 kernel: fb0: VESA VGA frame buffer device Oct 2 23:37:38.579203 kernel: NET: Registered PF_INET6 protocol family Oct 2 23:37:38.579209 kernel: Segment Routing with IPv6 Oct 2 23:37:38.579233 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 23:37:38.579239 kernel: NET: Registered PF_PACKET protocol family Oct 2 23:37:38.579244 kernel: Key type dns_resolver registered Oct 2 23:37:38.579249 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Oct 2 23:37:38.579254 kernel: microcode: Microcode Update Driver: v2.2. Oct 2 23:37:38.579260 kernel: IPI shorthand broadcast: enabled Oct 2 23:37:38.579265 kernel: sched_clock: Marking stable (1679926878, 1339783474)->(4438106601, -1418396249) Oct 2 23:37:38.579271 kernel: registered taskstats version 1 Oct 2 23:37:38.579277 kernel: Loading compiled-in X.509 certificates Oct 2 23:37:38.579282 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 23:37:38.579287 kernel: Key type .fscrypt registered Oct 2 23:37:38.579292 kernel: Key type fscrypt-provisioning registered Oct 2 23:37:38.579297 kernel: pstore: Using crash dump compression: deflate Oct 2 23:37:38.579303 kernel: ima: Allocated hash algorithm: sha1 Oct 2 23:37:38.579308 kernel: ima: No architecture policies found Oct 2 23:37:38.579313 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 23:37:38.579320 kernel: Write protecting the kernel read-only data: 28672k Oct 2 23:37:38.579325 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 23:37:38.579330 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 23:37:38.579335 kernel: Run /init as init process Oct 2 23:37:38.579341 kernel: with arguments: Oct 2 23:37:38.579346 kernel: /init Oct 2 23:37:38.579351 kernel: with environment: Oct 2 23:37:38.579356 kernel: HOME=/ Oct 2 23:37:38.579362 kernel: TERM=linux Oct 2 23:37:38.579368 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 23:37:38.579374 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 23:37:38.579381 systemd[1]: Detected architecture x86-64. Oct 2 23:37:38.579386 systemd[1]: Running in initrd. Oct 2 23:37:38.579391 systemd[1]: No hostname configured, using default hostname. Oct 2 23:37:38.579397 systemd[1]: Hostname set to . Oct 2 23:37:38.579402 systemd[1]: Initializing machine ID from random generator. Oct 2 23:37:38.579409 systemd[1]: Queued start job for default target initrd.target. Oct 2 23:37:38.579414 systemd[1]: Started systemd-ask-password-console.path. Oct 2 23:37:38.579419 systemd[1]: Reached target cryptsetup.target. Oct 2 23:37:38.579425 systemd[1]: Reached target paths.target. Oct 2 23:37:38.579430 systemd[1]: Reached target slices.target. Oct 2 23:37:38.579435 systemd[1]: Reached target swap.target. Oct 2 23:37:38.579440 systemd[1]: Reached target timers.target. Oct 2 23:37:38.579446 systemd[1]: Listening on iscsid.socket. Oct 2 23:37:38.579452 systemd[1]: Listening on iscsiuio.socket. Oct 2 23:37:38.579458 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 23:37:38.579463 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 23:37:38.579469 systemd[1]: Listening on systemd-journald.socket. Oct 2 23:37:38.579474 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Oct 2 23:37:38.579479 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Oct 2 23:37:38.579485 kernel: clocksource: Switched to clocksource tsc Oct 2 23:37:38.579491 systemd[1]: Listening on systemd-networkd.socket. Oct 2 23:37:38.579497 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 23:37:38.579502 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 23:37:38.579508 systemd[1]: Reached target sockets.target. Oct 2 23:37:38.579513 systemd[1]: Starting kmod-static-nodes.service... Oct 2 23:37:38.579519 systemd[1]: Finished network-cleanup.service. Oct 2 23:37:38.579524 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 23:37:38.579529 systemd[1]: Starting systemd-journald.service... Oct 2 23:37:38.579535 systemd[1]: Starting systemd-modules-load.service... Oct 2 23:37:38.579542 systemd-journald[269]: Journal started Oct 2 23:37:38.579568 systemd-journald[269]: Runtime Journal (/run/log/journal/d820b6d78a364303b52a647bb8b10222) is 8.0M, max 640.1M, 632.1M free. Oct 2 23:37:38.581692 systemd-modules-load[270]: Inserted module 'overlay' Oct 2 23:37:38.640255 kernel: audit: type=1334 audit(1696289858.587:2): prog-id=6 op=LOAD Oct 2 23:37:38.640267 systemd[1]: Starting systemd-resolved.service... Oct 2 23:37:38.640275 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 23:37:38.587000 audit: BPF prog-id=6 op=LOAD Oct 2 23:37:38.670209 kernel: Bridge firewalling registered Oct 2 23:37:38.670224 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 23:37:38.685374 systemd-modules-load[270]: Inserted module 'br_netfilter' Oct 2 23:37:38.721265 systemd[1]: Started systemd-journald.service. Oct 2 23:37:38.721277 kernel: SCSI subsystem initialized Oct 2 23:37:38.691589 systemd-resolved[272]: Positive Trust Anchors: Oct 2 23:37:38.837957 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 23:37:38.837972 kernel: audit: type=1130 audit(1696289858.741:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.837998 kernel: device-mapper: uevent: version 1.0.3 Oct 2 23:37:38.838005 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 23:37:38.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.691596 systemd-resolved[272]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 23:37:38.889338 kernel: audit: type=1130 audit(1696289858.846:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.691616 systemd-resolved[272]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 23:37:38.964393 kernel: audit: type=1130 audit(1696289858.898:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.693171 systemd-resolved[272]: Defaulting to hostname 'linux'. Oct 2 23:37:38.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.742640 systemd[1]: Started systemd-resolved.service. Oct 2 23:37:39.068521 kernel: audit: type=1130 audit(1696289858.972:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.068531 kernel: audit: type=1130 audit(1696289859.023:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.840145 systemd-modules-load[270]: Inserted module 'dm_multipath' Oct 2 23:37:39.122832 kernel: audit: type=1130 audit(1696289859.076:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:38.847491 systemd[1]: Finished kmod-static-nodes.service. Oct 2 23:37:38.899471 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 23:37:38.973457 systemd[1]: Finished systemd-modules-load.service. Oct 2 23:37:39.024474 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 23:37:39.077450 systemd[1]: Reached target nss-lookup.target. Oct 2 23:37:39.131777 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 23:37:39.152837 systemd[1]: Starting systemd-sysctl.service... Oct 2 23:37:39.153139 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 23:37:39.155954 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 23:37:39.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.156345 systemd[1]: Finished systemd-sysctl.service. Oct 2 23:37:39.205393 kernel: audit: type=1130 audit(1696289859.154:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.217496 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 23:37:39.281274 kernel: audit: type=1130 audit(1696289859.216:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.273843 systemd[1]: Starting dracut-cmdline.service... Oct 2 23:37:39.295277 dracut-cmdline[294]: dracut-dracut-053 Oct 2 23:37:39.295277 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 23:37:39.295277 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 23:37:39.364253 kernel: Loading iSCSI transport class v2.0-870. Oct 2 23:37:39.364265 kernel: iscsi: registered transport (tcp) Oct 2 23:37:39.413587 kernel: iscsi: registered transport (qla4xxx) Oct 2 23:37:39.413638 kernel: QLogic iSCSI HBA Driver Oct 2 23:37:39.429906 systemd[1]: Finished dracut-cmdline.service. Oct 2 23:37:39.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:39.438903 systemd[1]: Starting dracut-pre-udev.service... Oct 2 23:37:39.494242 kernel: raid6: avx2x4 gen() 46505 MB/s Oct 2 23:37:39.529242 kernel: raid6: avx2x4 xor() 21302 MB/s Oct 2 23:37:39.564237 kernel: raid6: avx2x2 gen() 53636 MB/s Oct 2 23:37:39.599238 kernel: raid6: avx2x2 xor() 31981 MB/s Oct 2 23:37:39.633242 kernel: raid6: avx2x1 gen() 45060 MB/s Oct 2 23:37:39.667239 kernel: raid6: avx2x1 xor() 27730 MB/s Oct 2 23:37:39.701242 kernel: raid6: sse2x4 gen() 21276 MB/s Oct 2 23:37:39.735238 kernel: raid6: sse2x4 xor() 11823 MB/s Oct 2 23:37:39.769238 kernel: raid6: sse2x2 gen() 21559 MB/s Oct 2 23:37:39.803206 kernel: raid6: sse2x2 xor() 13372 MB/s Oct 2 23:37:39.837238 kernel: raid6: sse2x1 gen() 18206 MB/s Oct 2 23:37:39.888507 kernel: raid6: sse2x1 xor() 8885 MB/s Oct 2 23:37:39.888522 kernel: raid6: using algorithm avx2x2 gen() 53636 MB/s Oct 2 23:37:39.888529 kernel: raid6: .... xor() 31981 MB/s, rmw enabled Oct 2 23:37:39.906446 kernel: raid6: using avx2x2 recovery algorithm Oct 2 23:37:39.952217 kernel: xor: automatically using best checksumming function avx Oct 2 23:37:40.030198 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 23:37:40.035072 systemd[1]: Finished dracut-pre-udev.service. Oct 2 23:37:40.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:40.042000 audit: BPF prog-id=7 op=LOAD Oct 2 23:37:40.042000 audit: BPF prog-id=8 op=LOAD Oct 2 23:37:40.044077 systemd[1]: Starting systemd-udevd.service... Oct 2 23:37:40.051648 systemd-udevd[475]: Using default interface naming scheme 'v252'. Oct 2 23:37:40.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:40.058401 systemd[1]: Started systemd-udevd.service. Oct 2 23:37:40.096264 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation Oct 2 23:37:40.071822 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 23:37:40.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:40.099704 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 23:37:40.113367 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 23:37:40.161574 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 23:37:40.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:40.196177 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 23:37:40.231972 kernel: ACPI: bus type USB registered Oct 2 23:37:40.232003 kernel: usbcore: registered new interface driver usbfs Oct 2 23:37:40.232012 kernel: usbcore: registered new interface driver hub Oct 2 23:37:40.249622 kernel: usbcore: registered new device driver usb Oct 2 23:37:40.268173 kernel: libata version 3.00 loaded. Oct 2 23:37:40.307063 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 23:37:40.307106 kernel: AES CTR mode by8 optimization enabled Oct 2 23:37:40.327173 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 23:37:40.327275 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Oct 2 23:37:40.327333 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Oct 2 23:37:40.363391 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Oct 2 23:37:40.363461 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 23:37:40.383836 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 23:37:40.438608 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Oct 2 23:37:40.438687 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Oct 2 23:37:40.438791 kernel: ahci 0000:00:17.0: version 3.0 Oct 2 23:37:40.470392 kernel: hub 1-0:1.0: USB hub found Oct 2 23:37:40.470478 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Oct 2 23:37:40.470534 kernel: hub 1-0:1.0: 16 ports detected Oct 2 23:37:40.488842 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Oct 2 23:37:40.507170 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Oct 2 23:37:40.507185 kernel: scsi host0: ahci Oct 2 23:37:40.507276 kernel: scsi host1: ahci Oct 2 23:37:40.507364 kernel: scsi host2: ahci Oct 2 23:37:40.507436 kernel: scsi host3: ahci Oct 2 23:37:40.507494 kernel: scsi host4: ahci Oct 2 23:37:40.507550 kernel: scsi host5: ahci Oct 2 23:37:40.507601 kernel: scsi host6: ahci Oct 2 23:37:40.507652 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 128 Oct 2 23:37:40.507659 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 128 Oct 2 23:37:40.507666 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 128 Oct 2 23:37:40.507672 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 128 Oct 2 23:37:40.507679 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 128 Oct 2 23:37:40.507685 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 128 Oct 2 23:37:40.507693 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 128 Oct 2 23:37:40.548655 kernel: hub 2-0:1.0: USB hub found Oct 2 23:37:40.548737 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Oct 2 23:37:40.560231 kernel: hub 2-0:1.0: 10 ports detected Oct 2 23:37:40.611729 kernel: pps pps0: new PPS source ptp0 Oct 2 23:37:40.611803 kernel: usb: port power management may be unreliable Oct 2 23:37:40.611811 kernel: igb 0000:03:00.0: added PHC on eth0 Oct 2 23:37:40.668561 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 23:37:40.668636 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 23:37:40.710563 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 23:37:40.710635 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:bc Oct 2 23:37:40.710689 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Oct 2 23:37:40.795902 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Oct 2 23:37:40.795927 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 23:37:40.827171 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 23:37:40.870168 kernel: pps pps1: new PPS source ptp2 Oct 2 23:37:40.870247 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 23:37:40.898167 kernel: igb 0000:04:00.0: added PHC on eth1 Oct 2 23:37:40.898243 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 23:37:40.901166 kernel: ata7: SATA link down (SStatus 0 SControl 300) Oct 2 23:37:40.907167 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Oct 2 23:37:40.907246 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 23:37:40.925176 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 23:37:40.925394 kernel: hub 1-14:1.0: USB hub found Oct 2 23:37:40.925633 kernel: hub 1-14:1.0: 4 ports detected Oct 2 23:37:40.927199 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 2 23:37:40.957866 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:bd Oct 2 23:37:40.957939 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 2 23:37:40.972202 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Oct 2 23:37:40.987214 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Oct 2 23:37:41.020680 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 23:37:41.020752 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 2 23:37:41.151222 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 2 23:37:41.165202 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Oct 2 23:37:41.214813 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 23:37:41.214829 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 23:37:41.214896 kernel: ata1.00: Features: NCQ-prio Oct 2 23:37:41.214904 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Oct 2 23:37:41.228218 kernel: port_module: 9 callbacks suppressed Oct 2 23:37:41.228234 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Oct 2 23:37:41.244019 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 23:37:41.275379 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 23:37:41.275447 kernel: ata2.00: Features: NCQ-prio Oct 2 23:37:41.342213 kernel: ata1.00: configured for UDMA/133 Oct 2 23:37:41.342228 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Oct 2 23:37:41.361236 kernel: ata2.00: configured for UDMA/133 Oct 2 23:37:41.376212 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Oct 2 23:37:41.413170 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Oct 2 23:37:41.430169 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 23:37:41.465896 kernel: usbcore: registered new interface driver usbhid Oct 2 23:37:41.465938 kernel: usbhid: USB HID core driver Oct 2 23:37:41.465947 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 23:37:41.503902 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:41.503934 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Oct 2 23:37:41.504003 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 23:37:41.536428 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 23:37:41.536510 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 23:37:41.573914 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 23:37:41.573988 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Oct 2 23:37:41.591220 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 23:37:41.591295 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Oct 2 23:37:41.606214 kernel: sd 1:0:0:0: [sdb] Write Protect is off Oct 2 23:37:41.621663 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Oct 2 23:37:41.643216 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Oct 2 23:37:41.643299 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Oct 2 23:37:41.643307 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Oct 2 23:37:41.655273 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Oct 2 23:37:41.671068 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 23:37:41.706222 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 23:37:41.836619 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:41.853625 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 23:37:41.870448 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 23:37:41.870462 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Oct 2 23:37:41.887252 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 23:37:41.921414 kernel: GPT:9289727 != 937703087 Oct 2 23:37:41.921430 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 23:37:41.939140 kernel: GPT:9289727 != 937703087 Oct 2 23:37:41.954274 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 23:37:41.971137 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 23:37:42.004408 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:42.004423 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 23:37:42.041170 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Oct 2 23:37:42.050474 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 23:37:42.109460 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (535) Oct 2 23:37:42.109478 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Oct 2 23:37:42.088448 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 23:37:42.122132 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 23:37:42.143797 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 23:37:42.167975 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 23:37:42.180926 systemd[1]: Starting disk-uuid.service... Oct 2 23:37:42.217274 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:42.217287 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 23:37:42.217338 disk-uuid[684]: Primary Header is updated. Oct 2 23:37:42.217338 disk-uuid[684]: Secondary Entries is updated. Oct 2 23:37:42.217338 disk-uuid[684]: Secondary Header is updated. Oct 2 23:37:42.288282 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:42.288292 kernel: GPT:disk_guids don't match. Oct 2 23:37:42.288299 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 23:37:42.288306 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 23:37:42.288312 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:42.327204 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 23:37:43.276530 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 23:37:43.294873 disk-uuid[685]: The operation has completed successfully. Oct 2 23:37:43.304283 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 23:37:43.332606 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 23:37:43.425572 kernel: audit: type=1130 audit(1696289863.338:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.425587 kernel: audit: type=1131 audit(1696289863.338:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.332647 systemd[1]: Finished disk-uuid.service. Oct 2 23:37:43.454266 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 23:37:43.345337 systemd[1]: Starting verity-setup.service... Oct 2 23:37:43.489594 systemd[1]: Found device dev-mapper-usr.device. Oct 2 23:37:43.499203 systemd[1]: Mounting sysusr-usr.mount... Oct 2 23:37:43.505421 systemd[1]: Finished verity-setup.service. Oct 2 23:37:43.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.570170 kernel: audit: type=1130 audit(1696289863.523:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.626843 systemd[1]: Mounted sysusr-usr.mount. Oct 2 23:37:43.641278 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 23:37:43.634483 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 23:37:43.721387 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 23:37:43.721402 kernel: BTRFS info (device sda6): using free space tree Oct 2 23:37:43.721410 kernel: BTRFS info (device sda6): has skinny extents Oct 2 23:37:43.721416 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 23:37:43.634887 systemd[1]: Starting ignition-setup.service... Oct 2 23:37:43.656637 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 23:37:43.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.729550 systemd[1]: Finished ignition-setup.service. Oct 2 23:37:43.845974 kernel: audit: type=1130 audit(1696289863.744:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.845991 kernel: audit: type=1130 audit(1696289863.798:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.745535 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 23:37:43.875361 kernel: audit: type=1334 audit(1696289863.853:24): prog-id=9 op=LOAD Oct 2 23:37:43.853000 audit: BPF prog-id=9 op=LOAD Oct 2 23:37:43.799866 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 23:37:43.855014 systemd[1]: Starting systemd-networkd.service... Oct 2 23:37:43.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.933687 ignition[860]: Ignition 2.14.0 Oct 2 23:37:43.959432 kernel: audit: type=1130 audit(1696289863.898:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.889152 systemd-networkd[866]: lo: Link UP Oct 2 23:37:43.933692 ignition[860]: Stage: fetch-offline Oct 2 23:37:43.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.889154 systemd-networkd[866]: lo: Gained carrier Oct 2 23:37:44.102921 kernel: audit: type=1130 audit(1696289863.980:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:44.102935 kernel: audit: type=1130 audit(1696289864.035:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:44.102943 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 23:37:44.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.933720 ignition[860]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 23:37:44.125853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Oct 2 23:37:43.889441 systemd-networkd[866]: Enumeration completed Oct 2 23:37:43.933736 ignition[860]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 23:37:43.889511 systemd[1]: Started systemd-networkd.service. Oct 2 23:37:44.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.945116 ignition[860]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 23:37:43.890151 systemd-networkd[866]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 23:37:44.178296 iscsid[892]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 23:37:44.178296 iscsid[892]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 23:37:44.178296 iscsid[892]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 23:37:44.178296 iscsid[892]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 23:37:44.178296 iscsid[892]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 23:37:44.178296 iscsid[892]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 23:37:44.178296 iscsid[892]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 23:37:44.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.945184 ignition[860]: parsed url from cmdline: "" Oct 2 23:37:43.899249 systemd[1]: Reached target network.target. Oct 2 23:37:44.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:43.945186 ignition[860]: no config URL provided Oct 2 23:37:43.946307 unknown[860]: fetched base config from "system" Oct 2 23:37:44.371302 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Oct 2 23:37:43.945190 ignition[860]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 23:37:43.946311 unknown[860]: fetched user config from "system" Oct 2 23:37:43.945201 ignition[860]: parsing config with SHA512: 434232959999bc7c6391debfd3242518a630fa2546ce21d432bd7ed8bfd279872b419c341b12ba06d7c997bfbed007cb04fd17d3bcc9c5d20d3eec69d4a55870 Oct 2 23:37:43.954740 systemd[1]: Starting iscsiuio.service... Oct 2 23:37:43.946441 ignition[860]: fetch-offline: fetch-offline passed Oct 2 23:37:43.966349 systemd[1]: Started iscsiuio.service. Oct 2 23:37:43.946443 ignition[860]: POST message to Packet Timeline Oct 2 23:37:43.981463 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 23:37:43.946447 ignition[860]: POST Status error: resource requires networking Oct 2 23:37:44.036421 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 23:37:43.946476 ignition[860]: Ignition finished successfully Oct 2 23:37:44.036858 systemd[1]: Starting ignition-kargs.service... Oct 2 23:37:44.107131 ignition[880]: Ignition 2.14.0 Oct 2 23:37:44.104985 systemd-networkd[866]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 23:37:44.107135 ignition[880]: Stage: kargs Oct 2 23:37:44.116721 systemd[1]: Starting iscsid.service... Oct 2 23:37:44.107194 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 23:37:44.140475 systemd[1]: Started iscsid.service. Oct 2 23:37:44.107203 ignition[880]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 23:37:44.154830 systemd[1]: Starting dracut-initqueue.service... Oct 2 23:37:44.108495 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 23:37:44.168349 systemd[1]: Finished dracut-initqueue.service. Oct 2 23:37:44.109828 ignition[880]: kargs: kargs passed Oct 2 23:37:44.196309 systemd[1]: Reached target remote-fs-pre.target. Oct 2 23:37:44.109831 ignition[880]: POST message to Packet Timeline Oct 2 23:37:44.241379 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 23:37:44.109840 ignition[880]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 23:37:44.271337 systemd[1]: Reached target remote-fs.target. Oct 2 23:37:44.115458 ignition[880]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57787->[::1]:53: read: connection refused Oct 2 23:37:44.289360 systemd[1]: Starting dracut-pre-mount.service... Oct 2 23:37:44.315937 ignition[880]: GET https://metadata.packet.net/metadata: attempt #2 Oct 2 23:37:44.299588 systemd[1]: Finished dracut-pre-mount.service. Oct 2 23:37:44.316222 ignition[880]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37347->[::1]:53: read: connection refused Oct 2 23:37:44.366421 systemd-networkd[866]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 23:37:44.394739 systemd-networkd[866]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 23:37:44.424499 systemd-networkd[866]: enp1s0f1np1: Link UP Oct 2 23:37:44.424858 systemd-networkd[866]: enp1s0f1np1: Gained carrier Oct 2 23:37:44.436657 systemd-networkd[866]: enp1s0f0np0: Link UP Oct 2 23:37:44.437050 systemd-networkd[866]: eno2: Link UP Oct 2 23:37:44.437438 systemd-networkd[866]: eno1: Link UP Oct 2 23:37:44.716904 ignition[880]: GET https://metadata.packet.net/metadata: attempt #3 Oct 2 23:37:44.718030 ignition[880]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43070->[::1]:53: read: connection refused Oct 2 23:37:45.181749 systemd-networkd[866]: enp1s0f0np0: Gained carrier Oct 2 23:37:45.190439 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Oct 2 23:37:45.214413 systemd-networkd[866]: enp1s0f0np0: DHCPv4 address 139.178.88.33/31, gateway 139.178.88.32 acquired from 145.40.83.140 Oct 2 23:37:45.518557 ignition[880]: GET https://metadata.packet.net/metadata: attempt #4 Oct 2 23:37:45.520103 ignition[880]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:32851->[::1]:53: read: connection refused Oct 2 23:37:45.672651 systemd-networkd[866]: enp1s0f1np1: Gained IPv6LL Oct 2 23:37:47.121323 ignition[880]: GET https://metadata.packet.net/metadata: attempt #5 Oct 2 23:37:47.122574 ignition[880]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33583->[::1]:53: read: connection refused Oct 2 23:37:47.208731 systemd-networkd[866]: enp1s0f0np0: Gained IPv6LL Oct 2 23:37:50.326236 ignition[880]: GET https://metadata.packet.net/metadata: attempt #6 Oct 2 23:37:50.361442 ignition[880]: GET result: OK Oct 2 23:37:50.518533 ignition[880]: Ignition finished successfully Oct 2 23:37:50.523195 systemd[1]: Finished ignition-kargs.service. Oct 2 23:37:50.603914 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 23:37:50.603948 kernel: audit: type=1130 audit(1696289870.532:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:50.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:50.542660 ignition[908]: Ignition 2.14.0 Oct 2 23:37:50.535513 systemd[1]: Starting ignition-disks.service... Oct 2 23:37:50.542663 ignition[908]: Stage: disks Oct 2 23:37:50.542718 ignition[908]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 23:37:50.542726 ignition[908]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 23:37:50.544135 ignition[908]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 23:37:50.545130 ignition[908]: disks: disks passed Oct 2 23:37:50.545133 ignition[908]: POST message to Packet Timeline Oct 2 23:37:50.545144 ignition[908]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 23:37:50.565739 ignition[908]: GET result: OK Oct 2 23:37:50.727108 ignition[908]: Ignition finished successfully Oct 2 23:37:50.730308 systemd[1]: Finished ignition-disks.service. Oct 2 23:37:50.795264 kernel: audit: type=1130 audit(1696289870.741:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:50.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:50.742718 systemd[1]: Reached target initrd-root-device.target. Oct 2 23:37:50.803419 systemd[1]: Reached target local-fs-pre.target. Oct 2 23:37:50.803455 systemd[1]: Reached target local-fs.target. Oct 2 23:37:50.826403 systemd[1]: Reached target sysinit.target. Oct 2 23:37:50.840393 systemd[1]: Reached target basic.target. Oct 2 23:37:50.855143 systemd[1]: Starting systemd-fsck-root.service... Oct 2 23:37:50.882685 systemd-fsck[924]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 23:37:50.893711 systemd[1]: Finished systemd-fsck-root.service. Oct 2 23:37:50.981478 kernel: audit: type=1130 audit(1696289870.901:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:50.981492 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 23:37:50.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:50.908392 systemd[1]: Mounting sysroot.mount... Oct 2 23:37:50.988814 systemd[1]: Mounted sysroot.mount. Oct 2 23:37:51.002450 systemd[1]: Reached target initrd-root-fs.target. Oct 2 23:37:51.010075 systemd[1]: Mounting sysroot-usr.mount... Oct 2 23:37:51.035032 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 23:37:51.043737 systemd[1]: Starting flatcar-static-network.service... Oct 2 23:37:51.059244 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 23:37:51.059276 systemd[1]: Reached target ignition-diskful.target. Oct 2 23:37:51.078088 systemd[1]: Mounted sysroot-usr.mount. Oct 2 23:37:51.101662 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 23:37:51.233739 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (935) Oct 2 23:37:51.233761 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 23:37:51.233770 kernel: BTRFS info (device sda6): using free space tree Oct 2 23:37:51.233777 kernel: BTRFS info (device sda6): has skinny extents Oct 2 23:37:51.233784 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 23:37:51.113601 systemd[1]: Starting initrd-setup-root.service... Oct 2 23:37:51.297699 kernel: audit: type=1130 audit(1696289871.242:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.297739 coreos-metadata[931]: Oct 02 23:37:51.191 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 23:37:51.297739 coreos-metadata[931]: Oct 02 23:37:51.214 INFO Fetch successful Oct 2 23:37:51.297739 coreos-metadata[931]: Oct 02 23:37:51.230 INFO wrote hostname ci-3510.3.0-a-10ca9e1f45 to /sysroot/etc/hostname Oct 2 23:37:51.504450 kernel: audit: type=1130 audit(1696289871.305:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.504464 kernel: audit: type=1130 audit(1696289871.369:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.504474 kernel: audit: type=1131 audit(1696289871.369:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.504536 coreos-metadata[932]: Oct 02 23:37:51.191 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 23:37:51.504536 coreos-metadata[932]: Oct 02 23:37:51.213 INFO Fetch successful Oct 2 23:37:51.538307 initrd-setup-root[940]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 23:37:51.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.178723 systemd[1]: Finished initrd-setup-root.service. Oct 2 23:37:51.610411 kernel: audit: type=1130 audit(1696289871.545:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.610464 initrd-setup-root[950]: cut: /sysroot/etc/group: No such file or directory Oct 2 23:37:51.244614 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 23:37:51.629427 initrd-setup-root[958]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 23:37:51.306508 systemd[1]: flatcar-static-network.service: Deactivated successfully. Oct 2 23:37:51.649515 initrd-setup-root[966]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 23:37:51.306548 systemd[1]: Finished flatcar-static-network.service. Oct 2 23:37:51.667447 ignition[1005]: INFO : Ignition 2.14.0 Oct 2 23:37:51.667447 ignition[1005]: INFO : Stage: mount Oct 2 23:37:51.667447 ignition[1005]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 23:37:51.667447 ignition[1005]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 23:37:51.667447 ignition[1005]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 23:37:51.667447 ignition[1005]: INFO : mount: mount passed Oct 2 23:37:51.667447 ignition[1005]: INFO : POST message to Packet Timeline Oct 2 23:37:51.667447 ignition[1005]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 23:37:51.667447 ignition[1005]: INFO : GET result: OK Oct 2 23:37:51.816288 kernel: audit: type=1130 audit(1696289871.741:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.370449 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 23:37:51.864277 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1021) Oct 2 23:37:51.864289 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 23:37:51.864304 ignition[1005]: INFO : Ignition finished successfully Oct 2 23:37:51.953409 kernel: BTRFS info (device sda6): using free space tree Oct 2 23:37:51.953420 kernel: BTRFS info (device sda6): has skinny extents Oct 2 23:37:51.953428 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 23:37:51.491843 systemd[1]: Starting ignition-mount.service... Oct 2 23:37:51.511834 systemd[1]: Starting sysroot-boot.service... Oct 2 23:37:51.524681 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 23:37:51.997303 ignition[1040]: INFO : Ignition 2.14.0 Oct 2 23:37:51.997303 ignition[1040]: INFO : Stage: files Oct 2 23:37:51.997303 ignition[1040]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 23:37:51.997303 ignition[1040]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 23:37:51.997303 ignition[1040]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 23:37:51.997303 ignition[1040]: DEBUG : files: compiled without relabeling support, skipping Oct 2 23:37:51.997303 ignition[1040]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 23:37:51.997303 ignition[1040]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 23:37:51.997303 ignition[1040]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 23:37:51.997303 ignition[1040]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 23:37:51.997303 ignition[1040]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 23:37:51.997303 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 23:37:51.997303 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 23:37:51.997303 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3138006010" Oct 2 23:37:51.997303 ignition[1040]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3138006010": device or resource busy Oct 2 23:37:51.997303 ignition[1040]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3138006010", trying btrfs: device or resource busy Oct 2 23:37:51.997303 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3138006010" Oct 2 23:37:52.307482 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1048) Oct 2 23:37:52.307503 kernel: audit: type=1130 audit(1696289872.221:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.524723 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 23:37:52.324398 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3138006010" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3138006010" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3138006010" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(8): [started] processing unit "packet-phone-home.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(8): [finished] processing unit "packet-phone-home.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(9): [started] processing unit "etcd-member.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(9): op(a): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(9): op(a): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(9): [finished] processing unit "etcd-member.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(c): [started] setting preset to enabled for "packet-phone-home.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(c): [finished] setting preset to enabled for "packet-phone-home.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(d): [started] setting preset to enabled for "etcd-member.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: op(d): [finished] setting preset to enabled for "etcd-member.service" Oct 2 23:37:52.324398 ignition[1040]: INFO : files: createResultFile: createFiles: op(e): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 23:37:52.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.529111 systemd[1]: Finished sysroot-boot.service. Oct 2 23:37:52.729497 ignition[1040]: INFO : files: createResultFile: createFiles: op(e): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 23:37:52.729497 ignition[1040]: INFO : files: files passed Oct 2 23:37:52.729497 ignition[1040]: INFO : POST message to Packet Timeline Oct 2 23:37:52.729497 ignition[1040]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 23:37:52.729497 ignition[1040]: INFO : GET result: OK Oct 2 23:37:52.729497 ignition[1040]: INFO : Ignition finished successfully Oct 2 23:37:51.734619 systemd[1]: Finished ignition-mount.service. Oct 2 23:37:52.854586 initrd-setup-root-after-ignition[1072]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 23:37:51.744549 systemd[1]: Starting ignition-files.service... Oct 2 23:37:52.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.811266 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 23:37:51.947766 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 23:37:52.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:51.973352 unknown[1040]: wrote ssh authorized keys file for user: core Oct 2 23:37:52.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.199891 systemd[1]: Finished ignition-files.service. Oct 2 23:37:52.227807 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 23:37:52.289451 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 23:37:52.289756 systemd[1]: Starting ignition-quench.service... Oct 2 23:37:52.314576 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 23:37:53.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.334575 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 23:37:53.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.334645 systemd[1]: Finished ignition-quench.service. Oct 2 23:37:53.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.360565 systemd[1]: Reached target ignition-complete.target. Oct 2 23:37:53.082396 ignition[1087]: INFO : Ignition 2.14.0 Oct 2 23:37:53.082396 ignition[1087]: INFO : Stage: umount Oct 2 23:37:53.082396 ignition[1087]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 23:37:53.082396 ignition[1087]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 23:37:53.082396 ignition[1087]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 23:37:53.082396 ignition[1087]: INFO : umount: umount passed Oct 2 23:37:53.082396 ignition[1087]: INFO : POST message to Packet Timeline Oct 2 23:37:53.082396 ignition[1087]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 23:37:53.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.384327 systemd[1]: Starting initrd-parse-etc.service... Oct 2 23:37:53.231545 iscsid[892]: iscsid shutting down. Oct 2 23:37:53.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.246547 ignition[1087]: INFO : GET result: OK Oct 2 23:37:53.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.423044 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 23:37:53.280779 ignition[1087]: INFO : Ignition finished successfully Oct 2 23:37:52.423304 systemd[1]: Finished initrd-parse-etc.service. Oct 2 23:37:52.431810 systemd[1]: Reached target initrd-fs.target. Oct 2 23:37:52.457474 systemd[1]: Reached target initrd.target. Oct 2 23:37:53.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.475590 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 23:37:53.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.477800 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 23:37:53.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.367000 audit: BPF prog-id=6 op=UNLOAD Oct 2 23:37:52.511892 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 23:37:52.534552 systemd[1]: Starting initrd-cleanup.service... Oct 2 23:37:53.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.574244 systemd[1]: Stopped target nss-lookup.target. Oct 2 23:37:53.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.591766 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 23:37:53.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.614830 systemd[1]: Stopped target timers.target. Oct 2 23:37:53.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.634771 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 23:37:52.635136 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 23:37:53.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.657066 systemd[1]: Stopped target initrd.target. Oct 2 23:37:53.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.676755 systemd[1]: Stopped target basic.target. Oct 2 23:37:53.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.696877 systemd[1]: Stopped target ignition-complete.target. Oct 2 23:37:52.722878 systemd[1]: Stopped target ignition-diskful.target. Oct 2 23:37:53.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.737758 systemd[1]: Stopped target initrd-root-device.target. Oct 2 23:37:52.762755 systemd[1]: Stopped target remote-fs.target. Oct 2 23:37:52.777762 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 23:37:53.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.795805 systemd[1]: Stopped target sysinit.target. Oct 2 23:37:53.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.813786 systemd[1]: Stopped target local-fs.target. Oct 2 23:37:53.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.830868 systemd[1]: Stopped target local-fs-pre.target. Oct 2 23:37:52.847724 systemd[1]: Stopped target swap.target. Oct 2 23:37:53.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.861666 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 23:37:53.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.862035 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 23:37:53.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.884996 systemd[1]: Stopped target cryptsetup.target. Oct 2 23:37:53.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:52.900664 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 23:37:52.901032 systemd[1]: Stopped dracut-initqueue.service. Oct 2 23:37:52.918925 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 23:37:52.919318 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 23:37:52.935974 systemd[1]: Stopped target paths.target. Oct 2 23:37:52.950551 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 23:37:52.954521 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 23:37:52.965771 systemd[1]: Stopped target slices.target. Oct 2 23:37:52.982765 systemd[1]: Stopped target sockets.target. Oct 2 23:37:53.008787 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 23:37:53.009197 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 23:37:53.026878 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 23:37:53.027250 systemd[1]: Stopped ignition-files.service. Oct 2 23:37:53.043871 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 23:37:53.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:53.044245 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 23:37:53.061967 systemd[1]: Stopping ignition-mount.service... Oct 2 23:37:53.073348 systemd[1]: Stopping iscsid.service... Oct 2 23:37:53.089860 systemd[1]: Stopping sysroot-boot.service... Oct 2 23:37:53.096263 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 23:37:53.096374 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 23:37:53.127682 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 23:37:53.127888 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 23:37:53.165336 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 23:37:53.167438 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 23:37:53.167678 systemd[1]: Stopped iscsid.service. Oct 2 23:37:53.176537 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 23:37:53.176749 systemd[1]: Stopped sysroot-boot.service. Oct 2 23:37:53.191744 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 23:37:53.892174 systemd-journald[269]: Received SIGTERM from PID 1 (n/a). Oct 2 23:37:53.191931 systemd[1]: Closed iscsid.socket. Oct 2 23:37:53.205603 systemd[1]: Stopping iscsiuio.service... Oct 2 23:37:53.223923 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 23:37:53.224153 systemd[1]: Stopped iscsiuio.service. Oct 2 23:37:53.240082 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 23:37:53.240313 systemd[1]: Finished initrd-cleanup.service. Oct 2 23:37:53.257408 systemd[1]: Stopped target network.target. Oct 2 23:37:53.271548 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 23:37:53.271669 systemd[1]: Closed iscsiuio.socket. Oct 2 23:37:53.287742 systemd[1]: Stopping systemd-networkd.service... Oct 2 23:37:53.302322 systemd-networkd[866]: enp1s0f0np0: DHCPv6 lease lost Oct 2 23:37:53.303584 systemd[1]: Stopping systemd-resolved.service... Oct 2 23:37:53.317973 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 23:37:53.318222 systemd[1]: Stopped systemd-resolved.service. Oct 2 23:37:53.320296 systemd-networkd[866]: enp1s0f1np1: DHCPv6 lease lost Oct 2 23:37:53.333847 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 23:37:53.891000 audit: BPF prog-id=9 op=UNLOAD Oct 2 23:37:53.334298 systemd[1]: Stopped systemd-networkd.service. Oct 2 23:37:53.348973 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 23:37:53.349204 systemd[1]: Stopped ignition-mount.service. Oct 2 23:37:53.368793 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 23:37:53.368887 systemd[1]: Closed systemd-networkd.socket. Oct 2 23:37:53.384433 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 23:37:53.384652 systemd[1]: Stopped ignition-disks.service. Oct 2 23:37:53.400588 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 23:37:53.400712 systemd[1]: Stopped ignition-kargs.service. Oct 2 23:37:53.416590 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 23:37:53.416718 systemd[1]: Stopped ignition-setup.service. Oct 2 23:37:53.431663 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 23:37:53.431808 systemd[1]: Stopped initrd-setup-root.service. Oct 2 23:37:53.449482 systemd[1]: Stopping network-cleanup.service... Oct 2 23:37:53.461379 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 23:37:53.461611 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 23:37:53.477620 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 23:37:53.477747 systemd[1]: Stopped systemd-sysctl.service. Oct 2 23:37:53.492826 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 23:37:53.492963 systemd[1]: Stopped systemd-modules-load.service. Oct 2 23:37:53.507811 systemd[1]: Stopping systemd-udevd.service... Oct 2 23:37:53.525175 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 23:37:53.526063 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 23:37:53.526122 systemd[1]: Stopped systemd-udevd.service. Oct 2 23:37:53.530534 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 23:37:53.530557 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 23:37:53.551540 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 23:37:53.551642 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 23:37:53.567440 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 23:37:53.567659 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 23:37:53.582735 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 23:37:53.582887 systemd[1]: Stopped dracut-cmdline.service. Oct 2 23:37:53.598624 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 23:37:53.598751 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 23:37:53.615483 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 23:37:53.628239 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 23:37:53.628269 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 23:37:53.642393 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 23:37:53.642421 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 23:37:53.657284 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 23:37:53.657400 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 23:37:53.674867 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 23:37:53.675636 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 23:37:53.675760 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 23:37:53.797501 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 23:37:53.797824 systemd[1]: Stopped network-cleanup.service. Oct 2 23:37:53.813047 systemd[1]: Reached target initrd-switch-root.target. Oct 2 23:37:53.832414 systemd[1]: Starting initrd-switch-root.service... Oct 2 23:37:53.850325 systemd[1]: Switching root. Oct 2 23:37:53.893642 systemd-journald[269]: Journal stopped Oct 2 23:37:57.879086 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 23:37:57.879123 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 23:37:57.879148 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 23:37:57.879169 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 23:37:57.879184 kernel: SELinux: policy capability open_perms=1 Oct 2 23:37:57.879199 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 23:37:57.879216 kernel: SELinux: policy capability always_check_network=0 Oct 2 23:37:57.879231 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 23:37:57.879246 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 23:37:57.879264 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 23:37:57.879279 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 23:37:57.879295 systemd[1]: Successfully loaded SELinux policy in 278.549ms. Oct 2 23:37:57.879314 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.509ms. Oct 2 23:37:57.879333 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 23:37:57.879355 systemd[1]: Detected architecture x86-64. Oct 2 23:37:57.879373 systemd[1]: Detected first boot. Oct 2 23:37:57.879389 systemd[1]: Hostname set to . Oct 2 23:37:57.879406 systemd[1]: Initializing machine ID from random generator. Oct 2 23:37:57.879423 systemd[1]: Populated /etc with preset unit settings. Oct 2 23:37:57.879440 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 23:37:57.879458 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 23:37:57.879480 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 23:37:57.879498 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 2 23:37:57.879514 kernel: audit: type=1334 audit(1696289876.202:91): prog-id=12 op=LOAD Oct 2 23:37:57.879529 kernel: audit: type=1334 audit(1696289876.202:92): prog-id=3 op=UNLOAD Oct 2 23:37:57.879545 kernel: audit: type=1334 audit(1696289876.244:93): prog-id=13 op=LOAD Oct 2 23:37:57.879560 kernel: audit: type=1334 audit(1696289876.286:94): prog-id=14 op=LOAD Oct 2 23:37:57.879577 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 23:37:57.879596 kernel: audit: type=1334 audit(1696289876.286:95): prog-id=4 op=UNLOAD Oct 2 23:37:57.879612 kernel: audit: type=1334 audit(1696289876.286:96): prog-id=5 op=UNLOAD Oct 2 23:37:57.879628 systemd[1]: Stopped initrd-switch-root.service. Oct 2 23:37:57.879645 kernel: audit: type=1131 audit(1696289876.287:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.879661 kernel: audit: type=1334 audit(1696289876.436:98): prog-id=12 op=UNLOAD Oct 2 23:37:57.879677 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 23:37:57.879695 kernel: audit: type=1130 audit(1696289876.447:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.879715 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 23:37:57.879732 kernel: audit: type=1131 audit(1696289876.447:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.879749 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 23:37:57.879767 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 23:37:57.879784 systemd[1]: Created slice system-getty.slice. Oct 2 23:37:57.879805 systemd[1]: Created slice system-modprobe.slice. Oct 2 23:37:57.879824 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 23:37:57.879842 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 23:37:57.879862 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 23:37:57.879880 systemd[1]: Created slice user.slice. Oct 2 23:37:57.879897 systemd[1]: Started systemd-ask-password-console.path. Oct 2 23:37:57.879915 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 23:37:57.879932 systemd[1]: Set up automount boot.automount. Oct 2 23:37:57.879950 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 23:37:57.879968 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 23:37:57.879985 systemd[1]: Stopped target initrd-fs.target. Oct 2 23:37:57.880003 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 23:37:57.880023 systemd[1]: Reached target integritysetup.target. Oct 2 23:37:57.880041 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 23:37:57.880059 systemd[1]: Reached target remote-fs.target. Oct 2 23:37:57.880076 systemd[1]: Reached target slices.target. Oct 2 23:37:57.880094 systemd[1]: Reached target swap.target. Oct 2 23:37:57.880111 systemd[1]: Reached target torcx.target. Oct 2 23:37:57.880129 systemd[1]: Reached target veritysetup.target. Oct 2 23:37:57.880146 systemd[1]: Listening on systemd-coredump.socket. Oct 2 23:37:57.880170 systemd[1]: Listening on systemd-initctl.socket. Oct 2 23:37:57.880189 systemd[1]: Listening on systemd-networkd.socket. Oct 2 23:37:57.880208 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 23:37:57.880227 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 23:37:57.880247 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 23:37:57.880266 systemd[1]: Mounting dev-hugepages.mount... Oct 2 23:37:57.880283 systemd[1]: Mounting dev-mqueue.mount... Oct 2 23:37:57.880301 systemd[1]: Mounting media.mount... Oct 2 23:37:57.880320 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 23:37:57.880338 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 23:37:57.880356 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 23:37:57.880374 systemd[1]: Mounting tmp.mount... Oct 2 23:37:57.880392 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 23:37:57.880413 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 23:37:57.880431 systemd[1]: Starting kmod-static-nodes.service... Oct 2 23:37:57.880449 systemd[1]: Starting modprobe@configfs.service... Oct 2 23:37:57.880467 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 23:37:57.880485 systemd[1]: Starting modprobe@drm.service... Oct 2 23:37:57.880503 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 23:37:57.880521 systemd[1]: Starting modprobe@fuse.service... Oct 2 23:37:57.880539 kernel: fuse: init (API version 7.34) Oct 2 23:37:57.880556 systemd[1]: Starting modprobe@loop.service... Oct 2 23:37:57.880577 kernel: loop: module loaded Oct 2 23:37:57.880595 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 23:37:57.880613 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 23:37:57.880631 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 23:37:57.880649 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 23:37:57.880667 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 23:37:57.880685 systemd[1]: Stopped systemd-journald.service. Oct 2 23:37:57.880702 systemd[1]: Starting systemd-journald.service... Oct 2 23:37:57.880721 systemd[1]: Starting systemd-modules-load.service... Oct 2 23:37:57.880745 systemd-journald[1240]: Journal started Oct 2 23:37:57.880824 systemd-journald[1240]: Runtime Journal (/run/log/journal/5220630e9113455089987d0e837255d8) is 8.0M, max 640.1M, 632.1M free. Oct 2 23:37:54.253000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 23:37:54.515000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 23:37:54.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 23:37:54.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 23:37:54.521000 audit: BPF prog-id=10 op=LOAD Oct 2 23:37:54.521000 audit: BPF prog-id=10 op=UNLOAD Oct 2 23:37:54.521000 audit: BPF prog-id=11 op=LOAD Oct 2 23:37:54.521000 audit: BPF prog-id=11 op=UNLOAD Oct 2 23:37:56.202000 audit: BPF prog-id=12 op=LOAD Oct 2 23:37:56.202000 audit: BPF prog-id=3 op=UNLOAD Oct 2 23:37:56.244000 audit: BPF prog-id=13 op=LOAD Oct 2 23:37:56.286000 audit: BPF prog-id=14 op=LOAD Oct 2 23:37:56.286000 audit: BPF prog-id=4 op=UNLOAD Oct 2 23:37:56.286000 audit: BPF prog-id=5 op=UNLOAD Oct 2 23:37:56.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:56.436000 audit: BPF prog-id=12 op=UNLOAD Oct 2 23:37:56.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:56.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:57.838000 audit: BPF prog-id=15 op=LOAD Oct 2 23:37:57.839000 audit: BPF prog-id=16 op=LOAD Oct 2 23:37:57.839000 audit: BPF prog-id=17 op=LOAD Oct 2 23:37:57.839000 audit: BPF prog-id=13 op=UNLOAD Oct 2 23:37:57.839000 audit: BPF prog-id=14 op=UNLOAD Oct 2 23:37:57.872000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 23:37:57.872000 audit[1240]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcb7a4da30 a2=4000 a3=7ffcb7a4dacc items=0 ppid=1 pid=1240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:37:57.872000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 23:37:54.634467 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 23:37:56.201446 systemd[1]: Queued start job for default target multi-user.target. Oct 2 23:37:54.635088 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 23:37:56.288040 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 23:37:54.635101 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 23:37:54.635119 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 23:37:54.635125 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 23:37:54.635145 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 23:37:54.635152 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 23:37:54.635265 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 23:37:54.635287 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 23:37:54.635295 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 23:37:54.635741 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 23:37:54.635762 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 23:37:54.635773 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 23:37:54.635780 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 23:37:54.635789 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 23:37:54.635797 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 23:37:55.864241 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 23:37:55.864391 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 23:37:55.864451 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 23:37:55.864542 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 23:37:55.864572 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 23:37:55.864606 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2023-10-02T23:37:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 23:37:57.902234 systemd[1]: Starting systemd-network-generator.service... Oct 2 23:37:57.924214 systemd[1]: Starting systemd-remount-fs.service... Oct 2 23:37:57.946215 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 23:37:57.967196 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 23:37:57.967216 systemd[1]: Stopped verity-setup.service. Oct 2 23:37:57.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.013211 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 23:37:58.028377 systemd[1]: Started systemd-journald.service. Oct 2 23:37:58.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.035700 systemd[1]: Mounted dev-hugepages.mount. Oct 2 23:37:58.043458 systemd[1]: Mounted dev-mqueue.mount. Oct 2 23:37:58.050451 systemd[1]: Mounted media.mount. Oct 2 23:37:58.057443 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 23:37:58.066423 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 23:37:58.075396 systemd[1]: Mounted tmp.mount. Oct 2 23:37:58.082478 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 23:37:58.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.091522 systemd[1]: Finished kmod-static-nodes.service. Oct 2 23:37:58.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.100563 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 23:37:58.100673 systemd[1]: Finished modprobe@configfs.service. Oct 2 23:37:58.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.109609 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 23:37:58.109751 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 23:37:58.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.118779 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 23:37:58.118996 systemd[1]: Finished modprobe@drm.service. Oct 2 23:37:58.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.127967 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 23:37:58.128359 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 23:37:58.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.137111 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 23:37:58.137436 systemd[1]: Finished modprobe@fuse.service. Oct 2 23:37:58.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.146969 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 23:37:58.147295 systemd[1]: Finished modprobe@loop.service. Oct 2 23:37:58.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.157030 systemd[1]: Finished systemd-modules-load.service. Oct 2 23:37:58.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.166962 systemd[1]: Finished systemd-network-generator.service. Oct 2 23:37:58.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.176989 systemd[1]: Finished systemd-remount-fs.service. Oct 2 23:37:58.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.186953 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 23:37:58.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.197581 systemd[1]: Reached target network-pre.target. Oct 2 23:37:58.208939 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 23:37:58.217906 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 23:37:58.225379 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 23:37:58.226342 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 23:37:58.233811 systemd[1]: Starting systemd-journal-flush.service... Oct 2 23:37:58.237793 systemd-journald[1240]: Time spent on flushing to /var/log/journal/5220630e9113455089987d0e837255d8 is 14.723ms for 1544 entries. Oct 2 23:37:58.237793 systemd-journald[1240]: System Journal (/var/log/journal/5220630e9113455089987d0e837255d8) is 8.0M, max 195.6M, 187.6M free. Oct 2 23:37:58.278909 systemd-journald[1240]: Received client request to flush runtime journal. Oct 2 23:37:58.250266 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 23:37:58.250845 systemd[1]: Starting systemd-random-seed.service... Oct 2 23:37:58.261283 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 23:37:58.261844 systemd[1]: Starting systemd-sysctl.service... Oct 2 23:37:58.268782 systemd[1]: Starting systemd-sysusers.service... Oct 2 23:37:58.275806 systemd[1]: Starting systemd-udev-settle.service... Oct 2 23:37:58.283502 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 23:37:58.291337 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 23:37:58.299404 systemd[1]: Finished systemd-journal-flush.service. Oct 2 23:37:58.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.307430 systemd[1]: Finished systemd-random-seed.service. Oct 2 23:37:58.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.315362 systemd[1]: Finished systemd-sysctl.service. Oct 2 23:37:58.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.323381 systemd[1]: Finished systemd-sysusers.service. Oct 2 23:37:58.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.332377 systemd[1]: Reached target first-boot-complete.target. Oct 2 23:37:58.340906 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 23:37:58.350158 udevadm[1256]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 23:37:58.359543 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 23:37:58.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.546550 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 23:37:58.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.554000 audit: BPF prog-id=18 op=LOAD Oct 2 23:37:58.555000 audit: BPF prog-id=19 op=LOAD Oct 2 23:37:58.555000 audit: BPF prog-id=7 op=UNLOAD Oct 2 23:37:58.555000 audit: BPF prog-id=8 op=UNLOAD Oct 2 23:37:58.556586 systemd[1]: Starting systemd-udevd.service... Oct 2 23:37:58.568034 systemd-udevd[1259]: Using default interface naming scheme 'v252'. Oct 2 23:37:58.587321 systemd[1]: Started systemd-udevd.service. Oct 2 23:37:58.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.597277 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Oct 2 23:37:58.596000 audit: BPF prog-id=20 op=LOAD Oct 2 23:37:58.598398 systemd[1]: Starting systemd-networkd.service... Oct 2 23:37:58.617000 audit: BPF prog-id=21 op=LOAD Oct 2 23:37:58.617000 audit: BPF prog-id=22 op=LOAD Oct 2 23:37:58.617000 audit: BPF prog-id=23 op=LOAD Oct 2 23:37:58.619170 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Oct 2 23:37:58.619208 kernel: ACPI: button: Sleep Button [SLPB] Oct 2 23:37:58.620267 systemd[1]: Starting systemd-userdbd.service... Oct 2 23:37:58.647173 kernel: IPMI message handler: version 39.2 Oct 2 23:37:58.647239 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 23:37:58.659171 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1268) Oct 2 23:37:58.659215 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 23:37:58.682173 kernel: ACPI: button: Power Button [PWRF] Oct 2 23:37:58.688201 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 23:37:58.737174 kernel: ipmi device interface Oct 2 23:37:58.661000 audit[1311]: AVC avc: denied { confidentiality } for pid=1311 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 23:37:58.745124 systemd[1]: Started systemd-userdbd.service. Oct 2 23:37:58.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:58.799998 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Oct 2 23:37:58.800203 kernel: ipmi_si: IPMI System Interface driver Oct 2 23:37:58.800221 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Oct 2 23:37:58.800303 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Oct 2 23:37:58.848194 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Oct 2 23:37:58.848285 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Oct 2 23:37:58.881984 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Oct 2 23:37:58.882016 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Oct 2 23:37:58.916163 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Oct 2 23:37:58.661000 audit[1311]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f12aaedc010 a1=df93c a2=7f12acc43bc5 a3=5 items=310 ppid=1259 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:37:58.661000 audit: CWD cwd="/" Oct 2 23:37:58.661000 audit: PATH item=0 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=1 name=(null) inode=17046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=2 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=3 name=(null) inode=17047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=4 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=5 name=(null) inode=17048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=6 name=(null) inode=17048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=7 name=(null) inode=17049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=8 name=(null) inode=17048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=9 name=(null) inode=17050 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=10 name=(null) inode=17048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=11 name=(null) inode=17051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=12 name=(null) inode=17048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=13 name=(null) inode=17052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=14 name=(null) inode=17048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=15 name=(null) inode=17053 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=16 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=17 name=(null) inode=17054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=18 name=(null) inode=17054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=19 name=(null) inode=17055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=20 name=(null) inode=17054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=21 name=(null) inode=17056 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=22 name=(null) inode=17054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=23 name=(null) inode=17057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=24 name=(null) inode=17054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=25 name=(null) inode=17058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=26 name=(null) inode=17054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=27 name=(null) inode=17059 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=28 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=29 name=(null) inode=17060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=30 name=(null) inode=17060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=31 name=(null) inode=17061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=32 name=(null) inode=17060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=33 name=(null) inode=17062 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=34 name=(null) inode=17060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=35 name=(null) inode=17063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=36 name=(null) inode=17060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=37 name=(null) inode=17064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=38 name=(null) inode=17060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=39 name=(null) inode=17065 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=40 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=41 name=(null) inode=17066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=42 name=(null) inode=17066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=43 name=(null) inode=17067 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=44 name=(null) inode=17066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=45 name=(null) inode=17068 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=46 name=(null) inode=17066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=47 name=(null) inode=17069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=48 name=(null) inode=17066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=49 name=(null) inode=17070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=50 name=(null) inode=17066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=51 name=(null) inode=17071 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=52 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=53 name=(null) inode=17072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=54 name=(null) inode=17072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=55 name=(null) inode=17073 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=56 name=(null) inode=17072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=57 name=(null) inode=17074 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=58 name=(null) inode=17072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=59 name=(null) inode=17075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=60 name=(null) inode=17072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=61 name=(null) inode=17076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=62 name=(null) inode=17072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=63 name=(null) inode=17077 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=64 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=65 name=(null) inode=17078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=66 name=(null) inode=17078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=67 name=(null) inode=17079 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=68 name=(null) inode=17078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=69 name=(null) inode=17080 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=70 name=(null) inode=17078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=71 name=(null) inode=17081 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=72 name=(null) inode=17078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=73 name=(null) inode=17082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=74 name=(null) inode=17078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=75 name=(null) inode=17083 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=76 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=77 name=(null) inode=17084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=78 name=(null) inode=17084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=79 name=(null) inode=17085 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=80 name=(null) inode=17084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=81 name=(null) inode=17086 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=82 name=(null) inode=17084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=83 name=(null) inode=17087 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=84 name=(null) inode=17084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=85 name=(null) inode=17088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=86 name=(null) inode=17084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=87 name=(null) inode=17089 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=88 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=89 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=90 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=91 name=(null) inode=17091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=92 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=93 name=(null) inode=17092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=94 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=95 name=(null) inode=17093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=96 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=97 name=(null) inode=17094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=98 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=99 name=(null) inode=17095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=100 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=101 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=102 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=103 name=(null) inode=17097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=104 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=105 name=(null) inode=17098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=106 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=107 name=(null) inode=17099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=108 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=109 name=(null) inode=17100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=110 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=111 name=(null) inode=17101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=112 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=113 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=114 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=115 name=(null) inode=17103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=116 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=117 name=(null) inode=17104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=118 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=119 name=(null) inode=17105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=120 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=121 name=(null) inode=17106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=122 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=123 name=(null) inode=17107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=124 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=125 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=126 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=127 name=(null) inode=17109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=128 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=129 name=(null) inode=17110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=130 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=131 name=(null) inode=17111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=132 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=133 name=(null) inode=17112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=134 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=135 name=(null) inode=17113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=136 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=137 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=138 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=139 name=(null) inode=17115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=140 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=141 name=(null) inode=17116 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=142 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=143 name=(null) inode=17117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=144 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=145 name=(null) inode=17118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=146 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=147 name=(null) inode=17119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=148 name=(null) inode=17045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=149 name=(null) inode=17120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=150 name=(null) inode=17120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=151 name=(null) inode=17121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=152 name=(null) inode=17120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=153 name=(null) inode=17122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=154 name=(null) inode=17120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=155 name=(null) inode=17123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=156 name=(null) inode=17120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=157 name=(null) inode=17124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=158 name=(null) inode=17120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=159 name=(null) inode=17125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=160 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=161 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=162 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=163 name=(null) inode=17127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=164 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=165 name=(null) inode=17128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=166 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=167 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=168 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=169 name=(null) inode=17130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=170 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=171 name=(null) inode=17131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=172 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=173 name=(null) inode=17132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=174 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=175 name=(null) inode=17133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=176 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=177 name=(null) inode=17134 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=178 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=179 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=180 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=181 name=(null) inode=17136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=182 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=183 name=(null) inode=17137 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=184 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=185 name=(null) inode=17138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=186 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=187 name=(null) inode=17139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=188 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=189 name=(null) inode=17140 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=190 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=191 name=(null) inode=17141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=192 name=(null) inode=17141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=193 name=(null) inode=17142 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=194 name=(null) inode=17141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=195 name=(null) inode=17143 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=196 name=(null) inode=17141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=197 name=(null) inode=17144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=198 name=(null) inode=17141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=199 name=(null) inode=17145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=200 name=(null) inode=17141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=201 name=(null) inode=17146 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=202 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=203 name=(null) inode=17147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=204 name=(null) inode=17147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=205 name=(null) inode=17148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=206 name=(null) inode=17147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=207 name=(null) inode=17149 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=208 name=(null) inode=17147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=209 name=(null) inode=17150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=210 name=(null) inode=17147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=211 name=(null) inode=17151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=212 name=(null) inode=17147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=213 name=(null) inode=17152 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=214 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=215 name=(null) inode=17153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=216 name=(null) inode=17153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=217 name=(null) inode=17154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=218 name=(null) inode=17153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=219 name=(null) inode=17155 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=220 name=(null) inode=17153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=221 name=(null) inode=17156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=222 name=(null) inode=17153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=223 name=(null) inode=17157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=224 name=(null) inode=17153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=225 name=(null) inode=17158 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=226 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=227 name=(null) inode=17159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=228 name=(null) inode=17159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=229 name=(null) inode=17160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=230 name=(null) inode=17159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=231 name=(null) inode=17161 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=232 name=(null) inode=17159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=233 name=(null) inode=17162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=234 name=(null) inode=17159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=235 name=(null) inode=17163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=236 name=(null) inode=17159 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=237 name=(null) inode=17164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=238 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=239 name=(null) inode=17165 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=240 name=(null) inode=17165 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=241 name=(null) inode=17166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=242 name=(null) inode=17165 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=243 name=(null) inode=17167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=244 name=(null) inode=17165 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=245 name=(null) inode=17168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=246 name=(null) inode=17165 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=247 name=(null) inode=17169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=248 name=(null) inode=17165 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=249 name=(null) inode=17170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=250 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=251 name=(null) inode=17171 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=252 name=(null) inode=17171 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=253 name=(null) inode=17172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=254 name=(null) inode=17171 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=255 name=(null) inode=17173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=256 name=(null) inode=17171 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=257 name=(null) inode=17174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=258 name=(null) inode=17171 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=259 name=(null) inode=17175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=260 name=(null) inode=17171 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=261 name=(null) inode=17176 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=262 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=263 name=(null) inode=17177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=264 name=(null) inode=17177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=265 name=(null) inode=17178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=266 name=(null) inode=17177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=267 name=(null) inode=17179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=268 name=(null) inode=17177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=269 name=(null) inode=17180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=270 name=(null) inode=17177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=271 name=(null) inode=17181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=272 name=(null) inode=17177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=273 name=(null) inode=17182 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=274 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=275 name=(null) inode=17183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=276 name=(null) inode=17183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=277 name=(null) inode=17184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=278 name=(null) inode=17183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=279 name=(null) inode=17185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=280 name=(null) inode=17183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=281 name=(null) inode=17186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=282 name=(null) inode=17183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=283 name=(null) inode=17187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=284 name=(null) inode=17183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=285 name=(null) inode=17188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=286 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=287 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=288 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=289 name=(null) inode=17190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=290 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=291 name=(null) inode=17191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=292 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=293 name=(null) inode=17192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=294 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=295 name=(null) inode=17193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=296 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=297 name=(null) inode=17194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=298 name=(null) inode=17126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=299 name=(null) inode=17195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=300 name=(null) inode=17195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=301 name=(null) inode=17196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=302 name=(null) inode=17195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=303 name=(null) inode=17197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=304 name=(null) inode=17195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=305 name=(null) inode=17198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=306 name=(null) inode=17195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=307 name=(null) inode=17199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=308 name=(null) inode=17195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PATH item=309 name=(null) inode=17200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 23:37:58.661000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 23:37:58.935169 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Oct 2 23:37:58.935299 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Oct 2 23:37:58.971177 kernel: iTCO_vendor_support: vendor-support=0 Oct 2 23:37:58.971237 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Oct 2 23:37:59.005277 kernel: ipmi_si: Adding ACPI-specified kcs state machine Oct 2 23:37:59.005360 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Oct 2 23:37:59.047184 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Oct 2 23:37:59.047663 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Oct 2 23:37:59.098999 systemd-networkd[1284]: bond0: netdev ready Oct 2 23:37:59.101112 systemd-networkd[1284]: lo: Link UP Oct 2 23:37:59.101115 systemd-networkd[1284]: lo: Gained carrier Oct 2 23:37:59.101587 systemd-networkd[1284]: Enumeration completed Oct 2 23:37:59.101676 systemd[1]: Started systemd-networkd.service. Oct 2 23:37:59.101860 systemd-networkd[1284]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Oct 2 23:37:59.108691 systemd-networkd[1284]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:d7:45.network. Oct 2 23:37:59.109790 kernel: intel_rapl_common: Found RAPL domain package Oct 2 23:37:59.109812 kernel: intel_rapl_common: Found RAPL domain core Oct 2 23:37:59.109824 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Oct 2 23:37:59.109906 kernel: intel_rapl_common: Found RAPL domain dram Oct 2 23:37:59.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.168871 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 23:37:59.197176 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Oct 2 23:37:59.294169 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Oct 2 23:37:59.312169 kernel: ipmi_ssif: IPMI SSIF Interface driver Oct 2 23:37:59.315400 systemd[1]: Finished systemd-udev-settle.service. Oct 2 23:37:59.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.323940 systemd[1]: Starting lvm2-activation-early.service... Oct 2 23:37:59.342735 lvm[1362]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 23:37:59.373630 systemd[1]: Finished lvm2-activation-early.service. Oct 2 23:37:59.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.382328 systemd[1]: Reached target cryptsetup.target. Oct 2 23:37:59.391881 systemd[1]: Starting lvm2-activation.service... Oct 2 23:37:59.394115 lvm[1363]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 23:37:59.425618 systemd[1]: Finished lvm2-activation.service. Oct 2 23:37:59.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.434301 systemd[1]: Reached target local-fs-pre.target. Oct 2 23:37:59.442271 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 23:37:59.442287 systemd[1]: Reached target local-fs.target. Oct 2 23:37:59.451242 systemd[1]: Reached target machines.target. Oct 2 23:37:59.460860 systemd[1]: Starting ldconfig.service... Oct 2 23:37:59.468054 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 23:37:59.468076 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 23:37:59.468608 systemd[1]: Starting systemd-boot-update.service... Oct 2 23:37:59.475669 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 23:37:59.485774 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 23:37:59.485857 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 23:37:59.485879 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 23:37:59.486374 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 23:37:59.486562 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1365 (bootctl) Oct 2 23:37:59.487127 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 23:37:59.492818 systemd-tmpfiles[1369]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 23:37:59.495799 systemd-tmpfiles[1369]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 23:37:59.497725 systemd-tmpfiles[1369]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 23:37:59.507545 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 23:37:59.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.509577 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 23:37:59.509865 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 23:37:59.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.563806 systemd-fsck[1373]: fsck.fat 4.2 (2021-01-31) Oct 2 23:37:59.563806 systemd-fsck[1373]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 23:37:59.564463 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 23:37:59.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.576002 systemd[1]: Mounting boot.mount... Oct 2 23:37:59.587802 systemd[1]: Mounted boot.mount. Oct 2 23:37:59.605584 systemd[1]: Finished systemd-boot-update.service. Oct 2 23:37:59.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.636863 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 23:37:59.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:37:59.651056 systemd[1]: Starting audit-rules.service... Oct 2 23:37:59.656233 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 23:37:59.668000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 23:37:59.668000 audit[1392]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3e135320 a2=420 a3=0 items=0 ppid=1377 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:37:59.668000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 23:37:59.670203 augenrules[1392]: No rules Oct 2 23:37:59.671834 systemd[1]: Starting clean-ca-certificates.service... Oct 2 23:37:59.679214 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Oct 2 23:37:59.680866 systemd-networkd[1284]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:d7:44.network. Oct 2 23:37:59.688982 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 23:37:59.698200 systemd[1]: Starting systemd-resolved.service... Oct 2 23:37:59.706122 systemd[1]: Starting systemd-timesyncd.service... Oct 2 23:37:59.713748 systemd[1]: Starting systemd-update-utmp.service... Oct 2 23:37:59.720481 systemd[1]: Finished audit-rules.service. Oct 2 23:37:59.727370 systemd[1]: Finished clean-ca-certificates.service. Oct 2 23:37:59.744365 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 23:37:59.751215 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 23:37:59.761465 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 23:37:59.762040 systemd[1]: Finished systemd-update-utmp.service. Oct 2 23:37:59.783651 ldconfig[1364]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 23:37:59.789432 systemd[1]: Finished ldconfig.service. Oct 2 23:37:59.793540 systemd-resolved[1399]: Positive Trust Anchors: Oct 2 23:37:59.793546 systemd-resolved[1399]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 23:37:59.793576 systemd-resolved[1399]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 23:37:59.796317 systemd[1]: Started systemd-timesyncd.service. Oct 2 23:37:59.797901 systemd-resolved[1399]: Using system hostname 'ci-3510.3.0-a-10ca9e1f45'. Oct 2 23:37:59.804337 systemd[1]: Reached target time-set.target. Oct 2 23:37:59.812866 systemd[1]: Starting systemd-update-done.service... Oct 2 23:37:59.825428 systemd[1]: Finished systemd-update-done.service. Oct 2 23:37:59.831215 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Oct 2 23:37:59.856216 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Oct 2 23:37:59.856248 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Oct 2 23:37:59.875169 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 23:37:59.895535 systemd-networkd[1284]: bond0: Link UP Oct 2 23:37:59.895723 systemd-networkd[1284]: enp1s0f1np1: Link UP Oct 2 23:37:59.895860 systemd-networkd[1284]: enp1s0f1np1: Gained carrier Oct 2 23:37:59.896319 systemd[1]: Started systemd-resolved.service. Oct 2 23:37:59.896819 systemd-networkd[1284]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:d7:44.network. Oct 2 23:37:59.904280 systemd[1]: Reached target network.target. Oct 2 23:37:59.912239 systemd[1]: Reached target nss-lookup.target. Oct 2 23:37:59.920244 systemd[1]: Reached target sysinit.target. Oct 2 23:37:59.928293 systemd[1]: Started motdgen.path. Oct 2 23:37:59.935273 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 23:37:59.952308 systemd[1]: Started logrotate.timer. Oct 2 23:37:59.956166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:37:59.969305 systemd[1]: Started mdadm.timer. Oct 2 23:37:59.978166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:37:59.991243 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 23:37:59.999166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.014237 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 23:38:00.014252 systemd[1]: Reached target paths.target. Oct 2 23:38:00.021166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.034233 systemd[1]: Reached target timers.target. Oct 2 23:38:00.043166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.056359 systemd[1]: Listening on dbus.socket. Oct 2 23:38:00.064217 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.086166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.095773 systemd[1]: Starting docker.socket... Oct 2 23:38:00.106165 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.126165 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.135656 systemd[1]: Listening on sshd.socket. Oct 2 23:38:00.145166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.158297 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 23:38:00.158504 systemd[1]: Listening on docker.socket. Oct 2 23:38:00.165166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.179282 systemd[1]: Reached target sockets.target. Oct 2 23:38:00.185166 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.199238 systemd[1]: Reached target basic.target. Oct 2 23:38:00.203168 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.207294 systemd-networkd[1284]: enp1s0f0np0: Link UP Oct 2 23:38:00.207459 systemd-networkd[1284]: bond0: Gained carrier Oct 2 23:38:00.207549 systemd-networkd[1284]: enp1s0f0np0: Gained carrier Oct 2 23:38:00.207571 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.239606 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 23:38:00.239627 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Oct 2 23:38:00.249923 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 23:38:00.249938 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 23:38:00.250447 systemd[1]: Starting containerd.service... Oct 2 23:38:00.258871 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 23:38:00.291818 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Oct 2 23:38:00.291838 kernel: bond0: active interface up! Oct 2 23:38:00.296703 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 23:38:00.300365 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.300469 systemd-networkd[1284]: enp1s0f1np1: Link DOWN Oct 2 23:38:00.300472 systemd-networkd[1284]: enp1s0f1np1: Lost carrier Oct 2 23:38:00.306726 systemd[1]: Starting coreos-metadata.service... Oct 2 23:38:00.309371 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.309546 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.313744 systemd[1]: Starting dbus.service... Oct 2 23:38:00.319735 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 23:38:00.324273 jq[1415]: false Oct 2 23:38:00.324805 coreos-metadata[1408]: Oct 02 23:38:00.324 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 23:38:00.327755 systemd[1]: Starting extend-filesystems.service... Oct 2 23:38:00.331632 dbus-daemon[1414]: [system] SELinux support is enabled Oct 2 23:38:00.334272 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 23:38:00.334884 systemd[1]: Starting motdgen.service... Oct 2 23:38:00.335266 extend-filesystems[1417]: Found sda Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda1 Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda2 Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda3 Oct 2 23:38:00.357276 extend-filesystems[1417]: Found usr Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda4 Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda6 Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda7 Oct 2 23:38:00.357276 extend-filesystems[1417]: Found sda9 Oct 2 23:38:00.357276 extend-filesystems[1417]: Checking size of /dev/sda9 Oct 2 23:38:00.357276 extend-filesystems[1417]: Resized partition /dev/sda9 Oct 2 23:38:00.479197 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Oct 2 23:38:00.479218 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 23:38:00.479341 coreos-metadata[1411]: Oct 02 23:38:00.335 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 23:38:00.479341 coreos-metadata[1411]: Oct 02 23:38:00.353 INFO Fetch successful Oct 2 23:38:00.342910 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 23:38:00.479510 coreos-metadata[1408]: Oct 02 23:38:00.343 INFO Fetch successful Oct 2 23:38:00.479535 extend-filesystems[1432]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 23:38:00.369901 unknown[1408]: wrote ssh authorized keys file for user: core Oct 2 23:38:00.376978 systemd[1]: Starting sshd-keygen.service... Oct 2 23:38:00.392600 systemd[1]: Starting systemd-logind.service... Oct 2 23:38:00.496483 update_engine[1444]: I1002 23:38:00.481400 1444 main.cc:92] Flatcar Update Engine starting Oct 2 23:38:00.496483 update_engine[1444]: I1002 23:38:00.485713 1444 update_check_scheduler.cc:74] Next update check in 6m29s Oct 2 23:38:00.410201 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 23:38:00.496654 jq[1445]: true Oct 2 23:38:00.412432 systemd[1]: Starting tcsd.service... Oct 2 23:38:00.419228 systemd-logind[1442]: Watching system buttons on /dev/input/event3 (Power Button) Oct 2 23:38:00.419237 systemd-logind[1442]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 23:38:00.419246 systemd-logind[1442]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Oct 2 23:38:00.419343 systemd-logind[1442]: New seat seat0. Oct 2 23:38:00.423481 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 23:38:00.423843 systemd[1]: Starting update-engine.service... Oct 2 23:38:00.446760 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 23:38:00.449189 systemd-networkd[1284]: enp1s0f1np1: Link UP Oct 2 23:38:00.449358 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.449416 systemd-networkd[1284]: enp1s0f1np1: Gained carrier Oct 2 23:38:00.449420 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.454333 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.454381 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.454439 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:00.461737 systemd[1]: Started dbus.service. Oct 2 23:38:00.489504 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 23:38:00.489590 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 23:38:00.489732 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 23:38:00.489808 systemd[1]: Finished motdgen.service. Oct 2 23:38:00.510553 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 23:38:00.510625 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 23:38:00.514168 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Oct 2 23:38:00.514190 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Oct 2 23:38:00.519510 update-ssh-keys[1448]: Updated "/home/core/.ssh/authorized_keys" Oct 2 23:38:00.538095 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 23:38:00.540062 jq[1450]: true Oct 2 23:38:00.548488 systemd[1]: Finished coreos-metadata.service. Oct 2 23:38:00.548604 env[1451]: time="2023-10-02T23:38:00.548580404Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 23:38:00.557360 env[1451]: time="2023-10-02T23:38:00.557342744Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 23:38:00.557703 env[1451]: time="2023-10-02T23:38:00.557693815Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 23:38:00.558226 env[1451]: time="2023-10-02T23:38:00.558210999Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 23:38:00.558250 env[1451]: time="2023-10-02T23:38:00.558225821Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 23:38:00.558334 env[1451]: time="2023-10-02T23:38:00.558324237Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 23:38:00.558360 env[1451]: time="2023-10-02T23:38:00.558334099Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 23:38:00.558360 env[1451]: time="2023-10-02T23:38:00.558340878Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 23:38:00.558360 env[1451]: time="2023-10-02T23:38:00.558345981Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 23:38:00.558409 env[1451]: time="2023-10-02T23:38:00.558382823Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 23:38:00.559040 env[1451]: time="2023-10-02T23:38:00.559031307Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 23:38:00.559134 env[1451]: time="2023-10-02T23:38:00.559124334Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 23:38:00.559158 env[1451]: time="2023-10-02T23:38:00.559134493Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 23:38:00.559185 env[1451]: time="2023-10-02T23:38:00.559173568Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 23:38:00.559211 env[1451]: time="2023-10-02T23:38:00.559189023Z" level=info msg="metadata content store policy set" policy=shared Oct 2 23:38:00.561820 dbus-daemon[1414]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 23:38:00.567687 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Oct 2 23:38:00.567770 systemd[1]: Condition check resulted in tcsd.service being skipped. Oct 2 23:38:00.567831 systemd[1]: Started update-engine.service. Oct 2 23:38:00.570384 env[1451]: time="2023-10-02T23:38:00.570340396Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 23:38:00.570384 env[1451]: time="2023-10-02T23:38:00.570363729Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 23:38:00.570384 env[1451]: time="2023-10-02T23:38:00.570372029Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570388780Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570398827Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570407449Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570413946Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570421513Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570430048Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570437468Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570450 env[1451]: time="2023-10-02T23:38:00.570443856Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570567 env[1451]: time="2023-10-02T23:38:00.570450906Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 23:38:00.570567 env[1451]: time="2023-10-02T23:38:00.570500657Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 23:38:00.570567 env[1451]: time="2023-10-02T23:38:00.570543776Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 23:38:00.570778 env[1451]: time="2023-10-02T23:38:00.570764172Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 23:38:00.570832 env[1451]: time="2023-10-02T23:38:00.570819296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.570864 env[1451]: time="2023-10-02T23:38:00.570834335Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 23:38:00.571212 env[1451]: time="2023-10-02T23:38:00.571171148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571212 env[1451]: time="2023-10-02T23:38:00.571191955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571212 env[1451]: time="2023-10-02T23:38:00.571200646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571212 env[1451]: time="2023-10-02T23:38:00.571207438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571291 env[1451]: time="2023-10-02T23:38:00.571214568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571291 env[1451]: time="2023-10-02T23:38:00.571221810Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571291 env[1451]: time="2023-10-02T23:38:00.571228506Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571291 env[1451]: time="2023-10-02T23:38:00.571234892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571291 env[1451]: time="2023-10-02T23:38:00.571242793Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571312885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571321841Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571328797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571335246Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571344080Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571353813Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 23:38:00.571366 env[1451]: time="2023-10-02T23:38:00.571363292Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 23:38:00.571466 env[1451]: time="2023-10-02T23:38:00.571383683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 23:38:00.571553 env[1451]: time="2023-10-02T23:38:00.571492699Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 23:38:00.571553 env[1451]: time="2023-10-02T23:38:00.571524095Z" level=info msg="Connect containerd service" Oct 2 23:38:00.571553 env[1451]: time="2023-10-02T23:38:00.571543532Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.571819071Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.571943731Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.571939687Z" level=info msg="Start subscribing containerd event" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.571966545Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.571969441Z" level=info msg="Start recovering state" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.571991277Z" level=info msg="containerd successfully booted in 0.023748s" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.572002727Z" level=info msg="Start event monitor" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.572012189Z" level=info msg="Start snapshots syncer" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.572017237Z" level=info msg="Start cni network conf syncer for default" Oct 2 23:38:00.578042 env[1451]: time="2023-10-02T23:38:00.572021462Z" level=info msg="Start streaming server" Oct 2 23:38:00.576318 systemd[1]: Started containerd.service. Oct 2 23:38:00.578570 bash[1480]: Updated "/home/core/.ssh/authorized_keys" Oct 2 23:38:00.583405 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 23:38:00.593332 systemd[1]: Started systemd-logind.service. Oct 2 23:38:00.602807 systemd[1]: Started locksmithd.service. Oct 2 23:38:00.609895 systemd[1]: Started packet-phone-home.service. Oct 2 23:38:00.615768 curl[1492]: % Total % Received % Xferd Average Speed Time Time Time Current Oct 2 23:38:00.615920 curl[1492]: Dload Upload Total Spent Left Speed Oct 2 23:38:00.615958 sshd_keygen[1441]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 23:38:00.618316 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 23:38:00.618394 systemd[1]: Reached target system-config.target. Oct 2 23:38:00.626270 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 23:38:00.626342 systemd[1]: Reached target user-config.target. Oct 2 23:38:00.637151 systemd[1]: Finished sshd-keygen.service. Oct 2 23:38:00.645986 systemd[1]: Starting issuegen.service... Oct 2 23:38:00.653410 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 23:38:00.653482 systemd[1]: Finished issuegen.service. Oct 2 23:38:00.660967 systemd[1]: Starting systemd-user-sessions.service... Oct 2 23:38:00.667327 locksmithd[1491]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 23:38:00.669431 systemd[1]: Finished systemd-user-sessions.service. Oct 2 23:38:00.677991 systemd[1]: Started getty@tty1.service. Oct 2 23:38:00.685853 systemd[1]: Started serial-getty@ttyS1.service. Oct 2 23:38:00.694330 systemd[1]: Reached target getty.target. Oct 2 23:38:00.740169 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Oct 2 23:38:00.852201 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Oct 2 23:38:00.880696 extend-filesystems[1432]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 23:38:00.880696 extend-filesystems[1432]: old_desc_blocks = 1, new_desc_blocks = 56 Oct 2 23:38:00.880696 extend-filesystems[1432]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Oct 2 23:38:00.919389 extend-filesystems[1417]: Resized filesystem in /dev/sda9 Oct 2 23:38:00.919389 extend-filesystems[1417]: Found sdb Oct 2 23:38:00.881159 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 23:38:00.881260 systemd[1]: Finished extend-filesystems.service. Oct 2 23:38:01.608311 systemd-networkd[1284]: bond0: Gained IPv6LL Oct 2 23:38:01.608538 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.056589 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.056679 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.057573 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 23:38:02.067474 systemd[1]: Reached target network-online.target. Oct 2 23:38:02.077079 systemd[1]: Starting etcd-member.service... Oct 2 23:38:02.111248 systemd[1]: Starting docker.service... Oct 2 23:38:02.127808 env[1528]: time="2023-10-02T23:38:02.127782280Z" level=info msg="Starting up" Oct 2 23:38:02.128449 env[1528]: time="2023-10-02T23:38:02.128433668Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 23:38:02.128449 env[1528]: time="2023-10-02T23:38:02.128446908Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 23:38:02.128520 env[1528]: time="2023-10-02T23:38:02.128462465Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 23:38:02.128520 env[1528]: time="2023-10-02T23:38:02.128472405Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 23:38:02.129299 env[1528]: time="2023-10-02T23:38:02.129289148Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 23:38:02.129299 env[1528]: time="2023-10-02T23:38:02.129297519Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 23:38:02.129345 env[1528]: time="2023-10-02T23:38:02.129307377Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 23:38:02.129345 env[1528]: time="2023-10-02T23:38:02.129312375Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 23:38:02.143353 env[1528]: time="2023-10-02T23:38:02.143310703Z" level=info msg="Loading containers: start." Oct 2 23:38:02.239171 kernel: Initializing XFRM netlink socket Oct 2 23:38:02.261359 env[1528]: time="2023-10-02T23:38:02.261341700Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 23:38:02.262039 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.262086 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.265138 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.265213 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.310963 systemd-networkd[1284]: docker0: Link UP Oct 2 23:38:02.311107 systemd-timesyncd[1400]: Network configuration changed, trying to establish connection. Oct 2 23:38:02.314970 env[1528]: time="2023-10-02T23:38:02.314957432Z" level=info msg="Loading containers: done." Oct 2 23:38:02.320350 env[1528]: time="2023-10-02T23:38:02.320334781Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 23:38:02.320446 env[1528]: time="2023-10-02T23:38:02.320435444Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 23:38:02.320500 env[1528]: time="2023-10-02T23:38:02.320491762Z" level=info msg="Daemon has completed initialization" Oct 2 23:38:02.326450 systemd[1]: Started docker.service. Oct 2 23:38:02.329548 env[1528]: time="2023-10-02T23:38:02.329525550Z" level=info msg="API listen on /run/docker.sock" Oct 2 23:38:02.330067 etcd-wrapper[1518]: Error response from daemon: No such container: etcd-member Oct 2 23:38:02.340677 etcd-wrapper[1651]: Error: No such container: etcd-member Oct 2 23:38:02.368696 etcd-wrapper[1674]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Oct 2 23:38:02.608299 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Oct 2 23:38:05.707035 login[1512]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 23:38:05.714287 login[1511]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 23:38:05.714947 systemd-logind[1442]: New session 1 of user core. Oct 2 23:38:05.715540 systemd[1]: Created slice user-500.slice. Oct 2 23:38:05.716088 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 23:38:05.717290 systemd-logind[1442]: New session 2 of user core. Oct 2 23:38:05.721395 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 23:38:05.722043 systemd[1]: Starting user@500.service... Oct 2 23:38:05.723921 (systemd)[1687]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:05.810587 systemd[1687]: Queued start job for default target default.target. Oct 2 23:38:05.810816 systemd[1687]: Reached target paths.target. Oct 2 23:38:05.810827 systemd[1687]: Reached target sockets.target. Oct 2 23:38:05.810835 systemd[1687]: Reached target timers.target. Oct 2 23:38:05.810842 systemd[1687]: Reached target basic.target. Oct 2 23:38:05.810861 systemd[1687]: Reached target default.target. Oct 2 23:38:05.810875 systemd[1687]: Startup finished in 83ms. Oct 2 23:38:05.810921 systemd[1]: Started user@500.service. Oct 2 23:38:05.811434 systemd[1]: Started session-1.scope. Oct 2 23:38:05.811887 systemd[1]: Started session-2.scope. Oct 2 23:38:07.440337 env[1528]: time="2023-10-02T23:38:07.440226787Z" level=warning msg="Error getting v2 registry: Get \"https://quay.io/v2/\": dial tcp: lookup quay.io: Temporary failure in name resolution" Oct 2 23:38:07.440337 env[1528]: time="2023-10-02T23:38:07.440292223Z" level=info msg="Attempting next endpoint for pull after error: Get \"https://quay.io/v2/\": dial tcp: lookup quay.io: Temporary failure in name resolution" Oct 2 23:38:07.443496 env[1528]: time="2023-10-02T23:38:07.443391024Z" level=error msg="Handler for POST /v1.41/images/create returned error: Get \"https://quay.io/v2/\": dial tcp: lookup quay.io: Temporary failure in name resolution" Oct 2 23:38:07.443886 etcd-wrapper[1674]: docker: Error response from daemon: Get "https://quay.io/v2/": dial tcp: lookup quay.io: Temporary failure in name resolution. Oct 2 23:38:07.443886 etcd-wrapper[1674]: See 'docker run --help'. Oct 2 23:38:07.449810 systemd[1]: etcd-member.service: Main process exited, code=exited, status=125/n/a Oct 2 23:38:07.466984 docker[1707]: Error: No such container: etcd-member Oct 2 23:38:07.467816 systemd[1]: etcd-member.service: Control process exited, code=exited, status=1/FAILURE Oct 2 23:38:07.467876 systemd[1]: etcd-member.service: Failed with result 'exit-code'. Oct 2 23:38:07.468003 systemd[1]: Failed to start etcd-member.service. Oct 2 23:38:07.468305 systemd[1]: Reached target multi-user.target. Oct 2 23:38:07.469019 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 23:38:07.473160 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 23:38:07.473273 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 23:38:07.473417 systemd[1]: Startup finished in 1.852s (kernel) + 16.125s (initrd) + 13.513s (userspace) = 31.492s. Oct 2 23:38:08.135218 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Oct 2 23:38:08.143355 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Oct 2 23:38:09.112418 systemd[1]: Created slice system-sshd.slice. Oct 2 23:38:09.112958 systemd[1]: Started sshd@0-139.178.88.33:22-139.178.89.65:52794.service. Oct 2 23:38:09.155767 systemd[1]: Started sshd@1-139.178.88.33:22-128.199.158.203:51328.service. Oct 2 23:38:09.161067 sshd[1722]: Accepted publickey for core from 139.178.89.65 port 52794 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.161778 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.164261 systemd-logind[1442]: New session 3 of user core. Oct 2 23:38:09.164865 systemd[1]: Started session-3.scope. Oct 2 23:38:09.215956 systemd[1]: Started sshd@2-139.178.88.33:22-139.178.89.65:52808.service. Oct 2 23:38:09.250269 sshd[1730]: Accepted publickey for core from 139.178.89.65 port 52808 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.250970 sshd[1730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.253098 systemd-logind[1442]: New session 4 of user core. Oct 2 23:38:09.253577 systemd[1]: Started session-4.scope. Oct 2 23:38:09.307103 sshd[1730]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:09.308489 systemd[1]: sshd@2-139.178.88.33:22-139.178.89.65:52808.service: Deactivated successfully. Oct 2 23:38:09.308793 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 23:38:09.309074 systemd-logind[1442]: Session 4 logged out. Waiting for processes to exit. Oct 2 23:38:09.309621 systemd[1]: Started sshd@3-139.178.88.33:22-139.178.89.65:52816.service. Oct 2 23:38:09.310019 systemd-logind[1442]: Removed session 4. Oct 2 23:38:09.345282 sshd[1736]: Accepted publickey for core from 139.178.89.65 port 52816 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.346224 sshd[1736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.349479 systemd-logind[1442]: New session 5 of user core. Oct 2 23:38:09.350132 systemd[1]: Started session-5.scope. Oct 2 23:38:09.404091 sshd[1736]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:09.410743 systemd[1]: sshd@3-139.178.88.33:22-139.178.89.65:52816.service: Deactivated successfully. Oct 2 23:38:09.412324 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 23:38:09.414012 systemd-logind[1442]: Session 5 logged out. Waiting for processes to exit. Oct 2 23:38:09.416530 systemd[1]: Started sshd@4-139.178.88.33:22-139.178.89.65:52830.service. Oct 2 23:38:09.418888 systemd-logind[1442]: Removed session 5. Oct 2 23:38:09.477153 sshd[1742]: Accepted publickey for core from 139.178.89.65 port 52830 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.477772 sshd[1742]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.480103 systemd-logind[1442]: New session 6 of user core. Oct 2 23:38:09.480593 systemd[1]: Started session-6.scope. Oct 2 23:38:09.531366 sshd[1742]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:09.532843 systemd[1]: sshd@4-139.178.88.33:22-139.178.89.65:52830.service: Deactivated successfully. Oct 2 23:38:09.533132 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 23:38:09.533571 systemd-logind[1442]: Session 6 logged out. Waiting for processes to exit. Oct 2 23:38:09.533989 systemd[1]: Started sshd@5-139.178.88.33:22-139.178.89.65:52838.service. Oct 2 23:38:09.534462 systemd-logind[1442]: Removed session 6. Oct 2 23:38:09.569403 sshd[1748]: Accepted publickey for core from 139.178.89.65 port 52838 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.570313 sshd[1748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.573557 systemd-logind[1442]: New session 7 of user core. Oct 2 23:38:09.574184 systemd[1]: Started session-7.scope. Oct 2 23:38:09.659671 sudo[1751]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 23:38:09.660593 sudo[1751]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 23:38:09.678589 dbus-daemon[1414]: \xd0]\xfdT0V: received setenforce notice (enforcing=-948815088) Oct 2 23:38:09.683192 sudo[1751]: pam_unix(sudo:session): session closed for user root Oct 2 23:38:09.685135 sshd[1748]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:09.686668 systemd[1]: sshd@5-139.178.88.33:22-139.178.89.65:52838.service: Deactivated successfully. Oct 2 23:38:09.686970 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 23:38:09.687347 systemd-logind[1442]: Session 7 logged out. Waiting for processes to exit. Oct 2 23:38:09.687830 systemd[1]: Started sshd@6-139.178.88.33:22-139.178.89.65:52848.service. Oct 2 23:38:09.688146 systemd-logind[1442]: Removed session 7. Oct 2 23:38:09.723918 sshd[1755]: Accepted publickey for core from 139.178.89.65 port 52848 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.724813 sshd[1755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.727897 systemd-logind[1442]: New session 8 of user core. Oct 2 23:38:09.728532 systemd[1]: Started session-8.scope. Oct 2 23:38:09.790558 sudo[1759]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 23:38:09.791148 sudo[1759]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 23:38:09.798405 sudo[1759]: pam_unix(sudo:session): session closed for user root Oct 2 23:38:09.810773 sudo[1758]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 23:38:09.811374 sudo[1758]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 23:38:09.835672 systemd[1]: Stopping audit-rules.service... Oct 2 23:38:09.837000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 23:38:09.838686 auditctl[1762]: No rules Oct 2 23:38:09.839723 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 23:38:09.840278 systemd[1]: Stopped audit-rules.service. Oct 2 23:38:09.844252 kernel: kauditd_printk_skb: 374 callbacks suppressed Oct 2 23:38:09.844385 kernel: audit: type=1305 audit(1696289889.837:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 23:38:09.845155 systemd[1]: Starting audit-rules.service... Oct 2 23:38:09.837000 audit[1762]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6edf3fc0 a2=420 a3=0 items=0 ppid=1 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:09.868616 augenrules[1779]: No rules Oct 2 23:38:09.869034 systemd[1]: Finished audit-rules.service. Oct 2 23:38:09.869593 sudo[1758]: pam_unix(sudo:session): session closed for user root Oct 2 23:38:09.870371 sshd[1755]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:09.872666 systemd[1]: sshd@6-139.178.88.33:22-139.178.89.65:52848.service: Deactivated successfully. Oct 2 23:38:09.873182 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 23:38:09.873783 systemd-logind[1442]: Session 8 logged out. Waiting for processes to exit. Oct 2 23:38:09.874806 systemd[1]: Started sshd@7-139.178.88.33:22-139.178.89.65:52858.service. Oct 2 23:38:09.875582 systemd-logind[1442]: Removed session 8. Oct 2 23:38:09.891597 kernel: audit: type=1300 audit(1696289889.837:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6edf3fc0 a2=420 a3=0 items=0 ppid=1 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:09.891651 kernel: audit: type=1327 audit(1696289889.837:158): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 23:38:09.837000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 23:38:09.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.923570 kernel: audit: type=1131 audit(1696289889.839:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.923603 kernel: audit: type=1130 audit(1696289889.868:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.930537 sshd[1785]: Accepted publickey for core from 139.178.89.65 port 52858 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:09.931900 sshd[1785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:09.934476 systemd-logind[1442]: New session 9 of user core. Oct 2 23:38:09.934890 systemd[1]: Started session-9.scope. Oct 2 23:38:09.868000 audit[1758]: USER_END pid=1758 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.972149 kernel: audit: type=1106 audit(1696289889.868:161): pid=1758 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.972177 kernel: audit: type=1104 audit(1696289889.868:162): pid=1758 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.868000 audit[1758]: CRED_DISP pid=1758 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.995722 kernel: audit: type=1106 audit(1696289889.869:163): pid=1755 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:09.869000 audit[1755]: USER_END pid=1755 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:09.869000 audit[1755]: CRED_DISP pid=1755 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:10.053526 kernel: audit: type=1104 audit(1696289889.869:164): pid=1755 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:10.053556 kernel: audit: type=1131 audit(1696289889.871:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.88.33:22-139.178.89.65:52848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.88.33:22-139.178.89.65:52848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.88.33:22-139.178.89.65:52858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:09.927000 audit[1785]: USER_ACCT pid=1785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:09.930000 audit[1785]: CRED_ACQ pid=1785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:09.930000 audit[1785]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaf797ad0 a2=3 a3=0 items=0 ppid=1 pid=1785 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:09.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 23:38:09.931000 audit[1785]: USER_START pid=1785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:09.936000 audit[1787]: CRED_ACQ pid=1787 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:10.145865 sshd[1725]: Invalid user dungtv from 128.199.158.203 port 51328 Oct 2 23:38:10.147365 sshd[1725]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:10.147663 sshd[1725]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:38:10.147686 sshd[1725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:38:10.147901 sshd[1725]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:10.146000 audit[1725]: USER_AUTH pid=1725 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dungtv" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:38:10.781381 curl[1492]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:04 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:05 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:06 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:07 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:08 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:09 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0 Oct 2 23:38:10.783811 systemd[1]: packet-phone-home.service: Deactivated successfully. Oct 2 23:38:10.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=packet-phone-home comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:11.023626 systemd[1]: Started sshd@8-139.178.88.33:22-121.15.4.92:47886.service. Oct 2 23:38:11.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.88.33:22-121.15.4.92:47886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:11.934571 sshd[1800]: Invalid user ooo from 121.15.4.92 port 47886 Oct 2 23:38:11.940629 sshd[1800]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:11.941604 sshd[1800]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:38:11.941693 sshd[1800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:38:11.942567 sshd[1800]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:11.941000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ooo" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:38:12.320859 sshd[1725]: Failed password for invalid user dungtv from 128.199.158.203 port 51328 ssh2 Oct 2 23:38:12.608831 sshd[1725]: Received disconnect from 128.199.158.203 port 51328:11: Bye Bye [preauth] Oct 2 23:38:12.608831 sshd[1725]: Disconnected from invalid user dungtv 128.199.158.203 port 51328 [preauth] Oct 2 23:38:12.611254 systemd[1]: sshd@1-139.178.88.33:22-128.199.158.203:51328.service: Deactivated successfully. Oct 2 23:38:12.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@1-139.178.88.33:22-128.199.158.203:51328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:13.920923 sshd[1800]: Failed password for invalid user ooo from 121.15.4.92 port 47886 ssh2 Oct 2 23:38:14.131719 sshd[1800]: Received disconnect from 121.15.4.92 port 47886:11: Bye Bye [preauth] Oct 2 23:38:14.131719 sshd[1800]: Disconnected from invalid user ooo 121.15.4.92 port 47886 [preauth] Oct 2 23:38:14.134260 systemd[1]: sshd@8-139.178.88.33:22-121.15.4.92:47886.service: Deactivated successfully. Oct 2 23:38:14.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.88.33:22-121.15.4.92:47886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:15.113279 sshd[1785]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:15.114000 audit[1785]: USER_END pid=1785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:15.119232 systemd[1]: sshd@7-139.178.88.33:22-139.178.89.65:52858.service: Deactivated successfully. Oct 2 23:38:15.120880 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 23:38:15.121747 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 23:38:15.121789 kernel: audit: type=1106 audit(1696289895.114:178): pid=1785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:15.121923 systemd-logind[1442]: Session 9 logged out. Waiting for processes to exit. Oct 2 23:38:15.122575 systemd-logind[1442]: Removed session 9. Oct 2 23:38:15.115000 audit[1785]: CRED_DISP pid=1785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:15.283561 kernel: audit: type=1104 audit(1696289895.115:179): pid=1785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:15.283585 kernel: audit: type=1131 audit(1696289895.118:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.88.33:22-139.178.89.65:52858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:15.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.88.33:22-139.178.89.65:52858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:17.664242 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1. Oct 2 23:38:17.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:17.664782 systemd[1]: Stopped etcd-member.service. Oct 2 23:38:17.668109 systemd[1]: Starting etcd-member.service... Oct 2 23:38:17.682130 etcd-wrapper[1810]: Error response from daemon: No such container: etcd-member Oct 2 23:38:17.693101 etcd-wrapper[1821]: Error: No such container: etcd-member Oct 2 23:38:17.707371 etcd-wrapper[1841]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Oct 2 23:38:17.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:17.792140 kernel: audit: type=1130 audit(1696289897.663:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:17.792212 kernel: audit: type=1131 audit(1696289897.663:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:19.027392 etcd-wrapper[1841]: v3.5.0: Pulling from coreos/etcd Oct 2 23:38:19.337927 etcd-wrapper[1841]: 1813d21adc01: Pulling fs layer Oct 2 23:38:19.337927 etcd-wrapper[1841]: 6e96907ab677: Pulling fs layer Oct 2 23:38:19.337927 etcd-wrapper[1841]: 444ed0ea8673: Pulling fs layer Oct 2 23:38:19.337927 etcd-wrapper[1841]: 0fd2df5633f0: Pulling fs layer Oct 2 23:38:19.337927 etcd-wrapper[1841]: 8cc22b9456bb: Pulling fs layer Oct 2 23:38:19.337927 etcd-wrapper[1841]: 7ac70aecd290: Pulling fs layer Oct 2 23:38:19.337927 etcd-wrapper[1841]: 4b376c64dfe4: Pulling fs layer Oct 2 23:38:19.338678 etcd-wrapper[1841]: 7ac70aecd290: Waiting Oct 2 23:38:19.338678 etcd-wrapper[1841]: 4b376c64dfe4: Waiting Oct 2 23:38:19.338678 etcd-wrapper[1841]: 0fd2df5633f0: Waiting Oct 2 23:38:19.338678 etcd-wrapper[1841]: 8cc22b9456bb: Waiting Oct 2 23:38:19.705287 etcd-wrapper[1841]: 444ed0ea8673: Download complete Oct 2 23:38:19.723005 etcd-wrapper[1841]: 6e96907ab677: Verifying Checksum Oct 2 23:38:19.723005 etcd-wrapper[1841]: 6e96907ab677: Download complete Oct 2 23:38:19.797559 etcd-wrapper[1841]: 1813d21adc01: Verifying Checksum Oct 2 23:38:19.797559 etcd-wrapper[1841]: 1813d21adc01: Download complete Oct 2 23:38:20.030620 etcd-wrapper[1841]: 0fd2df5633f0: Verifying Checksum Oct 2 23:38:20.030620 etcd-wrapper[1841]: 0fd2df5633f0: Download complete Oct 2 23:38:20.033805 etcd-wrapper[1841]: 8cc22b9456bb: Verifying Checksum Oct 2 23:38:20.033805 etcd-wrapper[1841]: 8cc22b9456bb: Download complete Oct 2 23:38:20.092284 etcd-wrapper[1841]: 7ac70aecd290: Verifying Checksum Oct 2 23:38:20.092284 etcd-wrapper[1841]: 7ac70aecd290: Download complete Oct 2 23:38:20.341570 etcd-wrapper[1841]: 1813d21adc01: Pull complete Oct 2 23:38:20.343137 etcd-wrapper[1841]: 4b376c64dfe4: Verifying Checksum Oct 2 23:38:20.343137 etcd-wrapper[1841]: 4b376c64dfe4: Download complete Oct 2 23:38:20.544203 systemd[1]: var-lib-docker-overlay2-c8016af5a34639e836d5a0c1c6df7c3936b9fcf7ad12f3548e738687f9a1c0bd-merged.mount: Deactivated successfully. Oct 2 23:38:20.768943 etcd-wrapper[1841]: 6e96907ab677: Pull complete Oct 2 23:38:20.924732 systemd[1]: var-lib-docker-overlay2-7f60e2ce32df6b0851de32e59d5f0d836a8d44f534543cb66e2d1f72f075be6c-merged.mount: Deactivated successfully. Oct 2 23:38:20.985417 etcd-wrapper[1841]: 444ed0ea8673: Pull complete Oct 2 23:38:21.176819 etcd-wrapper[1841]: 0fd2df5633f0: Pull complete Oct 2 23:38:21.204261 etcd-wrapper[1841]: 8cc22b9456bb: Pull complete Oct 2 23:38:21.244920 etcd-wrapper[1841]: 7ac70aecd290: Pull complete Oct 2 23:38:21.269159 etcd-wrapper[1841]: 4b376c64dfe4: Pull complete Oct 2 23:38:21.271875 etcd-wrapper[1841]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Oct 2 23:38:21.273094 etcd-wrapper[1841]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Oct 2 23:38:21.316078 env[1451]: time="2023-10-02T23:38:21.316018447Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 23:38:21.316078 env[1451]: time="2023-10-02T23:38:21.316047859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 23:38:21.316078 env[1451]: time="2023-10-02T23:38:21.316059824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 23:38:21.316389 env[1451]: time="2023-10-02T23:38:21.316131938Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/b19e0908a97f1722a99328f2c28d012b3a0cba84c531593cb6bd4ccc23561835 pid=2022 runtime=io.containerd.runc.v2 Oct 2 23:38:21.335663 systemd[1]: Started docker-b19e0908a97f1722a99328f2c28d012b3a0cba84c531593cb6bd4ccc23561835.scope. Oct 2 23:38:21.345486 systemd[1]: var-lib-docker-overlay2-d16e7ee2d08c766c7569f3fa35f7731b5a7af0164e1dee5e1b9f47f196f76049-merged.mount: Deactivated successfully. Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.473078 kernel: audit: type=1400 audit(1696289901.346:183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.473116 kernel: audit: type=1400 audit(1696289901.346:184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.473132 kernel: audit: type=1400 audit(1696289901.346:185): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.535806 kernel: audit: type=1400 audit(1696289901.346:186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.599447 kernel: audit: type=1400 audit(1696289901.346:187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.663361 kernel: audit: type=1400 audit(1696289901.346:188): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.727248 kernel: audit: type=1400 audit(1696289901.346:189): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.791186 kernel: audit: type=1400 audit(1696289901.346:190): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.855609 kernel: audit: type=1400 audit(1696289901.346:191): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.983471 kernel: audit: type=1400 audit(1696289901.471:192): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.471000 audit: BPF prog-id=31 op=LOAD Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:21.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F62313965303930386139376631373232613939333238663263 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:21.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F62313965303930386139376631373232613939333238663263 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.472000 audit: BPF prog-id=32 op=LOAD Oct 2 23:38:21.472000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003089d0 items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:21.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F62313965303930386139376631373232613939333238663263 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.598000 audit: BPF prog-id=33 op=LOAD Oct 2 23:38:21.598000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308a18 items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:21.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F62313965303930386139376631373232613939333238663263 Oct 2 23:38:21.726000 audit: BPF prog-id=33 op=UNLOAD Oct 2 23:38:21.726000 audit: BPF prog-id=32 op=UNLOAD Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 23:38:21.726000 audit: BPF prog-id=34 op=LOAD Oct 2 23:38:21.726000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308e78 items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:21.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F62313965303930386139376631373232613939333238663263 Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"info","ts":1696289902.023777,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"info","ts":1696289902.023821,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"5220630e9113455089987d0e837255d8"} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"warn","ts":1696289902.0238416,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"warn","ts":1696289902.0238469,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"warn","ts":1696289902.0238507,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"warn","ts":1696289902.0238545,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.023Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.124.193:2379"]} Oct 2 23:38:22.023975 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.023Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Oct 2 23:38:22.024312 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.024Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Oct 2 23:38:22.024351 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.024Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"5220630e9113455089987d0e837255d8","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.124.193:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"5220630e9113455089987d0e837255d8=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Oct 2 23:38:22.025080 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.024Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"589.295µs"} Oct 2 23:38:22.026340 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.026Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Oct 2 23:38:22.026340 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.026Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Oct 2 23:38:22.026340 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.026Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Oct 2 23:38:22.026340 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.026Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Oct 2 23:38:22.026340 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.026Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Oct 2 23:38:22.026340 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.026Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Oct 2 23:38:22.026913 etcd-wrapper[1841]: {"level":"warn","ts":"2023-10-02T23:38:22.026Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Oct 2 23:38:22.027347 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.027Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Oct 2 23:38:22.027550 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.027Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Oct 2 23:38:22.027708 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.027Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Oct 2 23:38:22.027708 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.027Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Oct 2 23:38:22.028212 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.028Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Oct 2 23:38:22.028246 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.028Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Oct 2 23:38:22.029065 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.028Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.124.193:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Oct 2 23:38:22.029106 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.029Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Oct 2 23:38:22.029106 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.029Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.126Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.126Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.127Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.127Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.127Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.127Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Oct 2 23:38:22.127401 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.127Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Oct 2 23:38:22.131582 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Oct 2 23:38:22.131582 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:5220630e9113455089987d0e837255d8 ClientURLs:[http://10.67.124.193:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Oct 2 23:38:22.131582 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Oct 2 23:38:22.132132 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Oct 2 23:38:22.132132 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Oct 2 23:38:22.132132 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Oct 2 23:38:22.132132 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Oct 2 23:38:22.132132 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.131Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Oct 2 23:38:22.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:22.132127 systemd[1]: Started etcd-member.service. Oct 2 23:38:22.133755 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:38:22.133Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Oct 2 23:38:24.220877 systemd[1]: Started sshd@9-139.178.88.33:22-43.136.35.103:45862.service. Oct 2 23:38:24.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.88.33:22-43.136.35.103:45862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:25.121799 systemd[1]: Started sshd@10-139.178.88.33:22-139.178.89.65:57404.service. Oct 2 23:38:25.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.88.33:22-139.178.89.65:57404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:25.155327 sshd[2071]: Invalid user ht from 43.136.35.103 port 45862 Oct 2 23:38:25.156882 sshd[2071]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:25.157148 sshd[2071]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:38:25.157181 sshd[2071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:38:25.156000 audit[2074]: USER_ACCT pid=2074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:25.157429 sshd[2074]: Accepted publickey for core from 139.178.89.65 port 57404 ssh2: RSA SHA256:6bSavBiaJ/6Bay5oW/hArqm18cB9FuXY6RiKsI2WLUU Oct 2 23:38:25.156000 audit[2071]: USER_AUTH pid=2071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ht" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:38:25.157465 sshd[2071]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:25.156000 audit[2074]: CRED_ACQ pid=2074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:25.156000 audit[2074]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9bd467a0 a2=3 a3=0 items=0 ppid=1 pid=2074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 23:38:25.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 23:38:25.158297 sshd[2074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 23:38:25.161100 systemd-logind[1442]: New session 10 of user core. Oct 2 23:38:25.161723 systemd[1]: Started session-10.scope. Oct 2 23:38:25.163000 audit[2074]: USER_START pid=2074 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:25.164000 audit[2076]: CRED_ACQ pid=2076 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:25.228559 sshd[2074]: pam_unix(sshd:session): session closed for user core Oct 2 23:38:25.227000 audit[2074]: USER_END pid=2074 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:25.228000 audit[2074]: CRED_DISP pid=2074 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 23:38:25.229971 systemd[1]: sshd@10-139.178.88.33:22-139.178.89.65:57404.service: Deactivated successfully. Oct 2 23:38:25.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.88.33:22-139.178.89.65:57404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:25.230404 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 23:38:25.230852 systemd-logind[1442]: Session 10 logged out. Waiting for processes to exit. Oct 2 23:38:25.231542 systemd-logind[1442]: Removed session 10. Oct 2 23:38:26.724282 sshd[2071]: Failed password for invalid user ht from 43.136.35.103 port 45862 ssh2 Oct 2 23:38:27.575655 sshd[2071]: Received disconnect from 43.136.35.103 port 45862:11: Bye Bye [preauth] Oct 2 23:38:27.575655 sshd[2071]: Disconnected from invalid user ht 43.136.35.103 port 45862 [preauth] Oct 2 23:38:27.578209 systemd[1]: sshd@9-139.178.88.33:22-43.136.35.103:45862.service: Deactivated successfully. Oct 2 23:38:27.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.88.33:22-43.136.35.103:45862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:27.606396 kernel: kauditd_printk_skb: 61 callbacks suppressed Oct 2 23:38:27.606428 kernel: audit: type=1131 audit(1696289907.577:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.88.33:22-43.136.35.103:45862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:32.932991 systemd-resolved[1399]: Clock change detected. Flushing caches. Oct 2 23:38:32.933353 systemd-timesyncd[1400]: Contacted time server [2604:2dc0:101:200::b9d]:123 (2.flatcar.pool.ntp.org). Oct 2 23:38:32.933484 systemd-timesyncd[1400]: Initial clock synchronization to Mon 2023-10-02 23:38:32.932832 UTC. Oct 2 23:38:46.451102 update_engine[1444]: I1002 23:38:46.450984 1444 update_attempter.cc:505] Updating boot flags... Oct 2 23:38:48.816953 systemd[1]: Started sshd@11-139.178.88.33:22-20.101.101.40:50020.service. Oct 2 23:38:48.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.88.33:22-20.101.101.40:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:48.908996 kernel: audit: type=1130 audit(1696289928.815:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.88.33:22-20.101.101.40:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:49.709922 sshd[2114]: Invalid user ooo from 20.101.101.40 port 50020 Oct 2 23:38:49.715920 sshd[2114]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:49.716900 sshd[2114]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:38:49.716984 sshd[2114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:38:49.717849 sshd[2114]: pam_faillock(sshd:auth): User unknown Oct 2 23:38:49.716000 audit[2114]: USER_AUTH pid=2114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ooo" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:38:49.809996 kernel: audit: type=1100 audit(1696289929.716:215): pid=2114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ooo" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:38:51.244133 sshd[2114]: Failed password for invalid user ooo from 20.101.101.40 port 50020 ssh2 Oct 2 23:38:51.899001 sshd[2114]: Received disconnect from 20.101.101.40 port 50020:11: Bye Bye [preauth] Oct 2 23:38:51.899001 sshd[2114]: Disconnected from invalid user ooo 20.101.101.40 port 50020 [preauth] Oct 2 23:38:51.901532 systemd[1]: sshd@11-139.178.88.33:22-20.101.101.40:50020.service: Deactivated successfully. Oct 2 23:38:51.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.88.33:22-20.101.101.40:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:38:51.993998 kernel: audit: type=1131 audit(1696289931.900:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.88.33:22-20.101.101.40:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:19.662808 systemd[1]: Started sshd@12-139.178.88.33:22-23.126.62.36:38738.service. Oct 2 23:39:19.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.88.33:22-23.126.62.36:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:19.755836 kernel: audit: type=1130 audit(1696289959.662:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.88.33:22-23.126.62.36:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:20.135735 sshd[2118]: Invalid user 1 from 23.126.62.36 port 38738 Oct 2 23:39:20.141020 sshd[2118]: pam_faillock(sshd:auth): User unknown Oct 2 23:39:20.141280 sshd[2118]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:39:20.141354 sshd[2118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:39:20.140000 audit[2118]: USER_AUTH pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="1" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:39:20.141533 sshd[2118]: pam_faillock(sshd:auth): User unknown Oct 2 23:39:20.232823 kernel: audit: type=1100 audit(1696289960.140:218): pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="1" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:39:21.924571 sshd[2118]: Failed password for invalid user 1 from 23.126.62.36 port 38738 ssh2 Oct 2 23:39:22.550830 sshd[2118]: Received disconnect from 23.126.62.36 port 38738:11: Bye Bye [preauth] Oct 2 23:39:22.550830 sshd[2118]: Disconnected from invalid user 1 23.126.62.36 port 38738 [preauth] Oct 2 23:39:22.553423 systemd[1]: sshd@12-139.178.88.33:22-23.126.62.36:38738.service: Deactivated successfully. Oct 2 23:39:22.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.88.33:22-23.126.62.36:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:22.646996 kernel: audit: type=1131 audit(1696289962.552:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.88.33:22-23.126.62.36:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:32.376218 systemd[1]: Started sshd@13-139.178.88.33:22-218.92.0.27:60204.service. Oct 2 23:39:32.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.33:22-218.92.0.27:60204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:32.468891 kernel: audit: type=1130 audit(1696289972.375:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.33:22-218.92.0.27:60204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:33.255242 systemd[1]: Started sshd@14-139.178.88.33:22-43.136.35.103:52378.service. Oct 2 23:39:33.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.33:22-43.136.35.103:52378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:33.348991 kernel: audit: type=1130 audit(1696289973.254:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.33:22-43.136.35.103:52378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:34.279355 sshd[2124]: Invalid user monte from 43.136.35.103 port 52378 Oct 2 23:39:34.285694 sshd[2124]: pam_faillock(sshd:auth): User unknown Oct 2 23:39:34.286694 sshd[2124]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:39:34.286810 sshd[2124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:39:34.287817 sshd[2124]: pam_faillock(sshd:auth): User unknown Oct 2 23:39:34.287000 audit[2124]: USER_AUTH pid=2124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monte" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:39:34.380982 kernel: audit: type=1100 audit(1696289974.287:222): pid=2124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monte" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:39:36.326143 sshd[2124]: Failed password for invalid user monte from 43.136.35.103 port 52378 ssh2 Oct 2 23:39:36.809045 sshd[2124]: Received disconnect from 43.136.35.103 port 52378:11: Bye Bye [preauth] Oct 2 23:39:36.809045 sshd[2124]: Disconnected from invalid user monte 43.136.35.103 port 52378 [preauth] Oct 2 23:39:36.811508 systemd[1]: sshd@14-139.178.88.33:22-43.136.35.103:52378.service: Deactivated successfully. Oct 2 23:39:36.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.33:22-43.136.35.103:52378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:36.903983 kernel: audit: type=1131 audit(1696289976.811:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.88.33:22-43.136.35.103:52378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:37.960233 systemd[1]: Started sshd@15-139.178.88.33:22-128.199.158.203:52406.service. Oct 2 23:39:37.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.33:22-128.199.158.203:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:38.052886 kernel: audit: type=1130 audit(1696289977.959:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.33:22-128.199.158.203:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:38.892048 sshd[2128]: Invalid user box from 128.199.158.203 port 52406 Oct 2 23:39:38.897944 sshd[2128]: pam_faillock(sshd:auth): User unknown Oct 2 23:39:38.899122 sshd[2128]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:39:38.899212 sshd[2128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:39:38.900206 sshd[2128]: pam_faillock(sshd:auth): User unknown Oct 2 23:39:38.899000 audit[2128]: USER_AUTH pid=2128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="box" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:39:38.992965 kernel: audit: type=1100 audit(1696289978.899:225): pid=2128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="box" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:39:40.823492 sshd[2128]: Failed password for invalid user box from 128.199.158.203 port 52406 ssh2 Oct 2 23:39:41.310472 sshd[2128]: Received disconnect from 128.199.158.203 port 52406:11: Bye Bye [preauth] Oct 2 23:39:41.310472 sshd[2128]: Disconnected from invalid user box 128.199.158.203 port 52406 [preauth] Oct 2 23:39:41.312933 systemd[1]: sshd@15-139.178.88.33:22-128.199.158.203:52406.service: Deactivated successfully. Oct 2 23:39:41.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.33:22-128.199.158.203:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:39:41.405777 kernel: audit: type=1131 audit(1696289981.312:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.88.33:22-128.199.158.203:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:27.373314 systemd[1]: Started sshd@16-139.178.88.33:22-20.101.101.40:52006.service. Oct 2 23:40:27.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.33:22-20.101.101.40:52006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:27.465996 kernel: audit: type=1130 audit(1696290027.372:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.33:22-20.101.101.40:52006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:27.602258 systemd[1]: Started sshd@17-139.178.88.33:22-118.97.212.14:56390.service. Oct 2 23:40:27.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.33:22-118.97.212.14:56390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:27.694788 kernel: audit: type=1130 audit(1696290027.601:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.33:22-118.97.212.14:56390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:28.238561 sshd[2135]: Invalid user adnan from 20.101.101.40 port 52006 Oct 2 23:40:28.244610 sshd[2135]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:28.245659 sshd[2135]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:40:28.245746 sshd[2135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:40:28.246804 sshd[2135]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:28.245000 audit[2135]: USER_AUTH pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="adnan" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:40:28.339866 kernel: audit: type=1100 audit(1696290028.245:229): pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="adnan" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:40:28.830162 sshd[2138]: Invalid user xmq from 118.97.212.14 port 56390 Oct 2 23:40:28.836218 sshd[2138]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:28.837391 sshd[2138]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:40:28.837483 sshd[2138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Oct 2 23:40:28.838525 sshd[2138]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:28.836000 audit[2138]: USER_AUTH pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmq" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:40:28.930885 kernel: audit: type=1100 audit(1696290028.836:230): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmq" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:40:30.365996 sshd[2135]: Failed password for invalid user adnan from 20.101.101.40 port 52006 ssh2 Oct 2 23:40:30.957669 sshd[2138]: Failed password for invalid user xmq from 118.97.212.14 port 56390 ssh2 Oct 2 23:40:31.843409 sshd[2135]: Received disconnect from 20.101.101.40 port 52006:11: Bye Bye [preauth] Oct 2 23:40:31.843409 sshd[2135]: Disconnected from invalid user adnan 20.101.101.40 port 52006 [preauth] Oct 2 23:40:31.845895 systemd[1]: sshd@16-139.178.88.33:22-20.101.101.40:52006.service: Deactivated successfully. Oct 2 23:40:31.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.33:22-20.101.101.40:52006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:31.938993 kernel: audit: type=1131 audit(1696290031.845:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.88.33:22-20.101.101.40:52006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:32.715495 sshd[2138]: Received disconnect from 118.97.212.14 port 56390:11: Bye Bye [preauth] Oct 2 23:40:32.715495 sshd[2138]: Disconnected from invalid user xmq 118.97.212.14 port 56390 [preauth] Oct 2 23:40:32.718000 systemd[1]: sshd@17-139.178.88.33:22-118.97.212.14:56390.service: Deactivated successfully. Oct 2 23:40:32.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.33:22-118.97.212.14:56390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:32.810991 kernel: audit: type=1131 audit(1696290032.717:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.88.33:22-118.97.212.14:56390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:44.214733 systemd[1]: Started sshd@18-139.178.88.33:22-43.136.35.103:55316.service. Oct 2 23:40:44.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.33:22-43.136.35.103:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:44.307999 kernel: audit: type=1130 audit(1696290044.213:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.33:22-43.136.35.103:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:45.144516 sshd[2143]: Invalid user iwan from 43.136.35.103 port 55316 Oct 2 23:40:45.150509 sshd[2143]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:45.151627 sshd[2143]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:40:45.151714 sshd[2143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:40:45.152669 sshd[2143]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:45.151000 audit[2143]: USER_AUTH pid=2143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iwan" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:40:45.244834 kernel: audit: type=1100 audit(1696290045.151:234): pid=2143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iwan" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:40:47.271946 sshd[2143]: Failed password for invalid user iwan from 43.136.35.103 port 55316 ssh2 Oct 2 23:40:48.208607 sshd[2143]: Received disconnect from 43.136.35.103 port 55316:11: Bye Bye [preauth] Oct 2 23:40:48.208607 sshd[2143]: Disconnected from invalid user iwan 43.136.35.103 port 55316 [preauth] Oct 2 23:40:48.211103 systemd[1]: sshd@18-139.178.88.33:22-43.136.35.103:55316.service: Deactivated successfully. Oct 2 23:40:48.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.33:22-43.136.35.103:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:48.305000 kernel: audit: type=1131 audit(1696290048.209:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.88.33:22-43.136.35.103:55316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:53.655120 systemd[1]: Started sshd@19-139.178.88.33:22-121.15.4.92:41353.service. Oct 2 23:40:53.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.33:22-121.15.4.92:41353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:53.747998 kernel: audit: type=1130 audit(1696290053.653:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.33:22-121.15.4.92:41353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:54.594591 sshd[2148]: Invalid user dotnet from 121.15.4.92 port 41353 Oct 2 23:40:54.600674 sshd[2148]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:54.601660 sshd[2148]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:40:54.601750 sshd[2148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:40:54.602706 sshd[2148]: pam_faillock(sshd:auth): User unknown Oct 2 23:40:54.601000 audit[2148]: USER_AUTH pid=2148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dotnet" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:40:54.694805 kernel: audit: type=1100 audit(1696290054.601:237): pid=2148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dotnet" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:40:56.290487 sshd[2148]: Failed password for invalid user dotnet from 121.15.4.92 port 41353 ssh2 Oct 2 23:40:57.931383 sshd[2148]: Received disconnect from 121.15.4.92 port 41353:11: Bye Bye [preauth] Oct 2 23:40:57.931383 sshd[2148]: Disconnected from invalid user dotnet 121.15.4.92 port 41353 [preauth] Oct 2 23:40:57.933874 systemd[1]: sshd@19-139.178.88.33:22-121.15.4.92:41353.service: Deactivated successfully. Oct 2 23:40:57.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.33:22-121.15.4.92:41353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:40:58.026990 kernel: audit: type=1131 audit(1696290057.933:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.88.33:22-121.15.4.92:41353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:00.107733 systemd[1]: Started sshd@20-139.178.88.33:22-23.126.62.36:40198.service. Oct 2 23:41:00.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.33:22-23.126.62.36:40198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:00.200993 kernel: audit: type=1130 audit(1696290060.107:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.33:22-23.126.62.36:40198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:00.569474 sshd[2152]: Invalid user jiaqi from 23.126.62.36 port 40198 Oct 2 23:41:00.575500 sshd[2152]: pam_faillock(sshd:auth): User unknown Oct 2 23:41:00.576634 sshd[2152]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:41:00.576723 sshd[2152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:41:00.577643 sshd[2152]: pam_faillock(sshd:auth): User unknown Oct 2 23:41:00.577000 audit[2152]: USER_AUTH pid=2152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiaqi" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:41:00.672990 kernel: audit: type=1100 audit(1696290060.577:240): pid=2152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiaqi" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:41:02.089712 sshd[2152]: Failed password for invalid user jiaqi from 23.126.62.36 port 40198 ssh2 Oct 2 23:41:02.681015 sshd[2152]: Received disconnect from 23.126.62.36 port 40198:11: Bye Bye [preauth] Oct 2 23:41:02.681015 sshd[2152]: Disconnected from invalid user jiaqi 23.126.62.36 port 40198 [preauth] Oct 2 23:41:02.683499 systemd[1]: sshd@20-139.178.88.33:22-23.126.62.36:40198.service: Deactivated successfully. Oct 2 23:41:02.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.33:22-23.126.62.36:40198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:02.777015 kernel: audit: type=1131 audit(1696290062.683:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.88.33:22-23.126.62.36:40198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:11.836535 systemd[1]: Started sshd@21-139.178.88.33:22-128.199.158.203:53484.service. Oct 2 23:41:11.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.33:22-128.199.158.203:53484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:11.929837 kernel: audit: type=1130 audit(1696290071.835:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.33:22-128.199.158.203:53484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:12.775510 sshd[2156]: Invalid user autcom from 128.199.158.203 port 53484 Oct 2 23:41:12.781487 sshd[2156]: pam_faillock(sshd:auth): User unknown Oct 2 23:41:12.782465 sshd[2156]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:41:12.782553 sshd[2156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:41:12.783447 sshd[2156]: pam_faillock(sshd:auth): User unknown Oct 2 23:41:12.782000 audit[2156]: USER_AUTH pid=2156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="autcom" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:41:12.876992 kernel: audit: type=1100 audit(1696290072.782:243): pid=2156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="autcom" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:41:14.275216 sshd[2156]: Failed password for invalid user autcom from 128.199.158.203 port 53484 ssh2 Oct 2 23:41:15.175916 sshd[2156]: Received disconnect from 128.199.158.203 port 53484:11: Bye Bye [preauth] Oct 2 23:41:15.175916 sshd[2156]: Disconnected from invalid user autcom 128.199.158.203 port 53484 [preauth] Oct 2 23:41:15.178395 systemd[1]: sshd@21-139.178.88.33:22-128.199.158.203:53484.service: Deactivated successfully. Oct 2 23:41:15.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.33:22-128.199.158.203:53484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:15.271854 kernel: audit: type=1131 audit(1696290075.178:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.88.33:22-128.199.158.203:53484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:32.381495 sshd[2122]: Timeout before authentication for 218.92.0.27 port 60204 Oct 2 23:41:32.383005 systemd[1]: sshd@13-139.178.88.33:22-218.92.0.27:60204.service: Deactivated successfully. Oct 2 23:41:32.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.33:22-218.92.0.27:60204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:32.475850 kernel: audit: type=1131 audit(1696290092.382:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.88.33:22-218.92.0.27:60204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:51.305068 systemd[1]: Started sshd@22-139.178.88.33:22-43.136.35.103:41778.service. Oct 2 23:41:51.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.33:22-43.136.35.103:41778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:51.397778 kernel: audit: type=1130 audit(1696290111.304:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.33:22-43.136.35.103:41778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:52.235391 sshd[2161]: Invalid user novinhost from 43.136.35.103 port 41778 Oct 2 23:41:52.241494 sshd[2161]: pam_faillock(sshd:auth): User unknown Oct 2 23:41:52.242532 sshd[2161]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:41:52.242624 sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:41:52.243545 sshd[2161]: pam_faillock(sshd:auth): User unknown Oct 2 23:41:52.242000 audit[2161]: USER_AUTH pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="novinhost" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:41:52.336992 kernel: audit: type=1100 audit(1696290112.242:247): pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="novinhost" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:41:54.227373 sshd[2161]: Failed password for invalid user novinhost from 43.136.35.103 port 41778 ssh2 Oct 2 23:41:55.633108 sshd[2161]: Received disconnect from 43.136.35.103 port 41778:11: Bye Bye [preauth] Oct 2 23:41:55.633108 sshd[2161]: Disconnected from invalid user novinhost 43.136.35.103 port 41778 [preauth] Oct 2 23:41:55.635626 systemd[1]: sshd@22-139.178.88.33:22-43.136.35.103:41778.service: Deactivated successfully. Oct 2 23:41:55.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.33:22-43.136.35.103:41778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:41:55.728965 kernel: audit: type=1131 audit(1696290115.635:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.88.33:22-43.136.35.103:41778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:06.731017 systemd[1]: Started sshd@23-139.178.88.33:22-20.101.101.40:53998.service. Oct 2 23:42:06.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.33:22-20.101.101.40:53998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:06.823778 kernel: audit: type=1130 audit(1696290126.730:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.33:22-20.101.101.40:53998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:07.613504 sshd[2165]: Invalid user novinhost from 20.101.101.40 port 53998 Oct 2 23:42:07.619409 sshd[2165]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:07.620562 sshd[2165]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:42:07.620651 sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:42:07.621691 sshd[2165]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:07.621000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="novinhost" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:42:07.714989 kernel: audit: type=1100 audit(1696290127.621:250): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="novinhost" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:42:09.665555 sshd[2165]: Failed password for invalid user novinhost from 20.101.101.40 port 53998 ssh2 Oct 2 23:42:10.999905 sshd[2165]: Received disconnect from 20.101.101.40 port 53998:11: Bye Bye [preauth] Oct 2 23:42:10.999905 sshd[2165]: Disconnected from invalid user novinhost 20.101.101.40 port 53998 [preauth] Oct 2 23:42:11.002411 systemd[1]: sshd@23-139.178.88.33:22-20.101.101.40:53998.service: Deactivated successfully. Oct 2 23:42:11.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.33:22-20.101.101.40:53998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:11.095972 kernel: audit: type=1131 audit(1696290131.002:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.88.33:22-20.101.101.40:53998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:21.952158 systemd[1]: Started sshd@24-139.178.88.33:22-121.15.4.92:52200.service. Oct 2 23:42:21.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.33:22-121.15.4.92:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:22.044824 kernel: audit: type=1130 audit(1696290141.951:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.33:22-121.15.4.92:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:22.863692 sshd[2169]: Invalid user nsc from 121.15.4.92 port 52200 Oct 2 23:42:22.869670 sshd[2169]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:22.870849 sshd[2169]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:42:22.870935 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:42:22.871810 sshd[2169]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:22.871000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nsc" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:42:22.964994 kernel: audit: type=1100 audit(1696290142.871:253): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nsc" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:42:24.639893 sshd[2169]: Failed password for invalid user nsc from 121.15.4.92 port 52200 ssh2 Oct 2 23:42:26.431700 sshd[2169]: Received disconnect from 121.15.4.92 port 52200:11: Bye Bye [preauth] Oct 2 23:42:26.431700 sshd[2169]: Disconnected from invalid user nsc 121.15.4.92 port 52200 [preauth] Oct 2 23:42:26.434255 systemd[1]: sshd@24-139.178.88.33:22-121.15.4.92:52200.service: Deactivated successfully. Oct 2 23:42:26.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.33:22-121.15.4.92:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:26.527995 kernel: audit: type=1131 audit(1696290146.432:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.88.33:22-121.15.4.92:52200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:34.271714 systemd[1]: Started sshd@25-139.178.88.33:22-23.126.62.36:51726.service. Oct 2 23:42:34.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.33:22-23.126.62.36:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:34.364991 kernel: audit: type=1130 audit(1696290154.271:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.33:22-23.126.62.36:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:34.740303 sshd[2175]: Invalid user event from 23.126.62.36 port 51726 Oct 2 23:42:34.746366 sshd[2175]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:34.747351 sshd[2175]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:42:34.747441 sshd[2175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:42:34.748487 sshd[2175]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:34.747000 audit[2175]: USER_AUTH pid=2175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="event" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:42:34.841996 kernel: audit: type=1100 audit(1696290154.747:256): pid=2175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="event" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:42:36.832492 sshd[2175]: Failed password for invalid user event from 23.126.62.36 port 51726 ssh2 Oct 2 23:42:36.935769 sshd[2175]: Received disconnect from 23.126.62.36 port 51726:11: Bye Bye [preauth] Oct 2 23:42:36.935769 sshd[2175]: Disconnected from invalid user event 23.126.62.36 port 51726 [preauth] Oct 2 23:42:36.938257 systemd[1]: sshd@25-139.178.88.33:22-23.126.62.36:51726.service: Deactivated successfully. Oct 2 23:42:36.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.33:22-23.126.62.36:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:37.031996 kernel: audit: type=1131 audit(1696290156.937:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.88.33:22-23.126.62.36:51726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:48.708072 systemd[1]: Started sshd@26-139.178.88.33:22-128.199.158.203:54566.service. Oct 2 23:42:48.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.33:22-128.199.158.203:54566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:48.802000 kernel: audit: type=1130 audit(1696290168.707:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.33:22-128.199.158.203:54566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:49.642349 sshd[2180]: Invalid user mkbahk from 128.199.158.203 port 54566 Oct 2 23:42:49.648224 sshd[2180]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:49.649341 sshd[2180]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:42:49.649430 sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:42:49.650409 sshd[2180]: pam_faillock(sshd:auth): User unknown Oct 2 23:42:49.649000 audit[2180]: USER_AUTH pid=2180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mkbahk" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:42:49.743827 kernel: audit: type=1100 audit(1696290169.649:259): pid=2180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mkbahk" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:42:51.458688 sshd[2180]: Failed password for invalid user mkbahk from 128.199.158.203 port 54566 ssh2 Oct 2 23:42:52.094193 sshd[2180]: Received disconnect from 128.199.158.203 port 54566:11: Bye Bye [preauth] Oct 2 23:42:52.094193 sshd[2180]: Disconnected from invalid user mkbahk 128.199.158.203 port 54566 [preauth] Oct 2 23:42:52.096711 systemd[1]: sshd@26-139.178.88.33:22-128.199.158.203:54566.service: Deactivated successfully. Oct 2 23:42:52.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.33:22-128.199.158.203:54566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:42:52.190005 kernel: audit: type=1131 audit(1696290172.096:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.88.33:22-128.199.158.203:54566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:01.984687 systemd[1]: Started sshd@27-139.178.88.33:22-43.136.35.103:56962.service. Oct 2 23:43:01.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.33:22-43.136.35.103:56962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:02.077995 kernel: audit: type=1130 audit(1696290181.983:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.33:22-43.136.35.103:56962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:02.911811 sshd[2185]: Invalid user etrust from 43.136.35.103 port 56962 Oct 2 23:43:02.917814 sshd[2185]: pam_faillock(sshd:auth): User unknown Oct 2 23:43:02.918723 sshd[2185]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:43:02.918740 sshd[2185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:43:02.920176 sshd[2185]: pam_faillock(sshd:auth): User unknown Oct 2 23:43:02.919000 audit[2185]: USER_AUTH pid=2185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="etrust" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:43:03.014003 kernel: audit: type=1100 audit(1696290182.919:262): pid=2185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="etrust" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:43:05.179796 sshd[2185]: Failed password for invalid user etrust from 43.136.35.103 port 56962 ssh2 Oct 2 23:43:06.394522 sshd[2185]: Received disconnect from 43.136.35.103 port 56962:11: Bye Bye [preauth] Oct 2 23:43:06.394522 sshd[2185]: Disconnected from invalid user etrust 43.136.35.103 port 56962 [preauth] Oct 2 23:43:06.397068 systemd[1]: sshd@27-139.178.88.33:22-43.136.35.103:56962.service: Deactivated successfully. Oct 2 23:43:06.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.33:22-43.136.35.103:56962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:06.489996 kernel: audit: type=1131 audit(1696290186.395:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.88.33:22-43.136.35.103:56962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:47.943333 systemd[1]: Started sshd@28-139.178.88.33:22-118.97.212.14:60780.service. Oct 2 23:43:47.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.33:22-118.97.212.14:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:48.036994 kernel: audit: type=1130 audit(1696290227.942:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.33:22-118.97.212.14:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:49.109020 sshd[2192]: Invalid user ht from 118.97.212.14 port 60780 Oct 2 23:43:49.115253 sshd[2192]: pam_faillock(sshd:auth): User unknown Oct 2 23:43:49.116230 sshd[2192]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:43:49.116319 sshd[2192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Oct 2 23:43:49.117191 sshd[2192]: pam_faillock(sshd:auth): User unknown Oct 2 23:43:49.116000 audit[2192]: USER_AUTH pid=2192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ht" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:43:49.211000 kernel: audit: type=1100 audit(1696290229.116:265): pid=2192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ht" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:43:49.615258 systemd[1]: Started sshd@29-139.178.88.33:22-20.101.101.40:56022.service. Oct 2 23:43:49.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.33:22-20.101.101.40:56022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:49.706776 kernel: audit: type=1130 audit(1696290229.614:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.33:22-20.101.101.40:56022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:50.511810 sshd[2195]: Invalid user xmq from 20.101.101.40 port 56022 Oct 2 23:43:50.517829 sshd[2195]: pam_faillock(sshd:auth): User unknown Oct 2 23:43:50.518805 sshd[2195]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:43:50.518895 sshd[2195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:43:50.519844 sshd[2195]: pam_faillock(sshd:auth): User unknown Oct 2 23:43:50.519000 audit[2195]: USER_AUTH pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmq" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:43:50.612996 kernel: audit: type=1100 audit(1696290230.519:267): pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmq" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:43:51.161215 sshd[2192]: Failed password for invalid user ht from 118.97.212.14 port 60780 ssh2 Oct 2 23:43:51.572031 sshd[2192]: Received disconnect from 118.97.212.14 port 60780:11: Bye Bye [preauth] Oct 2 23:43:51.572031 sshd[2192]: Disconnected from invalid user ht 118.97.212.14 port 60780 [preauth] Oct 2 23:43:51.574549 systemd[1]: sshd@28-139.178.88.33:22-118.97.212.14:60780.service: Deactivated successfully. Oct 2 23:43:51.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.33:22-118.97.212.14:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:51.667985 kernel: audit: type=1131 audit(1696290231.574:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.88.33:22-118.97.212.14:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:52.368325 sshd[2195]: Failed password for invalid user xmq from 20.101.101.40 port 56022 ssh2 Oct 2 23:43:54.330065 sshd[2195]: Received disconnect from 20.101.101.40 port 56022:11: Bye Bye [preauth] Oct 2 23:43:54.330065 sshd[2195]: Disconnected from invalid user xmq 20.101.101.40 port 56022 [preauth] Oct 2 23:43:54.332570 systemd[1]: sshd@29-139.178.88.33:22-20.101.101.40:56022.service: Deactivated successfully. Oct 2 23:43:54.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.33:22-20.101.101.40:56022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:43:54.425991 kernel: audit: type=1131 audit(1696290234.332:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.88.33:22-20.101.101.40:56022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:03.441929 systemd[1]: Started sshd@30-139.178.88.33:22-218.92.0.31:27283.service. Oct 2 23:44:03.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.33:22-218.92.0.31:27283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:03.534981 kernel: audit: type=1130 audit(1696290243.441:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.33:22-218.92.0.31:27283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:04.467843 sshd[2203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Oct 2 23:44:04.467000 audit[2203]: USER_AUTH pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:04.559982 kernel: audit: type=1100 audit(1696290244.467:271): pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:06.240904 sshd[2203]: Failed password for root from 218.92.0.31 port 27283 ssh2 Oct 2 23:44:08.188000 audit[2203]: USER_AUTH pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:08.280966 kernel: audit: type=1100 audit(1696290248.188:272): pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:09.627440 systemd[1]: Started sshd@31-139.178.88.33:22-23.126.62.36:57462.service. Oct 2 23:44:09.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.33:22-23.126.62.36:57462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:09.719777 kernel: audit: type=1130 audit(1696290249.626:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.33:22-23.126.62.36:57462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:10.091871 sshd[2206]: Invalid user monte from 23.126.62.36 port 57462 Oct 2 23:44:10.097848 sshd[2206]: pam_faillock(sshd:auth): User unknown Oct 2 23:44:10.098863 sshd[2206]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:44:10.098952 sshd[2206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:44:10.099907 sshd[2206]: pam_faillock(sshd:auth): User unknown Oct 2 23:44:10.099000 audit[2206]: USER_AUTH pid=2206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monte" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:44:10.199994 kernel: audit: type=1100 audit(1696290250.099:274): pid=2206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monte" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:44:10.509473 sshd[2203]: Failed password for root from 218.92.0.31 port 27283 ssh2 Oct 2 23:44:11.522000 audit[2203]: USER_AUTH pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:11.613979 kernel: audit: type=1100 audit(1696290251.522:275): pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:12.695854 sshd[2206]: Failed password for invalid user monte from 23.126.62.36 port 57462 ssh2 Oct 2 23:44:14.254762 sshd[2203]: Failed password for root from 218.92.0.31 port 27283 ssh2 Oct 2 23:44:14.856077 sshd[2203]: Received disconnect from 218.92.0.31 port 27283:11: [preauth] Oct 2 23:44:14.856077 sshd[2203]: Disconnected from authenticating user root 218.92.0.31 port 27283 [preauth] Oct 2 23:44:14.856601 sshd[2203]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Oct 2 23:44:14.858626 systemd[1]: sshd@30-139.178.88.33:22-218.92.0.31:27283.service: Deactivated successfully. Oct 2 23:44:14.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.33:22-218.92.0.31:27283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:14.862440 sshd[2206]: Received disconnect from 23.126.62.36 port 57462:11: Bye Bye [preauth] Oct 2 23:44:14.862440 sshd[2206]: Disconnected from invalid user monte 23.126.62.36 port 57462 [preauth] Oct 2 23:44:14.862955 systemd[1]: sshd@31-139.178.88.33:22-23.126.62.36:57462.service: Deactivated successfully. Oct 2 23:44:14.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.33:22-23.126.62.36:57462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:15.011037 systemd[1]: Started sshd@32-139.178.88.33:22-218.92.0.31:52822.service. Oct 2 23:44:15.042295 kernel: audit: type=1131 audit(1696290254.858:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.88.33:22-218.92.0.31:27283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:15.042323 kernel: audit: type=1131 audit(1696290254.862:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.88.33:22-23.126.62.36:57462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:15.042342 kernel: audit: type=1130 audit(1696290255.010:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.33:22-218.92.0.31:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:15.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.33:22-218.92.0.31:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:15.634216 systemd[1]: Started sshd@33-139.178.88.33:22-43.136.35.103:49344.service. Oct 2 23:44:15.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.33:22-43.136.35.103:49344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:15.727970 kernel: audit: type=1130 audit(1696290255.633:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.33:22-43.136.35.103:49344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:16.033524 sshd[2211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Oct 2 23:44:16.033000 audit[2211]: USER_AUTH pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:16.124985 kernel: audit: type=1100 audit(1696290256.033:280): pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:16.543372 sshd[2214]: Invalid user beck from 43.136.35.103 port 49344 Oct 2 23:44:16.549282 sshd[2214]: pam_faillock(sshd:auth): User unknown Oct 2 23:44:16.550301 sshd[2214]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:44:16.550387 sshd[2214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:44:16.551279 sshd[2214]: pam_faillock(sshd:auth): User unknown Oct 2 23:44:16.550000 audit[2214]: USER_AUTH pid=2214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="beck" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:44:16.644902 kernel: audit: type=1100 audit(1696290256.550:281): pid=2214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="beck" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:44:17.785974 sshd[2211]: Failed password for root from 218.92.0.31 port 52822 ssh2 Oct 2 23:44:18.304109 sshd[2214]: Failed password for invalid user beck from 43.136.35.103 port 49344 ssh2 Oct 2 23:44:19.367000 audit[2211]: ANOM_LOGIN_FAILURES pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:19.368032 sshd[2211]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Oct 2 23:44:19.367000 audit[2211]: USER_AUTH pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:19.522870 kernel: audit: type=2100 audit(1696290259.367:282): pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:19.522905 kernel: audit: type=1100 audit(1696290259.367:283): pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:20.136202 sshd[2214]: Received disconnect from 43.136.35.103 port 49344:11: Bye Bye [preauth] Oct 2 23:44:20.136202 sshd[2214]: Disconnected from invalid user beck 43.136.35.103 port 49344 [preauth] Oct 2 23:44:20.139046 systemd[1]: sshd@33-139.178.88.33:22-43.136.35.103:49344.service: Deactivated successfully. Oct 2 23:44:20.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.33:22-43.136.35.103:49344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:20.232996 kernel: audit: type=1131 audit(1696290260.138:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.88.33:22-43.136.35.103:49344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:21.532357 sshd[2211]: Failed password for root from 218.92.0.31 port 52822 ssh2 Oct 2 23:44:22.700000 audit[2211]: USER_AUTH pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:22.793984 kernel: audit: type=1100 audit(1696290262.700:285): pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:24.569249 systemd[1]: Started sshd@34-139.178.88.33:22-128.199.158.203:55634.service. Oct 2 23:44:24.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.33:22-128.199.158.203:55634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:24.662990 kernel: audit: type=1130 audit(1696290264.567:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.33:22-128.199.158.203:55634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:25.277962 sshd[2211]: Failed password for root from 218.92.0.31 port 52822 ssh2 Oct 2 23:44:25.505194 sshd[2218]: Invalid user oi from 128.199.158.203 port 55634 Oct 2 23:44:25.511162 sshd[2218]: pam_faillock(sshd:auth): User unknown Oct 2 23:44:25.512128 sshd[2218]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:44:25.512215 sshd[2218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:44:25.513124 sshd[2218]: pam_faillock(sshd:auth): User unknown Oct 2 23:44:25.511000 audit[2218]: USER_AUTH pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oi" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:44:25.605996 kernel: audit: type=1100 audit(1696290265.511:287): pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oi" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:44:26.035629 sshd[2211]: Received disconnect from 218.92.0.31 port 52822:11: [preauth] Oct 2 23:44:26.035629 sshd[2211]: Disconnected from authenticating user root 218.92.0.31 port 52822 [preauth] Oct 2 23:44:26.036201 sshd[2211]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Oct 2 23:44:26.038162 systemd[1]: sshd@32-139.178.88.33:22-218.92.0.31:52822.service: Deactivated successfully. Oct 2 23:44:26.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.33:22-218.92.0.31:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:26.130776 kernel: audit: type=1131 audit(1696290266.036:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.88.33:22-218.92.0.31:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:26.222573 systemd[1]: Started sshd@35-139.178.88.33:22-218.92.0.31:19446.service. Oct 2 23:44:26.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.33:22-218.92.0.31:19446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:26.315778 kernel: audit: type=1130 audit(1696290266.221:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.33:22-218.92.0.31:19446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:26.834472 sshd[2218]: Failed password for invalid user oi from 128.199.158.203 port 55634 ssh2 Oct 2 23:44:27.321594 sshd[2222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Oct 2 23:44:27.320000 audit[2222]: USER_AUTH pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:27.412975 kernel: audit: type=1100 audit(1696290267.320:290): pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:27.588351 sshd[2218]: Received disconnect from 128.199.158.203 port 55634:11: Bye Bye [preauth] Oct 2 23:44:27.588351 sshd[2218]: Disconnected from invalid user oi 128.199.158.203 port 55634 [preauth] Oct 2 23:44:27.590711 systemd[1]: sshd@34-139.178.88.33:22-128.199.158.203:55634.service: Deactivated successfully. Oct 2 23:44:27.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.33:22-128.199.158.203:55634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:27.684006 kernel: audit: type=1131 audit(1696290267.589:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.88.33:22-128.199.158.203:55634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:29.250307 sshd[2222]: Failed password for root from 218.92.0.31 port 19446 ssh2 Oct 2 23:44:30.531072 update_engine[1444]: I1002 23:44:30.530961 1444 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Oct 2 23:44:30.531072 update_engine[1444]: I1002 23:44:30.531040 1444 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Oct 2 23:44:30.541301 update_engine[1444]: I1002 23:44:30.541213 1444 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs Oct 2 23:44:30.542158 update_engine[1444]: I1002 23:44:30.542085 1444 omaha_request_params.cc:62] Current group set to lts Oct 2 23:44:30.542458 update_engine[1444]: I1002 23:44:30.542383 1444 update_attempter.cc:495] Already updated boot flags. Skipping. Oct 2 23:44:30.542458 update_engine[1444]: I1002 23:44:30.542403 1444 update_attempter.cc:638] Scheduling an action processor start. Oct 2 23:44:30.542458 update_engine[1444]: I1002 23:44:30.542438 1444 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Oct 2 23:44:30.542829 update_engine[1444]: I1002 23:44:30.542503 1444 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs Oct 2 23:44:30.542829 update_engine[1444]: I1002 23:44:30.542644 1444 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/ Oct 2 23:44:30.542829 update_engine[1444]: I1002 23:44:30.542659 1444 omaha_request_action.cc:269] Request: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: Oct 2 23:44:30.542829 update_engine[1444]: I1002 23:44:30.542671 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Oct 2 23:44:30.543887 locksmithd[1491]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Oct 2 23:44:30.545804 update_engine[1444]: I1002 23:44:30.545711 1444 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS Oct 2 23:44:30.546204 update_engine[1444]: I1002 23:44:30.546125 1444 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Oct 2 23:44:30.665000 audit[2222]: USER_AUTH pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:30.758999 kernel: audit: type=1100 audit(1696290270.665:292): pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:31.622507 update_engine[1444]: I1002 23:44:31.622403 1444 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs Oct 2 23:44:31.623253 update_engine[1444]: I1002 23:44:31.622954 1444 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs Oct 2 23:44:31.623408 update_engine[1444]: I1002 23:44:31.623360 1444 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs Oct 2 23:44:31.981567 update_engine[1444]: I1002 23:44:31.981345 1444 libcurl_http_fetcher.cc:263] HTTP response code: 200 Oct 2 23:44:31.984724 update_engine[1444]: I1002 23:44:31.984640 1444 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded Oct 2 23:44:31.984724 update_engine[1444]: I1002 23:44:31.984671 1444 omaha_request_action.cc:619] Omaha request response: Oct 2 23:44:31.984724 update_engine[1444]: Oct 2 23:44:31.999305 update_engine[1444]: I1002 23:44:31.999213 1444 omaha_request_action.cc:409] No update. Oct 2 23:44:31.999305 update_engine[1444]: I1002 23:44:31.999267 1444 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Oct 2 23:44:31.999305 update_engine[1444]: I1002 23:44:31.999280 1444 omaha_response_handler_action.cc:36] There are no updates. Aborting. Oct 2 23:44:31.999305 update_engine[1444]: I1002 23:44:31.999290 1444 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing. Oct 2 23:44:31.999305 update_engine[1444]: I1002 23:44:31.999301 1444 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction Oct 2 23:44:31.999305 update_engine[1444]: I1002 23:44:31.999310 1444 update_attempter.cc:302] Processing Done. Oct 2 23:44:31.999982 update_engine[1444]: I1002 23:44:31.999336 1444 update_attempter.cc:338] No update. Oct 2 23:44:31.999982 update_engine[1444]: I1002 23:44:31.999365 1444 update_check_scheduler.cc:74] Next update check in 49m50s Oct 2 23:44:32.000163 locksmithd[1491]: LastCheckedTime=1696290271 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Oct 2 23:44:32.340013 sshd[2222]: Failed password for root from 218.92.0.31 port 19446 ssh2 Oct 2 23:44:34.011000 audit[2222]: USER_AUTH pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:34.103805 kernel: audit: type=1100 audit(1696290274.011:293): pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Oct 2 23:44:36.568703 sshd[2222]: Failed password for root from 218.92.0.31 port 19446 ssh2 Oct 2 23:44:37.357809 sshd[2222]: Received disconnect from 218.92.0.31 port 19446:11: [preauth] Oct 2 23:44:37.357809 sshd[2222]: Disconnected from authenticating user root 218.92.0.31 port 19446 [preauth] Oct 2 23:44:37.358405 sshd[2222]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Oct 2 23:44:37.360494 systemd[1]: sshd@35-139.178.88.33:22-218.92.0.31:19446.service: Deactivated successfully. Oct 2 23:44:37.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.33:22-218.92.0.31:19446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:44:37.453992 kernel: audit: type=1131 audit(1696290277.359:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.88.33:22-218.92.0.31:19446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:13.965145 systemd[1]: Started sshd@36-139.178.88.33:22-121.15.4.92:45664.service. Oct 2 23:45:13.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.33:22-121.15.4.92:45664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:14.058996 kernel: audit: type=1130 audit(1696290313.964:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.33:22-121.15.4.92:45664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:14.895745 sshd[2229]: Invalid user bo from 121.15.4.92 port 45664 Oct 2 23:45:14.901722 sshd[2229]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:14.902718 sshd[2229]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:45:14.902830 sshd[2229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:45:14.903717 sshd[2229]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:14.903000 audit[2229]: USER_AUTH pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:45:14.995776 kernel: audit: type=1100 audit(1696290314.903:296): pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:45:16.285291 sshd[2229]: Failed password for invalid user bo from 121.15.4.92 port 45664 ssh2 Oct 2 23:45:17.338560 sshd[2229]: Received disconnect from 121.15.4.92 port 45664:11: Bye Bye [preauth] Oct 2 23:45:17.338560 sshd[2229]: Disconnected from invalid user bo 121.15.4.92 port 45664 [preauth] Oct 2 23:45:17.341128 systemd[1]: sshd@36-139.178.88.33:22-121.15.4.92:45664.service: Deactivated successfully. Oct 2 23:45:17.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.33:22-121.15.4.92:45664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:17.433799 kernel: audit: type=1131 audit(1696290317.340:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.88.33:22-121.15.4.92:45664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:23.765341 systemd[1]: Started sshd@37-139.178.88.33:22-43.136.35.103:37622.service. Oct 2 23:45:23.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:23.858993 kernel: audit: type=1130 audit(1696290323.764:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:24.678335 sshd[2233]: Invalid user spark from 43.136.35.103 port 37622 Oct 2 23:45:24.684389 sshd[2233]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:24.685441 sshd[2233]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:45:24.685528 sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:45:24.686509 sshd[2233]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:24.686000 audit[2233]: USER_AUTH pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="spark" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:45:24.779992 kernel: audit: type=1100 audit(1696290324.686:299): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="spark" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:45:26.439425 sshd[2233]: Failed password for invalid user spark from 43.136.35.103 port 37622 ssh2 Oct 2 23:45:27.739984 sshd[2233]: Received disconnect from 43.136.35.103 port 37622:11: Bye Bye [preauth] Oct 2 23:45:27.739984 sshd[2233]: Disconnected from invalid user spark 43.136.35.103 port 37622 [preauth] Oct 2 23:45:27.742513 systemd[1]: sshd@37-139.178.88.33:22-43.136.35.103:37622.service: Deactivated successfully. Oct 2 23:45:27.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:27.835776 kernel: audit: type=1131 audit(1696290327.742:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:32.506940 systemd[1]: Started sshd@38-139.178.88.33:22-20.101.101.40:58036.service. Oct 2 23:45:32.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.88.33:22-20.101.101.40:58036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:32.599000 kernel: audit: type=1130 audit(1696290332.506:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.88.33:22-20.101.101.40:58036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:33.401961 sshd[2238]: Invalid user bo from 20.101.101.40 port 58036 Oct 2 23:45:33.408041 sshd[2238]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:33.409121 sshd[2238]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:45:33.409210 sshd[2238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:45:33.410151 sshd[2238]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:33.409000 audit[2238]: USER_AUTH pid=2238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:45:33.502944 kernel: audit: type=1100 audit(1696290333.409:302): pid=2238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:45:35.067386 sshd[2238]: Failed password for invalid user bo from 20.101.101.40 port 58036 ssh2 Oct 2 23:45:35.829932 sshd[2238]: Received disconnect from 20.101.101.40 port 58036:11: Bye Bye [preauth] Oct 2 23:45:35.829932 sshd[2238]: Disconnected from invalid user bo 20.101.101.40 port 58036 [preauth] Oct 2 23:45:35.832481 systemd[1]: sshd@38-139.178.88.33:22-20.101.101.40:58036.service: Deactivated successfully. Oct 2 23:45:35.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.88.33:22-20.101.101.40:58036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:35.925997 kernel: audit: type=1131 audit(1696290335.832:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.88.33:22-20.101.101.40:58036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:45.540583 systemd[1]: Started sshd@39-139.178.88.33:22-23.126.62.36:53852.service. Oct 2 23:45:45.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.88.33:22-23.126.62.36:53852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:45.633990 kernel: audit: type=1130 audit(1696290345.539:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.88.33:22-23.126.62.36:53852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:46.019728 sshd[2244]: Invalid user ohm from 23.126.62.36 port 53852 Oct 2 23:45:46.025758 sshd[2244]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:46.026763 sshd[2244]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:45:46.026870 sshd[2244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:45:46.027803 sshd[2244]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:46.027000 audit[2244]: USER_AUTH pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ohm" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:45:46.119842 kernel: audit: type=1100 audit(1696290346.027:305): pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ohm" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:45:48.136733 sshd[2244]: Failed password for invalid user ohm from 23.126.62.36 port 53852 ssh2 Oct 2 23:45:48.678554 sshd[2244]: Received disconnect from 23.126.62.36 port 53852:11: Bye Bye [preauth] Oct 2 23:45:48.678554 sshd[2244]: Disconnected from invalid user ohm 23.126.62.36 port 53852 [preauth] Oct 2 23:45:48.681066 systemd[1]: sshd@39-139.178.88.33:22-23.126.62.36:53852.service: Deactivated successfully. Oct 2 23:45:48.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.88.33:22-23.126.62.36:53852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:48.775010 kernel: audit: type=1131 audit(1696290348.680:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.88.33:22-23.126.62.36:53852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:55.771185 systemd[1]: Started sshd@40-139.178.88.33:22-128.199.158.203:56696.service. Oct 2 23:45:55.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.88.33:22-128.199.158.203:56696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:55.864009 kernel: audit: type=1130 audit(1696290355.770:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.88.33:22-128.199.158.203:56696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:56.704872 sshd[2248]: Invalid user test from 128.199.158.203 port 56696 Oct 2 23:45:56.710900 sshd[2248]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:56.711890 sshd[2248]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:45:56.711978 sshd[2248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:45:56.712894 sshd[2248]: pam_faillock(sshd:auth): User unknown Oct 2 23:45:56.712000 audit[2248]: USER_AUTH pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:45:56.805984 kernel: audit: type=1100 audit(1696290356.712:308): pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:45:57.007052 systemd[1]: Started sshd@41-139.178.88.33:22-61.177.172.140:30964.service. Oct 2 23:45:57.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.88.33:22-61.177.172.140:30964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:57.100980 kernel: audit: type=1130 audit(1696290357.006:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.88.33:22-61.177.172.140:30964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:57.953744 sshd[2251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Oct 2 23:45:57.953000 audit[2251]: USER_AUTH pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:45:58.046838 kernel: audit: type=1100 audit(1696290357.953:310): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:45:58.526106 sshd[2248]: Failed password for invalid user test from 128.199.158.203 port 56696 ssh2 Oct 2 23:45:58.843507 sshd[2248]: Received disconnect from 128.199.158.203 port 56696:11: Bye Bye [preauth] Oct 2 23:45:58.843507 sshd[2248]: Disconnected from invalid user test 128.199.158.203 port 56696 [preauth] Oct 2 23:45:58.846092 systemd[1]: sshd@40-139.178.88.33:22-128.199.158.203:56696.service: Deactivated successfully. Oct 2 23:45:58.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.88.33:22-128.199.158.203:56696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:58.939841 kernel: audit: type=1131 audit(1696290358.845:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.88.33:22-128.199.158.203:56696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:59.062431 systemd[1]: Started sshd@42-139.178.88.33:22-61.177.172.185:19195.service. Oct 2 23:45:59.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.88.33:22-61.177.172.185:19195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:59.155789 kernel: audit: type=1130 audit(1696290359.061:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.88.33:22-61.177.172.185:19195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:45:59.571217 sshd[2251]: Failed password for root from 61.177.172.140 port 30964 ssh2 Oct 2 23:46:00.083890 sshd[2257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.185 user=root Oct 2 23:46:00.083000 audit[2257]: USER_AUTH pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:00.176825 kernel: audit: type=1100 audit(1696290360.083:313): pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:01.273000 audit[2251]: USER_AUTH pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:01.367959 kernel: audit: type=1100 audit(1696290361.273:314): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:01.445663 sshd[2257]: Failed password for root from 61.177.172.185 port 19195 ssh2 Oct 2 23:46:01.827000 audit[2257]: USER_AUTH pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:01.920835 kernel: audit: type=1100 audit(1696290361.827:315): pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:02.439868 sshd[2251]: Failed password for root from 61.177.172.140 port 30964 ssh2 Oct 2 23:46:02.993094 sshd[2257]: Failed password for root from 61.177.172.185 port 19195 ssh2 Oct 2 23:46:03.004000 audit[2251]: USER_AUTH pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:03.097960 kernel: audit: type=1100 audit(1696290363.004:316): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:03.571000 audit[2257]: USER_AUTH pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:03.664986 kernel: audit: type=1100 audit(1696290363.571:317): pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:05.113830 sshd[2251]: Failed password for root from 61.177.172.140 port 30964 ssh2 Oct 2 23:46:05.679996 sshd[2257]: Failed password for root from 61.177.172.185 port 19195 ssh2 Oct 2 23:46:06.324641 sshd[2251]: Received disconnect from 61.177.172.140 port 30964:11: [preauth] Oct 2 23:46:06.324641 sshd[2251]: Disconnected from authenticating user root 61.177.172.140 port 30964 [preauth] Oct 2 23:46:06.325218 sshd[2251]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Oct 2 23:46:06.327248 systemd[1]: sshd@41-139.178.88.33:22-61.177.172.140:30964.service: Deactivated successfully. Oct 2 23:46:06.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.88.33:22-61.177.172.140:30964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:06.420977 kernel: audit: type=1131 audit(1696290366.327:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.88.33:22-61.177.172.140:30964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:06.470013 systemd[1]: Started sshd@43-139.178.88.33:22-61.177.172.140:33987.service. Oct 2 23:46:06.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.88.33:22-61.177.172.140:33987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:06.563851 kernel: audit: type=1130 audit(1696290366.469:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.88.33:22-61.177.172.140:33987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:06.905144 sshd[2257]: Received disconnect from 61.177.172.185 port 19195:11: [preauth] Oct 2 23:46:06.905144 sshd[2257]: Disconnected from authenticating user root 61.177.172.185 port 19195 [preauth] Oct 2 23:46:06.905673 sshd[2257]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.185 user=root Oct 2 23:46:06.908078 systemd[1]: sshd@42-139.178.88.33:22-61.177.172.185:19195.service: Deactivated successfully. Oct 2 23:46:06.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.88.33:22-61.177.172.185:19195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:06.999809 kernel: audit: type=1131 audit(1696290366.907:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.88.33:22-61.177.172.185:19195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:07.425063 sshd[2261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Oct 2 23:46:07.424000 audit[2261]: USER_AUTH pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:07.517959 kernel: audit: type=1100 audit(1696290367.424:321): pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:09.082622 sshd[2261]: Failed password for root from 61.177.172.140 port 33987 ssh2 Oct 2 23:46:10.746000 audit[2261]: USER_AUTH pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:10.839829 kernel: audit: type=1100 audit(1696290370.746:322): pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:12.061257 systemd[1]: Started sshd@44-139.178.88.33:22-61.177.172.185:51740.service. Oct 2 23:46:12.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.88.33:22-61.177.172.185:51740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:12.154998 kernel: audit: type=1130 audit(1696290372.060:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.88.33:22-61.177.172.185:51740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:12.816144 sshd[2261]: Failed password for root from 61.177.172.140 port 33987 ssh2 Oct 2 23:46:13.482905 sshd[2266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.185 user=root Oct 2 23:46:13.482000 audit[2266]: USER_AUTH pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:13.575985 kernel: audit: type=1100 audit(1696290373.482:324): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:14.068000 audit[2261]: USER_AUTH pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:14.161837 kernel: audit: type=1100 audit(1696290374.068:325): pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:14.628810 sshd[2266]: Failed password for root from 61.177.172.185 port 51740 ssh2 Oct 2 23:46:15.222000 audit[2266]: USER_AUTH pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:15.313808 kernel: audit: type=1100 audit(1696290375.222:326): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:16.022600 sshd[2261]: Failed password for root from 61.177.172.140 port 33987 ssh2 Oct 2 23:46:17.311623 sshd[2266]: Failed password for root from 61.177.172.185 port 51740 ssh2 Oct 2 23:46:17.391159 sshd[2261]: Received disconnect from 61.177.172.140 port 33987:11: [preauth] Oct 2 23:46:17.391159 sshd[2261]: Disconnected from authenticating user root 61.177.172.140 port 33987 [preauth] Oct 2 23:46:17.391707 sshd[2261]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Oct 2 23:46:17.393679 systemd[1]: sshd@43-139.178.88.33:22-61.177.172.140:33987.service: Deactivated successfully. Oct 2 23:46:17.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.88.33:22-61.177.172.140:33987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:17.487993 kernel: audit: type=1131 audit(1696290377.393:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.88.33:22-61.177.172.140:33987 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:17.540741 systemd[1]: Started sshd@45-139.178.88.33:22-61.177.172.140:48200.service. Oct 2 23:46:17.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.88.33:22-61.177.172.140:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:17.632999 kernel: audit: type=1130 audit(1696290377.540:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.88.33:22-61.177.172.140:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:18.508245 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Oct 2 23:46:18.507000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:18.599000 audit[2266]: USER_AUTH pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:18.691067 kernel: audit: type=1100 audit(1696290378.507:329): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:18.691099 kernel: audit: type=1100 audit(1696290378.599:330): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:21.008954 sshd[2270]: Failed password for root from 61.177.172.140 port 48200 ssh2 Oct 2 23:46:21.100000 sshd[2266]: Failed password for root from 61.177.172.185 port 51740 ssh2 Oct 2 23:46:21.831000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:21.925993 kernel: audit: type=1100 audit(1696290381.831:331): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:21.928632 sshd[2266]: Received disconnect from 61.177.172.185 port 51740:11: [preauth] Oct 2 23:46:21.928632 sshd[2266]: Disconnected from authenticating user root 61.177.172.185 port 51740 [preauth] Oct 2 23:46:21.928730 sshd[2266]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.185 user=root Oct 2 23:46:21.929227 systemd[1]: sshd@44-139.178.88.33:22-61.177.172.185:51740.service: Deactivated successfully. Oct 2 23:46:21.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.88.33:22-61.177.172.185:51740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:22.022993 kernel: audit: type=1131 audit(1696290381.928:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.88.33:22-61.177.172.185:51740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:22.095269 systemd[1]: Started sshd@46-139.178.88.33:22-61.177.172.185:14190.service. Oct 2 23:46:22.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.88.33:22-61.177.172.185:14190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:22.186778 kernel: audit: type=1130 audit(1696290382.094:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.88.33:22-61.177.172.185:14190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:23.134201 sshd[2274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.185 user=root Oct 2 23:46:23.133000 audit[2274]: USER_AUTH pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:23.225982 kernel: audit: type=1100 audit(1696290383.133:334): pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:23.409806 sshd[2270]: Failed password for root from 61.177.172.140 port 48200 ssh2 Oct 2 23:46:23.566000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:23.659970 kernel: audit: type=1100 audit(1696290383.566:335): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Oct 2 23:46:24.987529 sshd[2274]: Failed password for root from 61.177.172.185 port 14190 ssh2 Oct 2 23:46:25.420656 sshd[2270]: Failed password for root from 61.177.172.140 port 48200 ssh2 Oct 2 23:46:26.469000 audit[2274]: USER_AUTH pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:26.562994 kernel: audit: type=1100 audit(1696290386.469:336): pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:26.891543 sshd[2270]: Received disconnect from 61.177.172.140 port 48200:11: [preauth] Oct 2 23:46:26.891543 sshd[2270]: Disconnected from authenticating user root 61.177.172.140 port 48200 [preauth] Oct 2 23:46:26.892113 sshd[2270]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Oct 2 23:46:26.894112 systemd[1]: sshd@45-139.178.88.33:22-61.177.172.140:48200.service: Deactivated successfully. Oct 2 23:46:26.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.88.33:22-61.177.172.140:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:26.987992 kernel: audit: type=1131 audit(1696290386.893:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.88.33:22-61.177.172.140:48200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:28.403875 sshd[2274]: Failed password for root from 61.177.172.185 port 14190 ssh2 Oct 2 23:46:29.806000 audit[2274]: USER_AUTH pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:29.899985 kernel: audit: type=1100 audit(1696290389.806:338): pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.185 addr=61.177.172.185 terminal=ssh res=failed' Oct 2 23:46:32.151614 sshd[2274]: Failed password for root from 61.177.172.185 port 14190 ssh2 Oct 2 23:46:33.142363 sshd[2274]: Received disconnect from 61.177.172.185 port 14190:11: [preauth] Oct 2 23:46:33.142363 sshd[2274]: Disconnected from authenticating user root 61.177.172.185 port 14190 [preauth] Oct 2 23:46:33.143028 sshd[2274]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.185 user=root Oct 2 23:46:33.145135 systemd[1]: sshd@46-139.178.88.33:22-61.177.172.185:14190.service: Deactivated successfully. Oct 2 23:46:33.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.88.33:22-61.177.172.185:14190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:33.238852 kernel: audit: type=1131 audit(1696290393.144:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.88.33:22-61.177.172.185:14190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:34.590192 systemd[1]: Started sshd@47-139.178.88.33:22-43.136.35.103:48472.service. Oct 2 23:46:34.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.88.33:22-43.136.35.103:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:34.683987 kernel: audit: type=1130 audit(1696290394.589:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.88.33:22-43.136.35.103:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:35.516375 sshd[2279]: Invalid user jst from 43.136.35.103 port 48472 Oct 2 23:46:35.522506 sshd[2279]: pam_faillock(sshd:auth): User unknown Oct 2 23:46:35.523524 sshd[2279]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:46:35.523614 sshd[2279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:46:35.524607 sshd[2279]: pam_faillock(sshd:auth): User unknown Oct 2 23:46:35.524000 audit[2279]: USER_AUTH pid=2279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jst" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:46:35.617777 kernel: audit: type=1100 audit(1696290395.524:341): pid=2279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jst" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:46:37.357136 sshd[2279]: Failed password for invalid user jst from 43.136.35.103 port 48472 ssh2 Oct 2 23:46:38.752926 sshd[2279]: Received disconnect from 43.136.35.103 port 48472:11: Bye Bye [preauth] Oct 2 23:46:38.752926 sshd[2279]: Disconnected from invalid user jst 43.136.35.103 port 48472 [preauth] Oct 2 23:46:38.755440 systemd[1]: sshd@47-139.178.88.33:22-43.136.35.103:48472.service: Deactivated successfully. Oct 2 23:46:38.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.88.33:22-43.136.35.103:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:38.848991 kernel: audit: type=1131 audit(1696290398.755:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.88.33:22-43.136.35.103:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:40.737163 systemd[1]: Started sshd@48-139.178.88.33:22-121.15.4.92:56492.service. Oct 2 23:46:40.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.88.33:22-121.15.4.92:56492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:40.829989 kernel: audit: type=1130 audit(1696290400.736:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.88.33:22-121.15.4.92:56492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:41.672010 sshd[2283]: Invalid user iwan from 121.15.4.92 port 56492 Oct 2 23:46:41.677965 sshd[2283]: pam_faillock(sshd:auth): User unknown Oct 2 23:46:41.679027 sshd[2283]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:46:41.679115 sshd[2283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:46:41.680109 sshd[2283]: pam_faillock(sshd:auth): User unknown Oct 2 23:46:41.679000 audit[2283]: USER_AUTH pid=2283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iwan" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:46:41.773997 kernel: audit: type=1100 audit(1696290401.679:344): pid=2283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iwan" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:46:44.004969 sshd[2283]: Failed password for invalid user iwan from 121.15.4.92 port 56492 ssh2 Oct 2 23:46:44.737890 sshd[2283]: Received disconnect from 121.15.4.92 port 56492:11: Bye Bye [preauth] Oct 2 23:46:44.737890 sshd[2283]: Disconnected from invalid user iwan 121.15.4.92 port 56492 [preauth] Oct 2 23:46:44.740394 systemd[1]: sshd@48-139.178.88.33:22-121.15.4.92:56492.service: Deactivated successfully. Oct 2 23:46:44.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.88.33:22-121.15.4.92:56492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:46:44.833995 kernel: audit: type=1131 audit(1696290404.740:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.88.33:22-121.15.4.92:56492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:11.310551 systemd[1]: Started sshd@49-139.178.88.33:22-118.97.212.14:39158.service. Oct 2 23:47:11.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.88.33:22-118.97.212.14:39158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:11.403992 kernel: audit: type=1130 audit(1696290431.308:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.88.33:22-118.97.212.14:39158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:12.530621 sshd[2287]: Invalid user bo from 118.97.212.14 port 39158 Oct 2 23:47:12.536706 sshd[2287]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:12.537504 sshd[2287]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:47:12.537544 sshd[2287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Oct 2 23:47:12.537731 sshd[2287]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:12.536000 audit[2287]: USER_AUTH pid=2287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:47:12.629996 kernel: audit: type=1100 audit(1696290432.536:347): pid=2287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:47:13.763243 systemd[1]: Started sshd@50-139.178.88.33:22-20.101.101.40:60060.service. Oct 2 23:47:13.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.88.33:22-20.101.101.40:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:13.856985 kernel: audit: type=1130 audit(1696290433.761:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.88.33:22-20.101.101.40:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:14.654184 sshd[2290]: Invalid user gendir from 20.101.101.40 port 60060 Oct 2 23:47:14.660173 sshd[2290]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:14.661157 sshd[2290]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:47:14.661246 sshd[2290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:47:14.662147 sshd[2290]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:14.660000 audit[2290]: USER_AUTH pid=2290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gendir" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:47:14.755845 kernel: audit: type=1100 audit(1696290434.660:349): pid=2290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gendir" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:47:15.118246 sshd[2287]: Failed password for invalid user bo from 118.97.212.14 port 39158 ssh2 Oct 2 23:47:16.184138 sshd[2290]: Failed password for invalid user gendir from 20.101.101.40 port 60060 ssh2 Oct 2 23:47:17.091423 sshd[2290]: Received disconnect from 20.101.101.40 port 60060:11: Bye Bye [preauth] Oct 2 23:47:17.091423 sshd[2290]: Disconnected from invalid user gendir 20.101.101.40 port 60060 [preauth] Oct 2 23:47:17.093907 systemd[1]: sshd@50-139.178.88.33:22-20.101.101.40:60060.service: Deactivated successfully. Oct 2 23:47:17.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.88.33:22-20.101.101.40:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:17.186817 kernel: audit: type=1131 audit(1696290437.092:350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.88.33:22-20.101.101.40:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:17.311711 sshd[2287]: Received disconnect from 118.97.212.14 port 39158:11: Bye Bye [preauth] Oct 2 23:47:17.311711 sshd[2287]: Disconnected from invalid user bo 118.97.212.14 port 39158 [preauth] Oct 2 23:47:17.314301 systemd[1]: sshd@49-139.178.88.33:22-118.97.212.14:39158.service: Deactivated successfully. Oct 2 23:47:17.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.88.33:22-118.97.212.14:39158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:17.407994 kernel: audit: type=1131 audit(1696290437.312:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.88.33:22-118.97.212.14:39158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:21.617584 systemd[1]: Started sshd@51-139.178.88.33:22-23.126.62.36:52290.service. Oct 2 23:47:21.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.88.33:22-23.126.62.36:52290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:21.710995 kernel: audit: type=1130 audit(1696290441.616:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.88.33:22-23.126.62.36:52290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:22.098315 sshd[2295]: Invalid user gendir from 23.126.62.36 port 52290 Oct 2 23:47:22.104239 sshd[2295]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:22.105225 sshd[2295]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:47:22.105312 sshd[2295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:47:22.106191 sshd[2295]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:22.104000 audit[2295]: USER_AUTH pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gendir" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:47:22.199859 kernel: audit: type=1100 audit(1696290442.104:353): pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gendir" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:47:23.248775 systemd[1]: Started sshd@52-139.178.88.33:22-128.199.158.203:57772.service. Oct 2 23:47:23.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.88.33:22-128.199.158.203:57772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:23.341989 kernel: audit: type=1130 audit(1696290443.248:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.88.33:22-128.199.158.203:57772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:24.059810 sshd[2295]: Failed password for invalid user gendir from 23.126.62.36 port 52290 ssh2 Oct 2 23:47:24.455005 sshd[2295]: Received disconnect from 23.126.62.36 port 52290:11: Bye Bye [preauth] Oct 2 23:47:24.455005 sshd[2295]: Disconnected from invalid user gendir 23.126.62.36 port 52290 [preauth] Oct 2 23:47:24.457536 systemd[1]: sshd@51-139.178.88.33:22-23.126.62.36:52290.service: Deactivated successfully. Oct 2 23:47:24.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.88.33:22-23.126.62.36:52290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:24.551992 kernel: audit: type=1131 audit(1696290444.457:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.88.33:22-23.126.62.36:52290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:24.555315 sshd[2298]: Invalid user cnf from 128.199.158.203 port 57772 Oct 2 23:47:24.556365 sshd[2298]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:24.556562 sshd[2298]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:47:24.556577 sshd[2298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:47:24.556718 sshd[2298]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:24.555000 audit[2298]: USER_AUTH pid=2298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cnf" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:47:24.647832 kernel: audit: type=1100 audit(1696290444.555:356): pid=2298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cnf" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:47:26.785706 sshd[2298]: Failed password for invalid user cnf from 128.199.158.203 port 57772 ssh2 Oct 2 23:47:28.240519 sshd[2298]: Received disconnect from 128.199.158.203 port 57772:11: Bye Bye [preauth] Oct 2 23:47:28.240519 sshd[2298]: Disconnected from invalid user cnf 128.199.158.203 port 57772 [preauth] Oct 2 23:47:28.243011 systemd[1]: sshd@52-139.178.88.33:22-128.199.158.203:57772.service: Deactivated successfully. Oct 2 23:47:28.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.88.33:22-128.199.158.203:57772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:28.336998 kernel: audit: type=1131 audit(1696290448.242:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.88.33:22-128.199.158.203:57772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:43.030952 systemd[1]: Started sshd@53-139.178.88.33:22-43.136.35.103:33708.service. Oct 2 23:47:43.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.88.33:22-43.136.35.103:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:43.124993 kernel: audit: type=1130 audit(1696290463.030:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.88.33:22-43.136.35.103:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:43.948606 sshd[2303]: Invalid user pcote from 43.136.35.103 port 33708 Oct 2 23:47:43.954635 sshd[2303]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:43.955665 sshd[2303]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:47:43.955753 sshd[2303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:47:43.956726 sshd[2303]: pam_faillock(sshd:auth): User unknown Oct 2 23:47:43.956000 audit[2303]: USER_AUTH pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcote" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:47:44.050995 kernel: audit: type=1100 audit(1696290463.956:359): pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcote" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:47:45.794714 sshd[2303]: Failed password for invalid user pcote from 43.136.35.103 port 33708 ssh2 Oct 2 23:47:47.796231 sshd[2303]: Received disconnect from 43.136.35.103 port 33708:11: Bye Bye [preauth] Oct 2 23:47:47.796231 sshd[2303]: Disconnected from invalid user pcote 43.136.35.103 port 33708 [preauth] Oct 2 23:47:47.798749 systemd[1]: sshd@53-139.178.88.33:22-43.136.35.103:33708.service: Deactivated successfully. Oct 2 23:47:47.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.88.33:22-43.136.35.103:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:47:47.892995 kernel: audit: type=1131 audit(1696290467.798:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.88.33:22-43.136.35.103:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:06.346412 systemd[1]: Started sshd@54-139.178.88.33:22-121.15.4.92:39093.service. Oct 2 23:48:06.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.88.33:22-121.15.4.92:39093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:06.439991 kernel: audit: type=1130 audit(1696290486.345:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.88.33:22-121.15.4.92:39093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:07.284838 sshd[2309]: Invalid user event from 121.15.4.92 port 39093 Oct 2 23:48:07.290862 sshd[2309]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:07.291815 sshd[2309]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:48:07.291850 sshd[2309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:48:07.293390 sshd[2309]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:07.292000 audit[2309]: USER_AUTH pid=2309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="event" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:48:07.386988 kernel: audit: type=1100 audit(1696290487.292:362): pid=2309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="event" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:48:09.090147 sshd[2309]: Failed password for invalid user event from 121.15.4.92 port 39093 ssh2 Oct 2 23:48:09.565891 sshd[2309]: Received disconnect from 121.15.4.92 port 39093:11: Bye Bye [preauth] Oct 2 23:48:09.565891 sshd[2309]: Disconnected from invalid user event 121.15.4.92 port 39093 [preauth] Oct 2 23:48:09.568421 systemd[1]: sshd@54-139.178.88.33:22-121.15.4.92:39093.service: Deactivated successfully. Oct 2 23:48:09.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.88.33:22-121.15.4.92:39093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:09.661993 kernel: audit: type=1131 audit(1696290489.568:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.88.33:22-121.15.4.92:39093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:52.903719 systemd[1]: Started sshd@55-139.178.88.33:22-43.136.35.103:38186.service. Oct 2 23:48:52.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.88.33:22-43.136.35.103:38186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:52.996778 kernel: audit: type=1130 audit(1696290532.902:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.88.33:22-43.136.35.103:38186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:53.523637 systemd[1]: Started sshd@56-139.178.88.33:22-128.199.158.203:58848.service. Oct 2 23:48:53.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.88.33:22-128.199.158.203:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:53.616989 kernel: audit: type=1130 audit(1696290533.521:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.88.33:22-128.199.158.203:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:53.840738 sshd[2316]: Invalid user bo from 43.136.35.103 port 38186 Oct 2 23:48:53.846682 sshd[2316]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:53.847759 sshd[2316]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:48:53.847879 sshd[2316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:48:53.848749 sshd[2316]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:53.847000 audit[2316]: USER_AUTH pid=2316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:48:53.947832 kernel: audit: type=1100 audit(1696290533.847:366): pid=2316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bo" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:48:54.490543 sshd[2319]: Invalid user romain from 128.199.158.203 port 58848 Oct 2 23:48:54.496566 sshd[2319]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:54.497528 sshd[2319]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:48:54.497617 sshd[2319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:48:54.498562 sshd[2319]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:54.496000 audit[2319]: USER_AUTH pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="romain" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:48:54.593973 kernel: audit: type=1100 audit(1696290534.496:367): pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="romain" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:48:55.433288 systemd[1]: Started sshd@57-139.178.88.33:22-20.101.101.40:33864.service. Oct 2 23:48:55.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.88.33:22-20.101.101.40:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:55.525778 kernel: audit: type=1130 audit(1696290535.431:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.88.33:22-20.101.101.40:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:55.962803 sshd[2316]: Failed password for invalid user bo from 43.136.35.103 port 38186 ssh2 Oct 2 23:48:56.281766 sshd[2316]: Received disconnect from 43.136.35.103 port 38186:11: Bye Bye [preauth] Oct 2 23:48:56.281766 sshd[2316]: Disconnected from invalid user bo 43.136.35.103 port 38186 [preauth] Oct 2 23:48:56.284271 systemd[1]: sshd@55-139.178.88.33:22-43.136.35.103:38186.service: Deactivated successfully. Oct 2 23:48:56.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.88.33:22-43.136.35.103:38186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:56.311325 sshd[2322]: Invalid user nsc from 20.101.101.40 port 33864 Oct 2 23:48:56.312633 sshd[2322]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:56.312975 sshd[2322]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:48:56.313016 sshd[2322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:48:56.313231 sshd[2322]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:56.311000 audit[2322]: USER_AUTH pid=2322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nsc" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:48:56.467274 kernel: audit: type=1131 audit(1696290536.283:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.88.33:22-43.136.35.103:38186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:56.467305 kernel: audit: type=1100 audit(1696290536.311:370): pid=2322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nsc" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:48:56.748412 sshd[2319]: Failed password for invalid user romain from 128.199.158.203 port 58848 ssh2 Oct 2 23:48:58.171347 sshd[2322]: Failed password for invalid user nsc from 20.101.101.40 port 33864 ssh2 Oct 2 23:48:58.363798 sshd[2319]: Received disconnect from 128.199.158.203 port 58848:11: Bye Bye [preauth] Oct 2 23:48:58.363798 sshd[2319]: Disconnected from invalid user romain 128.199.158.203 port 58848 [preauth] Oct 2 23:48:58.366300 systemd[1]: sshd@56-139.178.88.33:22-128.199.158.203:58848.service: Deactivated successfully. Oct 2 23:48:58.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.88.33:22-128.199.158.203:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:58.460000 kernel: audit: type=1131 audit(1696290538.364:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.88.33:22-128.199.158.203:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:59.011121 systemd[1]: Started sshd@58-139.178.88.33:22-23.126.62.36:52202.service. Oct 2 23:48:59.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.88.33:22-23.126.62.36:52202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:59.103776 kernel: audit: type=1130 audit(1696290539.009:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.88.33:22-23.126.62.36:52202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:59.492072 sshd[2328]: Invalid user xmq from 23.126.62.36 port 52202 Oct 2 23:48:59.497950 sshd[2328]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:59.498922 sshd[2328]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:48:59.499007 sshd[2328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:48:59.499906 sshd[2328]: pam_faillock(sshd:auth): User unknown Oct 2 23:48:59.498000 audit[2328]: USER_AUTH pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmq" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:48:59.592810 kernel: audit: type=1100 audit(1696290539.498:373): pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmq" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:48:59.874129 sshd[2322]: Received disconnect from 20.101.101.40 port 33864:11: Bye Bye [preauth] Oct 2 23:48:59.874129 sshd[2322]: Disconnected from invalid user nsc 20.101.101.40 port 33864 [preauth] Oct 2 23:48:59.876601 systemd[1]: sshd@57-139.178.88.33:22-20.101.101.40:33864.service: Deactivated successfully. Oct 2 23:48:59.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.88.33:22-20.101.101.40:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:48:59.970854 kernel: audit: type=1131 audit(1696290539.875:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.88.33:22-20.101.101.40:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:49:01.769641 sshd[2328]: Failed password for invalid user xmq from 23.126.62.36 port 52202 ssh2 Oct 2 23:49:03.230103 sshd[2328]: Received disconnect from 23.126.62.36 port 52202:11: Bye Bye [preauth] Oct 2 23:49:03.230103 sshd[2328]: Disconnected from invalid user xmq 23.126.62.36 port 52202 [preauth] Oct 2 23:49:03.232624 systemd[1]: sshd@58-139.178.88.33:22-23.126.62.36:52202.service: Deactivated successfully. Oct 2 23:49:03.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.88.33:22-23.126.62.36:52202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:49:03.326995 kernel: audit: type=1131 audit(1696290543.231:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.88.33:22-23.126.62.36:52202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:49:33.019314 systemd[1]: Started sshd@59-139.178.88.33:22-121.15.4.92:49935.service. Oct 2 23:49:33.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.88.33:22-121.15.4.92:49935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:49:33.112995 kernel: audit: type=1130 audit(1696290573.018:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.88.33:22-121.15.4.92:49935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:49:33.956249 sshd[2333]: Invalid user spark from 121.15.4.92 port 49935 Oct 2 23:49:33.962196 sshd[2333]: pam_faillock(sshd:auth): User unknown Oct 2 23:49:33.963162 sshd[2333]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:49:33.963251 sshd[2333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:49:33.964124 sshd[2333]: pam_faillock(sshd:auth): User unknown Oct 2 23:49:33.963000 audit[2333]: USER_AUTH pid=2333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="spark" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:49:34.057992 kernel: audit: type=1100 audit(1696290573.963:377): pid=2333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="spark" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:49:36.569735 sshd[2333]: Failed password for invalid user spark from 121.15.4.92 port 49935 ssh2 Oct 2 23:49:37.022681 sshd[2333]: Received disconnect from 121.15.4.92 port 49935:11: Bye Bye [preauth] Oct 2 23:49:37.022681 sshd[2333]: Disconnected from invalid user spark 121.15.4.92 port 49935 [preauth] Oct 2 23:49:37.025205 systemd[1]: sshd@59-139.178.88.33:22-121.15.4.92:49935.service: Deactivated successfully. Oct 2 23:49:37.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.88.33:22-121.15.4.92:49935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:49:37.118981 kernel: audit: type=1131 audit(1696290577.024:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.88.33:22-121.15.4.92:49935 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:03.745083 systemd[1]: Started sshd@60-139.178.88.33:22-43.136.35.103:37622.service. Oct 2 23:50:03.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:03.838996 kernel: audit: type=1130 audit(1696290603.744:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:04.644441 sshd[2337]: Invalid user dotnet from 43.136.35.103 port 37622 Oct 2 23:50:04.650588 sshd[2337]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:04.651616 sshd[2337]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:50:04.651705 sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:50:04.652633 sshd[2337]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:04.652000 audit[2337]: USER_AUTH pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dotnet" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:50:04.746975 kernel: audit: type=1100 audit(1696290604.652:380): pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dotnet" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:50:06.511189 sshd[2337]: Failed password for invalid user dotnet from 43.136.35.103 port 37622 ssh2 Oct 2 23:50:07.975910 sshd[2337]: Received disconnect from 43.136.35.103 port 37622:11: Bye Bye [preauth] Oct 2 23:50:07.975910 sshd[2337]: Disconnected from invalid user dotnet 43.136.35.103 port 37622 [preauth] Oct 2 23:50:07.978420 systemd[1]: sshd@60-139.178.88.33:22-43.136.35.103:37622.service: Deactivated successfully. Oct 2 23:50:07.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:08.071853 kernel: audit: type=1131 audit(1696290607.978:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.88.33:22-43.136.35.103:37622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:25.997782 systemd[1]: Started sshd@61-139.178.88.33:22-128.199.158.203:59930.service. Oct 2 23:50:25.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.88.33:22-128.199.158.203:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:26.090975 kernel: audit: type=1130 audit(1696290625.997:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.88.33:22-128.199.158.203:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:26.932017 sshd[2342]: Invalid user eliana from 128.199.158.203 port 59930 Oct 2 23:50:26.937964 sshd[2342]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:26.938987 sshd[2342]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:50:26.939075 sshd[2342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:50:26.940072 sshd[2342]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:26.939000 audit[2342]: USER_AUTH pid=2342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="eliana" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:50:27.033996 kernel: audit: type=1100 audit(1696290626.939:383): pid=2342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="eliana" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:50:28.818607 sshd[2342]: Failed password for invalid user eliana from 128.199.158.203 port 59930 ssh2 Oct 2 23:50:30.608452 sshd[2342]: Received disconnect from 128.199.158.203 port 59930:11: Bye Bye [preauth] Oct 2 23:50:30.608452 sshd[2342]: Disconnected from invalid user eliana 128.199.158.203 port 59930 [preauth] Oct 2 23:50:30.611004 systemd[1]: sshd@61-139.178.88.33:22-128.199.158.203:59930.service: Deactivated successfully. Oct 2 23:50:30.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.88.33:22-128.199.158.203:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:30.704999 kernel: audit: type=1131 audit(1696290630.610:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.88.33:22-128.199.158.203:59930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:32.444440 systemd[1]: Started sshd@62-139.178.88.33:22-118.97.212.14:42634.service. Oct 2 23:50:32.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.88.33:22-118.97.212.14:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:32.538009 kernel: audit: type=1130 audit(1696290632.443:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.88.33:22-118.97.212.14:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:33.612214 sshd[2347]: Invalid user pcote from 118.97.212.14 port 42634 Oct 2 23:50:33.618211 sshd[2347]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:33.619204 sshd[2347]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:50:33.619291 sshd[2347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Oct 2 23:50:33.620156 sshd[2347]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:33.619000 audit[2347]: USER_AUTH pid=2347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcote" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:50:33.713001 kernel: audit: type=1100 audit(1696290633.619:386): pid=2347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcote" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:50:35.794619 sshd[2347]: Failed password for invalid user pcote from 118.97.212.14 port 42634 ssh2 Oct 2 23:50:37.511592 sshd[2347]: Received disconnect from 118.97.212.14 port 42634:11: Bye Bye [preauth] Oct 2 23:50:37.511592 sshd[2347]: Disconnected from invalid user pcote 118.97.212.14 port 42634 [preauth] Oct 2 23:50:37.514094 systemd[1]: sshd@62-139.178.88.33:22-118.97.212.14:42634.service: Deactivated successfully. Oct 2 23:50:37.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.88.33:22-118.97.212.14:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:37.608014 kernel: audit: type=1131 audit(1696290637.513:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.88.33:22-118.97.212.14:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:37.802934 systemd[1]: Started sshd@63-139.178.88.33:22-20.101.101.40:35900.service. Oct 2 23:50:37.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.88.33:22-20.101.101.40:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:37.896777 kernel: audit: type=1130 audit(1696290637.802:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.88.33:22-20.101.101.40:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:38.697615 sshd[2351]: Invalid user dotnet from 20.101.101.40 port 35900 Oct 2 23:50:38.698765 sshd[2351]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:38.699044 sshd[2351]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:50:38.699095 sshd[2351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:50:38.699322 sshd[2351]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:38.698000 audit[2351]: USER_AUTH pid=2351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dotnet" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:50:38.791991 kernel: audit: type=1100 audit(1696290638.698:389): pid=2351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dotnet" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:50:39.545797 systemd[1]: Started sshd@64-139.178.88.33:22-23.126.62.36:46588.service. Oct 2 23:50:39.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.88.33:22-23.126.62.36:46588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:39.638996 kernel: audit: type=1130 audit(1696290639.545:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.88.33:22-23.126.62.36:46588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:40.017659 sshd[2354]: Invalid user yhf from 23.126.62.36 port 46588 Oct 2 23:50:40.023753 sshd[2354]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:40.024740 sshd[2354]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:50:40.024851 sshd[2354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:50:40.025752 sshd[2354]: pam_faillock(sshd:auth): User unknown Oct 2 23:50:40.025000 audit[2354]: USER_AUTH pid=2354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yhf" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:50:40.118995 kernel: audit: type=1100 audit(1696290640.025:391): pid=2354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yhf" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:50:40.557663 sshd[2351]: Failed password for invalid user dotnet from 20.101.101.40 port 35900 ssh2 Oct 2 23:50:41.828684 sshd[2354]: Failed password for invalid user yhf from 23.126.62.36 port 46588 ssh2 Oct 2 23:50:42.021653 sshd[2351]: Received disconnect from 20.101.101.40 port 35900:11: Bye Bye [preauth] Oct 2 23:50:42.021653 sshd[2351]: Disconnected from invalid user dotnet 20.101.101.40 port 35900 [preauth] Oct 2 23:50:42.024098 systemd[1]: sshd@63-139.178.88.33:22-20.101.101.40:35900.service: Deactivated successfully. Oct 2 23:50:42.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.88.33:22-20.101.101.40:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:42.118001 kernel: audit: type=1131 audit(1696290642.023:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.88.33:22-20.101.101.40:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:43.042712 sshd[2354]: Received disconnect from 23.126.62.36 port 46588:11: Bye Bye [preauth] Oct 2 23:50:43.042712 sshd[2354]: Disconnected from invalid user yhf 23.126.62.36 port 46588 [preauth] Oct 2 23:50:43.045290 systemd[1]: sshd@64-139.178.88.33:22-23.126.62.36:46588.service: Deactivated successfully. Oct 2 23:50:43.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.88.33:22-23.126.62.36:46588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:43.138834 kernel: audit: type=1131 audit(1696290643.044:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.88.33:22-23.126.62.36:46588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:59.551018 systemd[1]: Started sshd@65-139.178.88.33:22-121.15.4.92:60772.service. Oct 2 23:50:59.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.88.33:22-121.15.4.92:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:50:59.644012 kernel: audit: type=1130 audit(1696290659.550:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.88.33:22-121.15.4.92:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:00.490405 sshd[2359]: Invalid user ht from 121.15.4.92 port 60772 Oct 2 23:51:00.496433 sshd[2359]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:00.497489 sshd[2359]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:51:00.497578 sshd[2359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:51:00.498570 sshd[2359]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:00.497000 audit[2359]: USER_AUTH pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ht" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:51:00.590996 kernel: audit: type=1100 audit(1696290660.497:395): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ht" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:51:02.711957 sshd[2359]: Failed password for invalid user ht from 121.15.4.92 port 60772 ssh2 Oct 2 23:51:02.904915 sshd[2359]: Received disconnect from 121.15.4.92 port 60772:11: Bye Bye [preauth] Oct 2 23:51:02.904915 sshd[2359]: Disconnected from invalid user ht 121.15.4.92 port 60772 [preauth] Oct 2 23:51:02.907448 systemd[1]: sshd@65-139.178.88.33:22-121.15.4.92:60772.service: Deactivated successfully. Oct 2 23:51:02.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.88.33:22-121.15.4.92:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:03.000997 kernel: audit: type=1131 audit(1696290662.907:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.88.33:22-121.15.4.92:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:09.337726 systemd[1]: Started sshd@66-139.178.88.33:22-141.98.11.11:21952.service. Oct 2 23:51:09.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.88.33:22-141.98.11.11:21952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:09.431009 kernel: audit: type=1130 audit(1696290669.337:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.88.33:22-141.98.11.11:21952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:10.260407 sshd[2363]: Invalid user test from 141.98.11.11 port 21952 Oct 2 23:51:10.426619 sshd[2363]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:10.427628 sshd[2363]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:51:10.427718 sshd[2363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Oct 2 23:51:10.428681 sshd[2363]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:10.428000 audit[2363]: USER_AUTH pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Oct 2 23:51:10.520806 kernel: audit: type=1100 audit(1696290670.428:398): pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Oct 2 23:51:13.014809 sshd[2363]: Failed password for invalid user test from 141.98.11.11 port 21952 ssh2 Oct 2 23:51:14.555838 sshd[2363]: Received disconnect from 141.98.11.11 port 21952:11: Bye Bye [preauth] Oct 2 23:51:14.555838 sshd[2363]: Disconnected from invalid user test 141.98.11.11 port 21952 [preauth] Oct 2 23:51:14.558341 systemd[1]: sshd@66-139.178.88.33:22-141.98.11.11:21952.service: Deactivated successfully. Oct 2 23:51:14.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.88.33:22-141.98.11.11:21952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:14.651996 kernel: audit: type=1131 audit(1696290674.558:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.88.33:22-141.98.11.11:21952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:18.544213 systemd[1]: Started sshd@67-139.178.88.33:22-43.136.35.103:35548.service. Oct 2 23:51:18.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.88.33:22-43.136.35.103:35548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:18.637856 kernel: audit: type=1130 audit(1696290678.543:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.88.33:22-43.136.35.103:35548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:19.472203 sshd[2368]: Invalid user yhf from 43.136.35.103 port 35548 Oct 2 23:51:19.478269 sshd[2368]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:19.479241 sshd[2368]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:51:19.479330 sshd[2368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:51:19.480218 sshd[2368]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:19.479000 audit[2368]: USER_AUTH pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yhf" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:51:19.572922 kernel: audit: type=1100 audit(1696290679.479:401): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yhf" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:51:21.303360 sshd[2368]: Failed password for invalid user yhf from 43.136.35.103 port 35548 ssh2 Oct 2 23:51:22.582000 sshd[2368]: Received disconnect from 43.136.35.103 port 35548:11: Bye Bye [preauth] Oct 2 23:51:22.582000 sshd[2368]: Disconnected from invalid user yhf 43.136.35.103 port 35548 [preauth] Oct 2 23:51:22.584520 systemd[1]: sshd@67-139.178.88.33:22-43.136.35.103:35548.service: Deactivated successfully. Oct 2 23:51:22.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.88.33:22-43.136.35.103:35548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:22.678001 kernel: audit: type=1131 audit(1696290682.584:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.88.33:22-43.136.35.103:35548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:57.390853 systemd[1]: Started sshd@68-139.178.88.33:22-128.199.158.203:32786.service. Oct 2 23:51:57.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.88.33:22-128.199.158.203:32786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:57.482811 kernel: audit: type=1130 audit(1696290717.389:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.88.33:22-128.199.158.203:32786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:51:58.312383 sshd[2372]: Invalid user cb from 128.199.158.203 port 32786 Oct 2 23:51:58.318311 sshd[2372]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:58.319291 sshd[2372]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:51:58.319379 sshd[2372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:51:58.320315 sshd[2372]: pam_faillock(sshd:auth): User unknown Oct 2 23:51:58.318000 audit[2372]: USER_AUTH pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cb" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:51:58.413989 kernel: audit: type=1100 audit(1696290718.318:404): pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cb" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:52:00.163536 sshd[2372]: Failed password for invalid user cb from 128.199.158.203 port 32786 ssh2 Oct 2 23:52:00.559898 sshd[2372]: Received disconnect from 128.199.158.203 port 32786:11: Bye Bye [preauth] Oct 2 23:52:00.559898 sshd[2372]: Disconnected from invalid user cb 128.199.158.203 port 32786 [preauth] Oct 2 23:52:00.562294 systemd[1]: sshd@68-139.178.88.33:22-128.199.158.203:32786.service: Deactivated successfully. Oct 2 23:52:00.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.88.33:22-128.199.158.203:32786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:00.655844 kernel: audit: type=1131 audit(1696290720.561:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.88.33:22-128.199.158.203:32786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:12.481741 systemd[1]: Started sshd@69-139.178.88.33:22-23.126.62.36:58956.service. Oct 2 23:52:12.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.88.33:22-23.126.62.36:58956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:12.574796 kernel: audit: type=1130 audit(1696290732.480:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.88.33:22-23.126.62.36:58956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:12.955217 sshd[2377]: Invalid user panda from 23.126.62.36 port 58956 Oct 2 23:52:12.961164 sshd[2377]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:12.962247 sshd[2377]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:52:12.962337 sshd[2377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:52:12.963223 sshd[2377]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:12.961000 audit[2377]: USER_AUTH pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="panda" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:52:13.055848 kernel: audit: type=1100 audit(1696290732.961:407): pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="panda" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:52:15.062339 sshd[2377]: Failed password for invalid user panda from 23.126.62.36 port 58956 ssh2 Oct 2 23:52:15.921549 systemd[1]: Started sshd@70-139.178.88.33:22-20.101.101.40:37886.service. Oct 2 23:52:15.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.88.33:22-20.101.101.40:37886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:16.014994 kernel: audit: type=1130 audit(1696290735.919:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.88.33:22-20.101.101.40:37886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:16.889140 sshd[2380]: Invalid user monte from 20.101.101.40 port 37886 Oct 2 23:52:16.895133 sshd[2380]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:16.896102 sshd[2380]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:52:16.896190 sshd[2380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:52:16.897182 sshd[2380]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:16.895000 audit[2380]: USER_AUTH pid=2380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monte" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:52:16.923160 sshd[2377]: Received disconnect from 23.126.62.36 port 58956:11: Bye Bye [preauth] Oct 2 23:52:16.923160 sshd[2377]: Disconnected from invalid user panda 23.126.62.36 port 58956 [preauth] Oct 2 23:52:16.923759 systemd[1]: sshd@69-139.178.88.33:22-23.126.62.36:58956.service: Deactivated successfully. Oct 2 23:52:16.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.88.33:22-23.126.62.36:58956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:17.081842 kernel: audit: type=1100 audit(1696290736.895:409): pid=2380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monte" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:52:17.081878 kernel: audit: type=1131 audit(1696290736.922:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.88.33:22-23.126.62.36:58956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:18.544799 sshd[2380]: Failed password for invalid user monte from 20.101.101.40 port 37886 ssh2 Oct 2 23:52:19.403816 sshd[2380]: Received disconnect from 20.101.101.40 port 37886:11: Bye Bye [preauth] Oct 2 23:52:19.403816 sshd[2380]: Disconnected from invalid user monte 20.101.101.40 port 37886 [preauth] Oct 2 23:52:19.406350 systemd[1]: sshd@70-139.178.88.33:22-20.101.101.40:37886.service: Deactivated successfully. Oct 2 23:52:19.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.88.33:22-20.101.101.40:37886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:19.499999 kernel: audit: type=1131 audit(1696290739.404:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.88.33:22-20.101.101.40:37886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:23.511910 systemd[1]: Started sshd@71-139.178.88.33:22-121.15.4.92:43365.service. Oct 2 23:52:23.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.88.33:22-121.15.4.92:43365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:23.605014 kernel: audit: type=1130 audit(1696290743.510:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.88.33:22-121.15.4.92:43365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:24.439012 sshd[2385]: Invalid user swa from 121.15.4.92 port 43365 Oct 2 23:52:24.444896 sshd[2385]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:24.445845 sshd[2385]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:52:24.445934 sshd[2385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:52:24.446860 sshd[2385]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:24.446000 audit[2385]: USER_AUTH pid=2385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="swa" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:52:24.538775 kernel: audit: type=1100 audit(1696290744.446:413): pid=2385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="swa" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:52:26.525939 sshd[2385]: Failed password for invalid user swa from 121.15.4.92 port 43365 ssh2 Oct 2 23:52:27.204756 systemd[1]: Started sshd@72-139.178.88.33:22-43.136.35.103:38754.service. Oct 2 23:52:27.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.88.33:22-43.136.35.103:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:27.296777 kernel: audit: type=1130 audit(1696290747.203:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.88.33:22-43.136.35.103:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:27.442311 sshd[2385]: Received disconnect from 121.15.4.92 port 43365:11: Bye Bye [preauth] Oct 2 23:52:27.442311 sshd[2385]: Disconnected from invalid user swa 121.15.4.92 port 43365 [preauth] Oct 2 23:52:27.444765 systemd[1]: sshd@71-139.178.88.33:22-121.15.4.92:43365.service: Deactivated successfully. Oct 2 23:52:27.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.88.33:22-121.15.4.92:43365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:27.545007 kernel: audit: type=1131 audit(1696290747.444:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.88.33:22-121.15.4.92:43365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:28.156052 sshd[2388]: Invalid user ohm from 43.136.35.103 port 38754 Oct 2 23:52:28.162123 sshd[2388]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:28.163115 sshd[2388]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:52:28.163204 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.136.35.103 Oct 2 23:52:28.164107 sshd[2388]: pam_faillock(sshd:auth): User unknown Oct 2 23:52:28.162000 audit[2388]: USER_AUTH pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ohm" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:52:28.256810 kernel: audit: type=1100 audit(1696290748.162:416): pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ohm" exe="/usr/sbin/sshd" hostname=43.136.35.103 addr=43.136.35.103 terminal=ssh res=failed' Oct 2 23:52:29.791666 sshd[2388]: Failed password for invalid user ohm from 43.136.35.103 port 38754 ssh2 Oct 2 23:52:30.906349 sshd[2388]: Received disconnect from 43.136.35.103 port 38754:11: Bye Bye [preauth] Oct 2 23:52:30.906349 sshd[2388]: Disconnected from invalid user ohm 43.136.35.103 port 38754 [preauth] Oct 2 23:52:30.908889 systemd[1]: sshd@72-139.178.88.33:22-43.136.35.103:38754.service: Deactivated successfully. Oct 2 23:52:30.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.88.33:22-43.136.35.103:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:31.001848 kernel: audit: type=1131 audit(1696290750.908:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.88.33:22-43.136.35.103:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:49.116248 systemd[1]: Starting systemd-tmpfiles-clean.service... Oct 2 23:52:49.121957 systemd-tmpfiles[2393]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 23:52:49.122177 systemd-tmpfiles[2393]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 23:52:49.122830 systemd-tmpfiles[2393]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 23:52:49.133613 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Oct 2 23:52:49.133706 systemd[1]: Finished systemd-tmpfiles-clean.service. Oct 2 23:52:49.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:49.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:49.225320 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Oct 2 23:52:49.313251 kernel: audit: type=1130 audit(1696290769.133:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:52:49.313281 kernel: audit: type=1131 audit(1696290769.133:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:26.736601 systemd[1]: Started sshd@73-139.178.88.33:22-117.50.118.93:39240.service. Oct 2 23:53:26.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.88.33:22-117.50.118.93:39240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:26.828846 kernel: audit: type=1130 audit(1696290806.735:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.88.33:22-117.50.118.93:39240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:29.062659 systemd[1]: Started sshd@74-139.178.88.33:22-128.199.158.203:33864.service. Oct 2 23:53:29.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.88.33:22-128.199.158.203:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:29.155992 kernel: audit: type=1130 audit(1696290809.062:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.88.33:22-128.199.158.203:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:30.321872 sshd[2403]: Invalid user quota from 128.199.158.203 port 33864 Oct 2 23:53:30.327844 sshd[2403]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:30.328875 sshd[2403]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:53:30.328964 sshd[2403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:53:30.329861 sshd[2403]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:30.329000 audit[2403]: USER_AUTH pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="quota" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:53:30.422994 kernel: audit: type=1100 audit(1696290810.329:422): pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="quota" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:53:31.103244 systemd[1]: Started sshd@75-139.178.88.33:22-23.126.62.36:49282.service. Oct 2 23:53:31.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.88.33:22-23.126.62.36:49282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:31.195778 kernel: audit: type=1130 audit(1696290811.102:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.88.33:22-23.126.62.36:49282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:31.570384 sshd[2406]: Invalid user zww from 23.126.62.36 port 49282 Oct 2 23:53:31.576343 sshd[2406]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:31.577342 sshd[2406]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:53:31.577430 sshd[2406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:53:31.578493 sshd[2406]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:31.577000 audit[2406]: USER_AUTH pid=2406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zww" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:53:31.677011 kernel: audit: type=1100 audit(1696290811.577:424): pid=2406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zww" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:53:32.469212 sshd[2403]: Failed password for invalid user quota from 128.199.158.203 port 33864 ssh2 Oct 2 23:53:32.723018 sshd[2403]: Received disconnect from 128.199.158.203 port 33864:11: Bye Bye [preauth] Oct 2 23:53:32.723018 sshd[2403]: Disconnected from invalid user quota 128.199.158.203 port 33864 [preauth] Oct 2 23:53:32.725440 systemd[1]: sshd@74-139.178.88.33:22-128.199.158.203:33864.service: Deactivated successfully. Oct 2 23:53:32.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.88.33:22-128.199.158.203:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:32.819997 kernel: audit: type=1131 audit(1696290812.725:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.88.33:22-128.199.158.203:33864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:32.854049 sshd[2406]: Failed password for invalid user zww from 23.126.62.36 port 49282 ssh2 Oct 2 23:53:33.948448 sshd[2406]: Received disconnect from 23.126.62.36 port 49282:11: Bye Bye [preauth] Oct 2 23:53:33.948448 sshd[2406]: Disconnected from invalid user zww 23.126.62.36 port 49282 [preauth] Oct 2 23:53:33.950926 systemd[1]: sshd@75-139.178.88.33:22-23.126.62.36:49282.service: Deactivated successfully. Oct 2 23:53:33.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.88.33:22-23.126.62.36:49282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:34.044992 kernel: audit: type=1131 audit(1696290813.950:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.88.33:22-23.126.62.36:49282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:47.608494 systemd[1]: Started sshd@76-139.178.88.33:22-121.15.4.92:54196.service. Oct 2 23:53:47.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.88.33:22-121.15.4.92:54196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:47.701996 kernel: audit: type=1130 audit(1696290827.607:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.88.33:22-121.15.4.92:54196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:48.319655 systemd[1]: Started sshd@77-139.178.88.33:22-118.97.212.14:46876.service. Oct 2 23:53:48.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.88.33:22-118.97.212.14:46876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:48.412994 kernel: audit: type=1130 audit(1696290828.319:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.88.33:22-118.97.212.14:46876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:48.512718 sshd[2413]: Invalid user 1 from 121.15.4.92 port 54196 Oct 2 23:53:48.515014 sshd[2413]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:48.515130 sshd[2413]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:53:48.515163 sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:53:48.514000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="1" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:53:48.515243 sshd[2413]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:48.609968 kernel: audit: type=1100 audit(1696290828.514:429): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="1" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:53:49.521208 sshd[2416]: Invalid user jst from 118.97.212.14 port 46876 Oct 2 23:53:49.527233 sshd[2416]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:49.528227 sshd[2416]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:53:49.528314 sshd[2416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Oct 2 23:53:49.529185 sshd[2416]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:49.528000 audit[2416]: USER_AUTH pid=2416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jst" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:53:49.621857 kernel: audit: type=1100 audit(1696290829.528:430): pid=2416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jst" exe="/usr/sbin/sshd" hostname=118.97.212.14 addr=118.97.212.14 terminal=ssh res=failed' Oct 2 23:53:50.794612 sshd[2413]: Failed password for invalid user 1 from 121.15.4.92 port 54196 ssh2 Oct 2 23:53:51.011348 sshd[2413]: Received disconnect from 121.15.4.92 port 54196:11: Bye Bye [preauth] Oct 2 23:53:51.011348 sshd[2413]: Disconnected from invalid user 1 121.15.4.92 port 54196 [preauth] Oct 2 23:53:51.013809 systemd[1]: sshd@76-139.178.88.33:22-121.15.4.92:54196.service: Deactivated successfully. Oct 2 23:53:51.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.88.33:22-121.15.4.92:54196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:51.106995 kernel: audit: type=1131 audit(1696290831.013:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.88.33:22-121.15.4.92:54196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:51.277042 sshd[2416]: Failed password for invalid user jst from 118.97.212.14 port 46876 ssh2 Oct 2 23:53:51.774700 systemd[1]: Started sshd@78-139.178.88.33:22-20.101.101.40:39842.service. Oct 2 23:53:51.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.88.33:22-20.101.101.40:39842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:51.868003 kernel: audit: type=1130 audit(1696290831.774:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.88.33:22-20.101.101.40:39842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:52.658424 sshd[2420]: Invalid user pcote from 20.101.101.40 port 39842 Oct 2 23:53:52.664340 sshd[2420]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:52.665352 sshd[2420]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:53:52.665440 sshd[2420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.101.40 Oct 2 23:53:52.666451 sshd[2420]: pam_faillock(sshd:auth): User unknown Oct 2 23:53:52.665000 audit[2420]: USER_AUTH pid=2420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcote" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:53:52.759871 kernel: audit: type=1100 audit(1696290832.665:433): pid=2420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcote" exe="/usr/sbin/sshd" hostname=20.101.101.40 addr=20.101.101.40 terminal=ssh res=failed' Oct 2 23:53:52.810034 sshd[2416]: Received disconnect from 118.97.212.14 port 46876:11: Bye Bye [preauth] Oct 2 23:53:52.810034 sshd[2416]: Disconnected from invalid user jst 118.97.212.14 port 46876 [preauth] Oct 2 23:53:52.810763 systemd[1]: sshd@77-139.178.88.33:22-118.97.212.14:46876.service: Deactivated successfully. Oct 2 23:53:52.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.88.33:22-118.97.212.14:46876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:52.903991 kernel: audit: type=1131 audit(1696290832.810:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.88.33:22-118.97.212.14:46876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:54.825937 sshd[2420]: Failed password for invalid user pcote from 20.101.101.40 port 39842 ssh2 Oct 2 23:53:56.502365 sshd[2420]: Received disconnect from 20.101.101.40 port 39842:11: Bye Bye [preauth] Oct 2 23:53:56.502365 sshd[2420]: Disconnected from invalid user pcote 20.101.101.40 port 39842 [preauth] Oct 2 23:53:56.504838 systemd[1]: sshd@78-139.178.88.33:22-20.101.101.40:39842.service: Deactivated successfully. Oct 2 23:53:56.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.88.33:22-20.101.101.40:39842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:53:56.599002 kernel: audit: type=1131 audit(1696290836.504:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.88.33:22-20.101.101.40:39842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:28.938642 systemd[1]: Started sshd@79-139.178.88.33:22-149.129.249.160:60014.service. Oct 2 23:54:28.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.88.33:22-149.129.249.160:60014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:29.031992 kernel: audit: type=1130 audit(1696290868.937:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.88.33:22-149.129.249.160:60014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:29.203988 sshd[2427]: kex_exchange_identification: banner line contains invalid characters Oct 2 23:54:29.203988 sshd[2427]: banner exchange: Connection from 149.129.249.160 port 60014: invalid format Oct 2 23:54:29.205385 systemd[1]: sshd@79-139.178.88.33:22-149.129.249.160:60014.service: Deactivated successfully. Oct 2 23:54:29.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.88.33:22-149.129.249.160:60014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:29.304988 kernel: audit: type=1131 audit(1696290869.205:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.88.33:22-149.129.249.160:60014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:34.336429 systemd[1]: Started sshd@80-139.178.88.33:22-149.129.249.160:41330.service. Oct 2 23:54:34.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.88.33:22-149.129.249.160:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:34.429825 kernel: audit: type=1130 audit(1696290874.335:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.88.33:22-149.129.249.160:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:35.923504 sshd[2430]: Invalid user NL5xUDpV2xRa from 149.129.249.160 port 41330 Oct 2 23:54:35.925245 sshd[2430]: userauth_pubkey: parse publickey packet: incomplete message [preauth] Oct 2 23:54:35.927000 audit[2430]: USER_ERR pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=149.129.249.160 addr=149.129.249.160 terminal=ssh res=failed' Oct 2 23:54:35.930455 systemd[1]: sshd@80-139.178.88.33:22-149.129.249.160:41330.service: Deactivated successfully. Oct 2 23:54:35.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.88.33:22-149.129.249.160:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:36.112174 kernel: audit: type=1109 audit(1696290875.927:439): pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=149.129.249.160 addr=149.129.249.160 terminal=ssh res=failed' Oct 2 23:54:36.112209 kernel: audit: type=1131 audit(1696290875.930:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.88.33:22-149.129.249.160:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:54:53.378374 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:54:53.377Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":943} Oct 2 23:54:53.381549 etcd-wrapper[1841]: {"level":"info","ts":"2023-10-02T23:54:53.381Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":943,"took":"2.863355ms"} Oct 2 23:55:01.125264 systemd[1]: Started sshd@81-139.178.88.33:22-128.199.158.203:34928.service. Oct 2 23:55:01.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.88.33:22-128.199.158.203:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:01.218834 kernel: audit: type=1130 audit(1696290901.124:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.88.33:22-128.199.158.203:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:02.074171 sshd[2435]: Invalid user big from 128.199.158.203 port 34928 Oct 2 23:55:02.080190 sshd[2435]: pam_faillock(sshd:auth): User unknown Oct 2 23:55:02.081146 sshd[2435]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:55:02.081229 sshd[2435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.158.203 Oct 2 23:55:02.082104 sshd[2435]: pam_faillock(sshd:auth): User unknown Oct 2 23:55:02.081000 audit[2435]: USER_AUTH pid=2435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="big" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:55:02.175995 kernel: audit: type=1100 audit(1696290902.081:442): pid=2435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="big" exe="/usr/sbin/sshd" hostname=128.199.158.203 addr=128.199.158.203 terminal=ssh res=failed' Oct 2 23:55:03.849969 sshd[2435]: Failed password for invalid user big from 128.199.158.203 port 34928 ssh2 Oct 2 23:55:04.578887 sshd[2435]: Received disconnect from 128.199.158.203 port 34928:11: Bye Bye [preauth] Oct 2 23:55:04.578887 sshd[2435]: Disconnected from invalid user big 128.199.158.203 port 34928 [preauth] Oct 2 23:55:04.581390 systemd[1]: sshd@81-139.178.88.33:22-128.199.158.203:34928.service: Deactivated successfully. Oct 2 23:55:04.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.88.33:22-128.199.158.203:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:04.675887 kernel: audit: type=1131 audit(1696290904.581:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.88.33:22-128.199.158.203:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:12.383445 systemd[1]: Started sshd@82-139.178.88.33:22-121.15.4.92:36791.service. Oct 2 23:55:12.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.88.33:22-121.15.4.92:36791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:12.476996 kernel: audit: type=1130 audit(1696290912.382:444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.88.33:22-121.15.4.92:36791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:13.315910 sshd[2439]: Invalid user inhost from 121.15.4.92 port 36791 Oct 2 23:55:13.322106 sshd[2439]: pam_faillock(sshd:auth): User unknown Oct 2 23:55:13.323286 sshd[2439]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:55:13.323376 sshd[2439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.4.92 Oct 2 23:55:13.324285 sshd[2439]: pam_faillock(sshd:auth): User unknown Oct 2 23:55:13.323000 audit[2439]: USER_AUTH pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="inhost" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:55:13.417976 kernel: audit: type=1100 audit(1696290913.323:445): pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="inhost" exe="/usr/sbin/sshd" hostname=121.15.4.92 addr=121.15.4.92 terminal=ssh res=failed' Oct 2 23:55:14.936764 sshd[2439]: Failed password for invalid user inhost from 121.15.4.92 port 36791 ssh2 Oct 2 23:55:15.872744 systemd[1]: Started sshd@83-139.178.88.33:22-23.126.62.36:42168.service. Oct 2 23:55:15.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.88.33:22-23.126.62.36:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:15.966860 kernel: audit: type=1130 audit(1696290915.872:446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.88.33:22-23.126.62.36:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:16.336798 sshd[2442]: Invalid user juice from 23.126.62.36 port 42168 Oct 2 23:55:16.343144 sshd[2442]: pam_faillock(sshd:auth): User unknown Oct 2 23:55:16.344113 sshd[2442]: pam_unix(sshd:auth): check pass; user unknown Oct 2 23:55:16.344200 sshd[2442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.126.62.36 Oct 2 23:55:16.345217 sshd[2442]: pam_faillock(sshd:auth): User unknown Oct 2 23:55:16.344000 audit[2442]: USER_AUTH pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="juice" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:55:16.444538 sshd[2439]: Received disconnect from 121.15.4.92 port 36791:11: Bye Bye [preauth] Oct 2 23:55:16.444538 sshd[2439]: Disconnected from invalid user inhost 121.15.4.92 port 36791 [preauth] Oct 2 23:55:16.444862 kernel: audit: type=1100 audit(1696290916.344:447): pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="juice" exe="/usr/sbin/sshd" hostname=23.126.62.36 addr=23.126.62.36 terminal=ssh res=failed' Oct 2 23:55:16.445170 systemd[1]: sshd@82-139.178.88.33:22-121.15.4.92:36791.service: Deactivated successfully. Oct 2 23:55:16.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.88.33:22-121.15.4.92:36791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:16.539005 kernel: audit: type=1131 audit(1696290916.444:448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.88.33:22-121.15.4.92:36791 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:18.705014 sshd[2442]: Failed password for invalid user juice from 23.126.62.36 port 42168 ssh2 Oct 2 23:55:19.366472 sshd[2442]: Received disconnect from 23.126.62.36 port 42168:11: Bye Bye [preauth] Oct 2 23:55:19.366472 sshd[2442]: Disconnected from invalid user juice 23.126.62.36 port 42168 [preauth] Oct 2 23:55:19.368981 systemd[1]: sshd@83-139.178.88.33:22-23.126.62.36:42168.service: Deactivated successfully. Oct 2 23:55:19.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.88.33:22-23.126.62.36:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:19.462841 kernel: audit: type=1131 audit(1696290919.368:449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.88.33:22-23.126.62.36:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:26.741754 sshd[2401]: Timeout before authentication for 117.50.118.93 port 39240 Oct 2 23:55:26.743307 systemd[1]: sshd@73-139.178.88.33:22-117.50.118.93:39240.service: Deactivated successfully. Oct 2 23:55:26.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.88.33:22-117.50.118.93:39240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:26.836993 kernel: audit: type=1131 audit(1696290926.741:450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.88.33:22-117.50.118.93:39240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:33.251526 systemd[1]: Started sshd@84-139.178.88.33:22-20.101.101.40:41846.service. Oct 2 23:55:33.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.88.33:22-20.101.101.40:41846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 23:55:33.344995 kernel: audit: type=1130 audit(1696290933.249:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.88.33:22-20.101.101.40:41846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'