Feb 9 06:30:29.567321 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 06:30:29.567338 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 06:30:29.567345 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:30:29.567349 kernel: BIOS-provided physical RAM map: Feb 9 06:30:29.567353 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 06:30:29.567356 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 06:30:29.567361 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 06:30:29.567366 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 06:30:29.567369 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 06:30:29.567373 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006dfbbfff] usable Feb 9 06:30:29.567377 kernel: BIOS-e820: [mem 0x000000006dfbc000-0x000000006dfbcfff] ACPI NVS Feb 9 06:30:29.567381 kernel: BIOS-e820: [mem 0x000000006dfbd000-0x000000006dfbdfff] reserved Feb 9 06:30:29.567385 kernel: BIOS-e820: [mem 0x000000006dfbe000-0x0000000077fc4fff] usable Feb 9 06:30:29.567389 kernel: BIOS-e820: [mem 0x0000000077fc5000-0x00000000790a7fff] reserved Feb 9 06:30:29.567394 kernel: BIOS-e820: [mem 0x00000000790a8000-0x0000000079230fff] usable Feb 9 06:30:29.567399 kernel: BIOS-e820: [mem 0x0000000079231000-0x0000000079662fff] ACPI NVS Feb 9 06:30:29.567403 kernel: BIOS-e820: [mem 0x0000000079663000-0x000000007befefff] reserved Feb 9 06:30:29.567407 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 9 06:30:29.567411 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 9 06:30:29.567415 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 06:30:29.567420 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 06:30:29.567424 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 06:30:29.567428 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 06:30:29.567433 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 06:30:29.567437 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 9 06:30:29.567441 kernel: NX (Execute Disable) protection: active Feb 9 06:30:29.567445 kernel: SMBIOS 3.2.1 present. Feb 9 06:30:29.567450 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 06:30:29.567454 kernel: tsc: Detected 3400.000 MHz processor Feb 9 06:30:29.567458 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 06:30:29.567462 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 06:30:29.567467 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 06:30:29.567471 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 9 06:30:29.567476 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 06:30:29.567481 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 9 06:30:29.567485 kernel: Using GB pages for direct mapping Feb 9 06:30:29.567490 kernel: ACPI: Early table checksum verification disabled Feb 9 06:30:29.567494 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 06:30:29.567498 kernel: ACPI: XSDT 0x00000000795440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 06:30:29.567503 kernel: ACPI: FACP 0x0000000079580620 000114 (v06 01072009 AMI 00010013) Feb 9 06:30:29.567509 kernel: ACPI: DSDT 0x0000000079544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 06:30:29.567514 kernel: ACPI: FACS 0x0000000079662F80 000040 Feb 9 06:30:29.567519 kernel: ACPI: APIC 0x0000000079580738 00012C (v04 01072009 AMI 00010013) Feb 9 06:30:29.567524 kernel: ACPI: FPDT 0x0000000079580868 000044 (v01 01072009 AMI 00010013) Feb 9 06:30:29.567529 kernel: ACPI: FIDT 0x00000000795808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 06:30:29.567533 kernel: ACPI: MCFG 0x0000000079580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 06:30:29.567538 kernel: ACPI: SPMI 0x0000000079580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 06:30:29.567543 kernel: ACPI: SSDT 0x00000000795809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 06:30:29.567548 kernel: ACPI: SSDT 0x00000000795824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 06:30:29.567553 kernel: ACPI: SSDT 0x00000000795856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 06:30:29.567558 kernel: ACPI: HPET 0x00000000795879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:30:29.567562 kernel: ACPI: SSDT 0x0000000079587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 06:30:29.567567 kernel: ACPI: SSDT 0x00000000795889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 06:30:29.567572 kernel: ACPI: UEFI 0x00000000795892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:30:29.567576 kernel: ACPI: LPIT 0x0000000079589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:30:29.567581 kernel: ACPI: SSDT 0x00000000795893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 06:30:29.567586 kernel: ACPI: SSDT 0x000000007958BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 06:30:29.567591 kernel: ACPI: DBGP 0x000000007958D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:30:29.567596 kernel: ACPI: DBG2 0x000000007958D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:30:29.567600 kernel: ACPI: SSDT 0x000000007958D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 06:30:29.567605 kernel: ACPI: DMAR 0x000000007958EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 06:30:29.567610 kernel: ACPI: SSDT 0x000000007958ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 06:30:29.567614 kernel: ACPI: TPM2 0x000000007958EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 06:30:29.567619 kernel: ACPI: SSDT 0x000000007958EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 06:30:29.567624 kernel: ACPI: WSMT 0x000000007958FC28 000028 (v01 \xf5m 01072009 AMI 00010013) Feb 9 06:30:29.567630 kernel: ACPI: EINJ 0x000000007958FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 06:30:29.567634 kernel: ACPI: ERST 0x000000007958FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 06:30:29.567639 kernel: ACPI: BERT 0x000000007958FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 06:30:29.567644 kernel: ACPI: HEST 0x000000007958FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 06:30:29.567648 kernel: ACPI: SSDT 0x0000000079590260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 06:30:29.567653 kernel: ACPI: Reserving FACP table memory at [mem 0x79580620-0x79580733] Feb 9 06:30:29.567658 kernel: ACPI: Reserving DSDT table memory at [mem 0x79544268-0x7958061e] Feb 9 06:30:29.567663 kernel: ACPI: Reserving FACS table memory at [mem 0x79662f80-0x79662fbf] Feb 9 06:30:29.567668 kernel: ACPI: Reserving APIC table memory at [mem 0x79580738-0x79580863] Feb 9 06:30:29.567673 kernel: ACPI: Reserving FPDT table memory at [mem 0x79580868-0x795808ab] Feb 9 06:30:29.567677 kernel: ACPI: Reserving FIDT table memory at [mem 0x795808b0-0x7958094b] Feb 9 06:30:29.567682 kernel: ACPI: Reserving MCFG table memory at [mem 0x79580950-0x7958098b] Feb 9 06:30:29.567687 kernel: ACPI: Reserving SPMI table memory at [mem 0x79580990-0x795809d0] Feb 9 06:30:29.567691 kernel: ACPI: Reserving SSDT table memory at [mem 0x795809d8-0x795824f3] Feb 9 06:30:29.567696 kernel: ACPI: Reserving SSDT table memory at [mem 0x795824f8-0x795856bd] Feb 9 06:30:29.567700 kernel: ACPI: Reserving SSDT table memory at [mem 0x795856c0-0x795879ea] Feb 9 06:30:29.567705 kernel: ACPI: Reserving HPET table memory at [mem 0x795879f0-0x79587a27] Feb 9 06:30:29.567711 kernel: ACPI: Reserving SSDT table memory at [mem 0x79587a28-0x795889d5] Feb 9 06:30:29.567715 kernel: ACPI: Reserving SSDT table memory at [mem 0x795889d8-0x795892ce] Feb 9 06:30:29.567720 kernel: ACPI: Reserving UEFI table memory at [mem 0x795892d0-0x79589311] Feb 9 06:30:29.567724 kernel: ACPI: Reserving LPIT table memory at [mem 0x79589318-0x795893ab] Feb 9 06:30:29.567729 kernel: ACPI: Reserving SSDT table memory at [mem 0x795893b0-0x7958bb8d] Feb 9 06:30:29.567734 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958bb90-0x7958d071] Feb 9 06:30:29.567738 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958d078-0x7958d0ab] Feb 9 06:30:29.567743 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958d0b0-0x7958d103] Feb 9 06:30:29.567748 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958d108-0x7958ec6e] Feb 9 06:30:29.567753 kernel: ACPI: Reserving DMAR table memory at [mem 0x7958ec70-0x7958ed17] Feb 9 06:30:29.567758 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ed18-0x7958ee5b] Feb 9 06:30:29.567762 kernel: ACPI: Reserving TPM2 table memory at [mem 0x7958ee60-0x7958ee93] Feb 9 06:30:29.567767 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ee98-0x7958fc26] Feb 9 06:30:29.567772 kernel: ACPI: Reserving WSMT table memory at [mem 0x7958fc28-0x7958fc4f] Feb 9 06:30:29.567776 kernel: ACPI: Reserving EINJ table memory at [mem 0x7958fc50-0x7958fd7f] Feb 9 06:30:29.567781 kernel: ACPI: Reserving ERST table memory at [mem 0x7958fd80-0x7958ffaf] Feb 9 06:30:29.567786 kernel: ACPI: Reserving BERT table memory at [mem 0x7958ffb0-0x7958ffdf] Feb 9 06:30:29.567790 kernel: ACPI: Reserving HEST table memory at [mem 0x7958ffe0-0x7959025b] Feb 9 06:30:29.567796 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590260-0x795903c1] Feb 9 06:30:29.567801 kernel: No NUMA configuration found Feb 9 06:30:29.567805 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 9 06:30:29.567810 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 9 06:30:29.567815 kernel: Zone ranges: Feb 9 06:30:29.567819 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 06:30:29.567824 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 06:30:29.567829 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 9 06:30:29.567833 kernel: Movable zone start for each node Feb 9 06:30:29.567839 kernel: Early memory node ranges Feb 9 06:30:29.567844 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 06:30:29.567848 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 06:30:29.567853 kernel: node 0: [mem 0x0000000040400000-0x000000006dfbbfff] Feb 9 06:30:29.567857 kernel: node 0: [mem 0x000000006dfbe000-0x0000000077fc4fff] Feb 9 06:30:29.567862 kernel: node 0: [mem 0x00000000790a8000-0x0000000079230fff] Feb 9 06:30:29.567867 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 9 06:30:29.567871 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 9 06:30:29.567876 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 9 06:30:29.567885 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 06:30:29.567890 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 06:30:29.567895 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 06:30:29.567901 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 06:30:29.567906 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 06:30:29.567911 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 9 06:30:29.567916 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 9 06:30:29.567921 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 9 06:30:29.567927 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 06:30:29.567932 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 06:30:29.567937 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 06:30:29.567942 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 06:30:29.567947 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 06:30:29.567952 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 06:30:29.567957 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 06:30:29.567962 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 06:30:29.567967 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 06:30:29.567973 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 06:30:29.567978 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 06:30:29.567983 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 06:30:29.567988 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 06:30:29.567993 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 06:30:29.567998 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 06:30:29.568003 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 06:30:29.568008 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 06:30:29.568013 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 06:30:29.568018 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 06:30:29.568023 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 06:30:29.568028 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 06:30:29.568033 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 06:30:29.568039 kernel: TSC deadline timer available Feb 9 06:30:29.568044 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 06:30:29.568049 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 9 06:30:29.568054 kernel: Booting paravirtualized kernel on bare hardware Feb 9 06:30:29.568059 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 06:30:29.568065 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 06:30:29.568070 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 06:30:29.568075 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 06:30:29.568080 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 06:30:29.568085 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222327 Feb 9 06:30:29.568090 kernel: Policy zone: Normal Feb 9 06:30:29.568095 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:30:29.568100 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 06:30:29.568106 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 06:30:29.568111 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 06:30:29.568117 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 06:30:29.568122 kernel: Memory: 32683728K/33411988K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 06:30:29.568127 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 06:30:29.568132 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 06:30:29.568137 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 06:30:29.568142 kernel: rcu: Hierarchical RCU implementation. Feb 9 06:30:29.568147 kernel: rcu: RCU event tracing is enabled. Feb 9 06:30:29.568153 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 06:30:29.568159 kernel: Rude variant of Tasks RCU enabled. Feb 9 06:30:29.568164 kernel: Tracing variant of Tasks RCU enabled. Feb 9 06:30:29.568169 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 06:30:29.568174 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 06:30:29.568179 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 06:30:29.568184 kernel: random: crng init done Feb 9 06:30:29.568188 kernel: Console: colour dummy device 80x25 Feb 9 06:30:29.568193 kernel: printk: console [tty0] enabled Feb 9 06:30:29.568199 kernel: printk: console [ttyS1] enabled Feb 9 06:30:29.568204 kernel: ACPI: Core revision 20210730 Feb 9 06:30:29.568209 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 06:30:29.568215 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 06:30:29.568220 kernel: DMAR: Host address width 39 Feb 9 06:30:29.568225 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 06:30:29.568230 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 06:30:29.568235 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 06:30:29.568240 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 06:30:29.568245 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 9 06:30:29.568251 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 9 06:30:29.568256 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 06:30:29.568261 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 06:30:29.568266 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 06:30:29.568271 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 06:30:29.568276 kernel: x2apic enabled Feb 9 06:30:29.568281 kernel: Switched APIC routing to cluster x2apic. Feb 9 06:30:29.568286 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 06:30:29.568291 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 06:30:29.568297 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 06:30:29.568302 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 06:30:29.568307 kernel: process: using mwait in idle threads Feb 9 06:30:29.568312 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 06:30:29.568317 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 06:30:29.568322 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 06:30:29.568329 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 06:30:29.568334 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 06:30:29.568340 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 06:30:29.568345 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 06:30:29.568350 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 06:30:29.568355 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 06:30:29.568360 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 06:30:29.568366 kernel: TAA: Mitigation: TSX disabled Feb 9 06:30:29.568371 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 06:30:29.568376 kernel: SRBDS: Mitigation: Microcode Feb 9 06:30:29.568381 kernel: GDS: Vulnerable: No microcode Feb 9 06:30:29.568387 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 06:30:29.568392 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 06:30:29.568397 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 06:30:29.568402 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 06:30:29.568407 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 06:30:29.568412 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 06:30:29.568417 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 06:30:29.568422 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 06:30:29.568427 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 06:30:29.568433 kernel: Freeing SMP alternatives memory: 32K Feb 9 06:30:29.568438 kernel: pid_max: default: 32768 minimum: 301 Feb 9 06:30:29.568443 kernel: LSM: Security Framework initializing Feb 9 06:30:29.568448 kernel: SELinux: Initializing. Feb 9 06:30:29.568453 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 06:30:29.568458 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 06:30:29.568463 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 06:30:29.568468 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 06:30:29.568474 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 06:30:29.568479 kernel: ... version: 4 Feb 9 06:30:29.568484 kernel: ... bit width: 48 Feb 9 06:30:29.568489 kernel: ... generic registers: 4 Feb 9 06:30:29.568494 kernel: ... value mask: 0000ffffffffffff Feb 9 06:30:29.568499 kernel: ... max period: 00007fffffffffff Feb 9 06:30:29.568504 kernel: ... fixed-purpose events: 3 Feb 9 06:30:29.568509 kernel: ... event mask: 000000070000000f Feb 9 06:30:29.568514 kernel: signal: max sigframe size: 2032 Feb 9 06:30:29.568519 kernel: rcu: Hierarchical SRCU implementation. Feb 9 06:30:29.568525 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 06:30:29.568530 kernel: smp: Bringing up secondary CPUs ... Feb 9 06:30:29.568535 kernel: x86: Booting SMP configuration: Feb 9 06:30:29.568540 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 06:30:29.568545 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 06:30:29.568550 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 06:30:29.568555 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 06:30:29.568560 kernel: smpboot: Max logical packages: 1 Feb 9 06:30:29.568565 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 06:30:29.568571 kernel: devtmpfs: initialized Feb 9 06:30:29.568576 kernel: x86/mm: Memory block size: 128MB Feb 9 06:30:29.568581 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6dfbc000-0x6dfbcfff] (4096 bytes) Feb 9 06:30:29.568586 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79231000-0x79662fff] (4399104 bytes) Feb 9 06:30:29.568591 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 06:30:29.568596 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 06:30:29.568601 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 06:30:29.568606 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 06:30:29.568612 kernel: audit: initializing netlink subsys (disabled) Feb 9 06:30:29.568618 kernel: audit: type=2000 audit(1707460224.119:1): state=initialized audit_enabled=0 res=1 Feb 9 06:30:29.568623 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 06:30:29.568628 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 06:30:29.568633 kernel: cpuidle: using governor menu Feb 9 06:30:29.568638 kernel: ACPI: bus type PCI registered Feb 9 06:30:29.568643 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 06:30:29.568648 kernel: dca service started, version 1.12.1 Feb 9 06:30:29.568653 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 06:30:29.568658 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 06:30:29.568663 kernel: PCI: Using configuration type 1 for base access Feb 9 06:30:29.568668 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 06:30:29.568673 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 06:30:29.568679 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 06:30:29.568684 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 06:30:29.568689 kernel: ACPI: Added _OSI(Module Device) Feb 9 06:30:29.568694 kernel: ACPI: Added _OSI(Processor Device) Feb 9 06:30:29.568699 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 06:30:29.568704 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 06:30:29.568710 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 06:30:29.568715 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 06:30:29.568720 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 06:30:29.568725 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 06:30:29.568730 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:30:29.568735 kernel: ACPI: SSDT 0xFFFF944980215400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 06:30:29.568740 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 06:30:29.568745 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:30:29.568750 kernel: ACPI: SSDT 0xFFFF944981CEAC00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 06:30:29.568756 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:30:29.568760 kernel: ACPI: SSDT 0xFFFF944981C5F800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 06:30:29.568765 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:30:29.568770 kernel: ACPI: SSDT 0xFFFF944981C5E000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 06:30:29.568775 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:30:29.568780 kernel: ACPI: SSDT 0xFFFF94498014B000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 06:30:29.568785 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:30:29.568790 kernel: ACPI: SSDT 0xFFFF944981CEF400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 06:30:29.568795 kernel: ACPI: Interpreter enabled Feb 9 06:30:29.568801 kernel: ACPI: PM: (supports S0 S5) Feb 9 06:30:29.568806 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 06:30:29.568811 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 06:30:29.568816 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 06:30:29.568821 kernel: HEST: Table parsing has been initialized. Feb 9 06:30:29.568826 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 06:30:29.568831 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 06:30:29.568836 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 06:30:29.568841 kernel: ACPI: PM: Power Resource [USBC] Feb 9 06:30:29.568847 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 06:30:29.568852 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 06:30:29.568857 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 06:30:29.568862 kernel: ACPI: PM: Power Resource [WRST] Feb 9 06:30:29.568867 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 06:30:29.568872 kernel: ACPI: PM: Power Resource [FN00] Feb 9 06:30:29.568877 kernel: ACPI: PM: Power Resource [FN01] Feb 9 06:30:29.568882 kernel: ACPI: PM: Power Resource [FN02] Feb 9 06:30:29.568887 kernel: ACPI: PM: Power Resource [FN03] Feb 9 06:30:29.568892 kernel: ACPI: PM: Power Resource [FN04] Feb 9 06:30:29.568898 kernel: ACPI: PM: Power Resource [PIN] Feb 9 06:30:29.568903 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 06:30:29.568970 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 06:30:29.569017 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 06:30:29.569059 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 06:30:29.569067 kernel: PCI host bridge to bus 0000:00 Feb 9 06:30:29.569111 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 06:30:29.569152 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 06:30:29.569189 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 06:30:29.569226 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 9 06:30:29.569263 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 06:30:29.569299 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 06:30:29.569351 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 06:30:29.569406 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 06:30:29.569451 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.569498 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 06:30:29.569542 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.569587 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 06:30:29.569631 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 9 06:30:29.569679 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 06:30:29.569722 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 06:30:29.569768 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 06:30:29.569812 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 9 06:30:29.569859 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 06:30:29.569901 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 9 06:30:29.569947 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 06:30:29.569993 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 9 06:30:29.570035 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 06:30:29.570084 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 06:30:29.570126 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 9 06:30:29.570169 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 9 06:30:29.570214 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 06:30:29.570259 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:30:29.570304 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 06:30:29.570349 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:30:29.570397 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 06:30:29.570439 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 9 06:30:29.570490 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 06:30:29.570537 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 06:30:29.570581 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 9 06:30:29.570622 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 06:30:29.570669 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 06:30:29.570713 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 9 06:30:29.570755 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 06:30:29.570802 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 06:30:29.570846 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 9 06:30:29.570889 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 9 06:30:29.570931 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 06:30:29.570973 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 06:30:29.571015 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 06:30:29.571057 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 9 06:30:29.571099 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 06:30:29.571150 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 06:30:29.571194 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.571241 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 06:30:29.571287 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.571338 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 06:30:29.571382 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.571428 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 06:30:29.571471 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.571518 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 06:30:29.571560 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.571609 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 06:30:29.571652 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:30:29.571700 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 06:30:29.571745 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 06:30:29.571787 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 9 06:30:29.571832 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 06:30:29.571878 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 06:30:29.571921 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 06:30:29.571965 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 06:30:29.572015 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 06:30:29.572060 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 06:30:29.572105 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 9 06:30:29.572148 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 06:30:29.572193 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 06:30:29.572237 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 06:30:29.572284 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 06:30:29.572333 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 06:30:29.572377 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 9 06:30:29.572421 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 06:30:29.572465 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 06:30:29.572512 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 06:30:29.572555 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 06:30:29.572598 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 9 06:30:29.572640 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:30:29.572682 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 06:30:29.572729 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 06:30:29.572774 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 9 06:30:29.572820 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 06:30:29.572862 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 9 06:30:29.572907 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.572949 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 06:30:29.572992 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 06:30:29.573033 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 9 06:30:29.573084 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 06:30:29.573129 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 9 06:30:29.573175 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 06:30:29.573222 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 9 06:30:29.573323 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 06:30:29.573369 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 06:30:29.573412 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 06:30:29.573454 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 9 06:30:29.573496 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 06:30:29.573545 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 06:30:29.573592 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 06:30:29.573638 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 06:30:29.573681 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 06:30:29.573724 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 06:30:29.573766 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 06:30:29.573809 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 9 06:30:29.573857 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 06:30:29.573910 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 06:30:29.573959 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 9 06:30:29.574005 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 9 06:30:29.574051 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 06:30:29.574096 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 06:30:29.574143 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 06:30:29.574189 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 06:30:29.574236 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 06:30:29.574280 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 06:30:29.574326 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 9 06:30:29.574334 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 06:30:29.574340 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 06:30:29.574346 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 06:30:29.574351 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 06:30:29.574357 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 06:30:29.574363 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 06:30:29.574369 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 06:30:29.574374 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 06:30:29.574380 kernel: iommu: Default domain type: Translated Feb 9 06:30:29.574385 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 06:30:29.574430 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 06:30:29.574478 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 06:30:29.574523 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 06:30:29.574531 kernel: vgaarb: loaded Feb 9 06:30:29.574538 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 06:30:29.574543 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 06:30:29.574549 kernel: PTP clock support registered Feb 9 06:30:29.574554 kernel: PCI: Using ACPI for IRQ routing Feb 9 06:30:29.574559 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 06:30:29.574565 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 06:30:29.574570 kernel: e820: reserve RAM buffer [mem 0x6dfbc000-0x6fffffff] Feb 9 06:30:29.574575 kernel: e820: reserve RAM buffer [mem 0x77fc5000-0x77ffffff] Feb 9 06:30:29.574581 kernel: e820: reserve RAM buffer [mem 0x79231000-0x7bffffff] Feb 9 06:30:29.574587 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 9 06:30:29.574592 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 9 06:30:29.574597 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 06:30:29.574602 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 06:30:29.574608 kernel: clocksource: Switched to clocksource tsc-early Feb 9 06:30:29.574613 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 06:30:29.574618 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 06:30:29.574624 kernel: pnp: PnP ACPI init Feb 9 06:30:29.574669 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 06:30:29.574717 kernel: pnp 00:02: [dma 0 disabled] Feb 9 06:30:29.574760 kernel: pnp 00:03: [dma 0 disabled] Feb 9 06:30:29.574801 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 06:30:29.574840 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 06:30:29.574882 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 06:30:29.574922 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 06:30:29.574965 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 06:30:29.575003 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 06:30:29.575042 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 06:30:29.575080 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 06:30:29.575118 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 06:30:29.575156 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 06:30:29.575194 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 06:30:29.575238 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 06:30:29.575279 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 06:30:29.575318 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 06:30:29.575358 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 06:30:29.575396 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 06:30:29.575436 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 06:30:29.575474 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 06:30:29.575517 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 06:30:29.575525 kernel: pnp: PnP ACPI: found 10 devices Feb 9 06:30:29.575531 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 06:30:29.575536 kernel: NET: Registered PF_INET protocol family Feb 9 06:30:29.575542 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 06:30:29.575547 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 06:30:29.575552 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 06:30:29.575558 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 06:30:29.575565 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 06:30:29.575570 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 06:30:29.575575 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 06:30:29.575581 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 06:30:29.575586 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 06:30:29.575592 kernel: NET: Registered PF_XDP protocol family Feb 9 06:30:29.575634 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 9 06:30:29.575678 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 9 06:30:29.575723 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 9 06:30:29.575767 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 06:30:29.575812 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 06:30:29.575858 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 06:30:29.575902 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 06:30:29.575949 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 06:30:29.575992 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 06:30:29.576035 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 9 06:30:29.576078 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:30:29.576121 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 06:30:29.576165 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 06:30:29.576208 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 06:30:29.576251 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 9 06:30:29.576296 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 06:30:29.576341 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 06:30:29.576383 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 9 06:30:29.576426 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 06:30:29.576470 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 06:30:29.576514 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 06:30:29.576558 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 9 06:30:29.576601 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 06:30:29.576644 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 06:30:29.576689 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 9 06:30:29.576728 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 06:30:29.576766 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 06:30:29.576804 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 06:30:29.576842 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 06:30:29.576879 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 9 06:30:29.576916 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 06:30:29.576961 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 9 06:30:29.577003 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:30:29.577047 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 06:30:29.577087 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 9 06:30:29.577131 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 06:30:29.577171 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 9 06:30:29.577215 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 06:30:29.577257 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 9 06:30:29.577299 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 06:30:29.577342 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 9 06:30:29.577350 kernel: PCI: CLS 64 bytes, default 64 Feb 9 06:30:29.577356 kernel: DMAR: No ATSR found Feb 9 06:30:29.577361 kernel: DMAR: No SATC found Feb 9 06:30:29.577366 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 06:30:29.577372 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 06:30:29.577379 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 06:30:29.577384 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 06:30:29.577389 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 06:30:29.577395 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 06:30:29.577400 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 06:30:29.577405 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 06:30:29.577411 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 06:30:29.577416 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 06:30:29.577421 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 06:30:29.577427 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 06:30:29.577472 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 06:30:29.577517 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 06:30:29.577560 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 06:30:29.577603 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 06:30:29.577645 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 06:30:29.577689 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 06:30:29.577731 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 06:30:29.577776 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 06:30:29.577818 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 06:30:29.577860 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 06:30:29.577903 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 06:30:29.577944 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 06:30:29.577987 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 06:30:29.578029 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 06:30:29.578072 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 06:30:29.578114 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 06:30:29.578159 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 06:30:29.578203 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 06:30:29.578245 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 06:30:29.578288 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 06:30:29.578333 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 06:30:29.578376 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 06:30:29.578418 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 06:30:29.578462 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 06:30:29.578508 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 06:30:29.578553 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 06:30:29.578598 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 06:30:29.578642 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 06:30:29.578689 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 06:30:29.578697 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 06:30:29.578703 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 06:30:29.578709 kernel: software IO TLB: mapped [mem 0x0000000073fc5000-0x0000000077fc5000] (64MB) Feb 9 06:30:29.578715 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 06:30:29.578720 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 06:30:29.578726 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 06:30:29.578731 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 06:30:29.578736 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 06:30:29.578783 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 06:30:29.578791 kernel: Initialise system trusted keyrings Feb 9 06:30:29.578798 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 06:30:29.578803 kernel: Key type asymmetric registered Feb 9 06:30:29.578809 kernel: Asymmetric key parser 'x509' registered Feb 9 06:30:29.578814 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 06:30:29.578819 kernel: io scheduler mq-deadline registered Feb 9 06:30:29.578825 kernel: io scheduler kyber registered Feb 9 06:30:29.578830 kernel: io scheduler bfq registered Feb 9 06:30:29.578873 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 06:30:29.578916 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 06:30:29.578962 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 06:30:29.579005 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 06:30:29.579049 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 06:30:29.579091 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 06:30:29.579133 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 06:30:29.579181 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 06:30:29.579189 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 06:30:29.579196 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 06:30:29.579201 kernel: pstore: Registered erst as persistent store backend Feb 9 06:30:29.579206 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 06:30:29.579212 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 06:30:29.579217 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 06:30:29.579223 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 06:30:29.579267 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 06:30:29.579276 kernel: i8042: PNP: No PS/2 controller found. Feb 9 06:30:29.579317 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 06:30:29.579358 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 06:30:29.579398 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T06:30:28 UTC (1707460228) Feb 9 06:30:29.579436 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 06:30:29.579444 kernel: fail to initialize ptp_kvm Feb 9 06:30:29.579449 kernel: intel_pstate: Intel P-state driver initializing Feb 9 06:30:29.579455 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 06:30:29.579460 kernel: intel_pstate: HWP enabled Feb 9 06:30:29.579466 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 06:30:29.579472 kernel: vesafb: scrolling: redraw Feb 9 06:30:29.579478 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 06:30:29.579483 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x0000000003c5ab63, using 768k, total 768k Feb 9 06:30:29.579489 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 06:30:29.579494 kernel: fb0: VESA VGA frame buffer device Feb 9 06:30:29.579499 kernel: NET: Registered PF_INET6 protocol family Feb 9 06:30:29.579505 kernel: Segment Routing with IPv6 Feb 9 06:30:29.579510 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 06:30:29.579515 kernel: NET: Registered PF_PACKET protocol family Feb 9 06:30:29.579521 kernel: Key type dns_resolver registered Feb 9 06:30:29.579527 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 06:30:29.579532 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 06:30:29.579537 kernel: IPI shorthand broadcast: enabled Feb 9 06:30:29.579543 kernel: sched_clock: Marking stable (1847895013, 1355240016)->(4628026676, -1424891647) Feb 9 06:30:29.579548 kernel: registered taskstats version 1 Feb 9 06:30:29.579554 kernel: Loading compiled-in X.509 certificates Feb 9 06:30:29.579559 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 06:30:29.579564 kernel: Key type .fscrypt registered Feb 9 06:30:29.579570 kernel: Key type fscrypt-provisioning registered Feb 9 06:30:29.579576 kernel: pstore: Using crash dump compression: deflate Feb 9 06:30:29.579581 kernel: ima: Allocated hash algorithm: sha1 Feb 9 06:30:29.579586 kernel: ima: No architecture policies found Feb 9 06:30:29.579592 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 06:30:29.579597 kernel: Write protecting the kernel read-only data: 28672k Feb 9 06:30:29.579603 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 06:30:29.579608 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 06:30:29.579614 kernel: Run /init as init process Feb 9 06:30:29.579620 kernel: with arguments: Feb 9 06:30:29.579625 kernel: /init Feb 9 06:30:29.579630 kernel: with environment: Feb 9 06:30:29.579635 kernel: HOME=/ Feb 9 06:30:29.579641 kernel: TERM=linux Feb 9 06:30:29.579646 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 06:30:29.579652 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 06:30:29.579660 systemd[1]: Detected architecture x86-64. Feb 9 06:30:29.579666 systemd[1]: Running in initrd. Feb 9 06:30:29.579671 systemd[1]: No hostname configured, using default hostname. Feb 9 06:30:29.579677 systemd[1]: Hostname set to . Feb 9 06:30:29.579682 systemd[1]: Initializing machine ID from random generator. Feb 9 06:30:29.579688 systemd[1]: Queued start job for default target initrd.target. Feb 9 06:30:29.579694 systemd[1]: Started systemd-ask-password-console.path. Feb 9 06:30:29.579699 systemd[1]: Reached target cryptsetup.target. Feb 9 06:30:29.579706 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 9 06:30:29.579711 systemd[1]: Reached target paths.target. Feb 9 06:30:29.579717 systemd[1]: Reached target slices.target. Feb 9 06:30:29.579722 systemd[1]: Reached target swap.target. Feb 9 06:30:29.579727 systemd[1]: Reached target timers.target. Feb 9 06:30:29.579733 systemd[1]: Listening on iscsid.socket. Feb 9 06:30:29.579739 systemd[1]: Listening on iscsiuio.socket. Feb 9 06:30:29.579745 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 06:30:29.579751 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 06:30:29.579757 systemd[1]: Listening on systemd-journald.socket. Feb 9 06:30:29.579762 kernel: tsc: Refined TSC clocksource calibration: 3408.088 MHz Feb 9 06:30:29.579768 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 06:30:29.579774 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x312026e0278, max_idle_ns: 440795229318 ns Feb 9 06:30:29.579779 kernel: clocksource: Switched to clocksource tsc Feb 9 06:30:29.579785 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 06:30:29.579790 systemd[1]: Reached target sockets.target. Feb 9 06:30:29.579796 systemd[1]: Starting iscsiuio.service... Feb 9 06:30:29.579802 systemd[1]: Starting kmod-static-nodes.service... Feb 9 06:30:29.579807 kernel: SCSI subsystem initialized Feb 9 06:30:29.579813 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 06:30:29.579819 kernel: Loading iSCSI transport class v2.0-870. Feb 9 06:30:29.579824 systemd[1]: Starting systemd-journald.service... Feb 9 06:30:29.579830 systemd[1]: Starting systemd-modules-load.service... Feb 9 06:30:29.579838 systemd-journald[267]: Journal started Feb 9 06:30:29.579866 systemd-journald[267]: Runtime Journal (/run/log/journal/50edea23e2fd4bdbbcedca78d58ef9ab) is 8.0M, max 639.3M, 631.3M free. Feb 9 06:30:29.582052 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 06:30:29.606351 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 06:30:29.639371 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 06:30:29.639389 systemd[1]: Started iscsiuio.service. Feb 9 06:30:29.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.665379 kernel: Bridge firewalling registered Feb 9 06:30:29.665397 kernel: audit: type=1130 audit(1707460229.664:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.665405 systemd[1]: Started systemd-journald.service. Feb 9 06:30:29.724221 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 06:30:29.767136 kernel: audit: type=1130 audit(1707460229.723:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.724472 systemd[1]: Finished kmod-static-nodes.service. Feb 9 06:30:29.883764 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 06:30:29.883794 kernel: audit: type=1130 audit(1707460229.787:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.883802 kernel: device-mapper: uevent: version 1.0.3 Feb 9 06:30:29.883809 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 06:30:29.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.787481 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 06:30:29.942576 kernel: audit: type=1130 audit(1707460229.892:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.886115 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 06:30:29.996334 kernel: audit: type=1130 audit(1707460229.951:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.892643 systemd[1]: Finished systemd-modules-load.service. Feb 9 06:30:30.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:29.951627 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 06:30:30.004898 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 06:30:30.051017 systemd[1]: Starting systemd-sysctl.service... Feb 9 06:30:30.051307 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 06:30:30.051423 kernel: audit: type=1130 audit(1707460230.004:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.054066 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 06:30:30.103450 kernel: audit: type=1130 audit(1707460230.053:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.054643 systemd[1]: Finished systemd-sysctl.service. Feb 9 06:30:30.172561 kernel: audit: type=1130 audit(1707460230.117:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.117788 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 06:30:30.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.181945 systemd[1]: Starting dracut-cmdline.service... Feb 9 06:30:30.261446 kernel: audit: type=1130 audit(1707460230.181:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.261459 kernel: iscsi: registered transport (tcp) Feb 9 06:30:30.261466 dracut-cmdline[292]: dracut-dracut-053 Feb 9 06:30:30.261466 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 06:30:30.261466 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:30:30.334606 kernel: iscsi: registered transport (qla4xxx) Feb 9 06:30:30.334619 kernel: QLogic iSCSI HBA Driver Feb 9 06:30:30.323050 systemd[1]: Finished dracut-cmdline.service. Feb 9 06:30:30.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.362123 systemd[1]: Starting dracut-pre-udev.service... Feb 9 06:30:30.376856 systemd[1]: Starting iscsid.service... Feb 9 06:30:30.392503 systemd[1]: Started iscsid.service. Feb 9 06:30:30.434443 kernel: raid6: avx2x4 gen() 48684 MB/s Feb 9 06:30:30.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.434521 iscsid[447]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 06:30:30.434521 iscsid[447]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 06:30:30.434521 iscsid[447]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 06:30:30.434521 iscsid[447]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 06:30:30.434521 iscsid[447]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 06:30:30.434521 iscsid[447]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 06:30:30.434521 iscsid[447]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 06:30:30.600363 kernel: raid6: avx2x4 xor() 21911 MB/s Feb 9 06:30:30.600375 kernel: raid6: avx2x2 gen() 53583 MB/s Feb 9 06:30:30.600382 kernel: raid6: avx2x2 xor() 32164 MB/s Feb 9 06:30:30.600389 kernel: raid6: avx2x1 gen() 45320 MB/s Feb 9 06:30:30.600398 kernel: raid6: avx2x1 xor() 27929 MB/s Feb 9 06:30:30.644404 kernel: raid6: sse2x4 gen() 21347 MB/s Feb 9 06:30:30.679358 kernel: raid6: sse2x4 xor() 11947 MB/s Feb 9 06:30:30.714403 kernel: raid6: sse2x2 gen() 21581 MB/s Feb 9 06:30:30.748402 kernel: raid6: sse2x2 xor() 13435 MB/s Feb 9 06:30:30.781330 kernel: raid6: sse2x1 gen() 18297 MB/s Feb 9 06:30:30.834117 kernel: raid6: sse2x1 xor() 8928 MB/s Feb 9 06:30:30.834132 kernel: raid6: using algorithm avx2x2 gen() 53583 MB/s Feb 9 06:30:30.834140 kernel: raid6: .... xor() 32164 MB/s, rmw enabled Feb 9 06:30:30.852590 kernel: raid6: using avx2x2 recovery algorithm Feb 9 06:30:30.899371 kernel: xor: automatically using best checksumming function avx Feb 9 06:30:30.978382 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 06:30:30.983766 systemd[1]: Finished dracut-pre-udev.service. Feb 9 06:30:30.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:30.993000 audit: BPF prog-id=6 op=LOAD Feb 9 06:30:30.993000 audit: BPF prog-id=7 op=LOAD Feb 9 06:30:30.994206 systemd[1]: Starting systemd-udevd.service... Feb 9 06:30:31.002856 systemd-udevd[470]: Using default interface naming scheme 'v252'. Feb 9 06:30:31.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:31.008505 systemd[1]: Started systemd-udevd.service. Feb 9 06:30:31.051449 dracut-pre-trigger[482]: rd.md=0: removing MD RAID activation Feb 9 06:30:31.027006 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 06:30:31.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:31.056139 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 06:30:31.069655 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 06:30:31.119776 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 06:30:31.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:31.120477 systemd[1]: Starting dracut-initqueue.service... Feb 9 06:30:31.162389 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 06:30:31.162405 kernel: ACPI: bus type USB registered Feb 9 06:30:31.184390 kernel: usbcore: registered new interface driver usbfs Feb 9 06:30:31.184414 kernel: usbcore: registered new interface driver hub Feb 9 06:30:31.220510 kernel: usbcore: registered new device driver usb Feb 9 06:30:31.221334 kernel: libata version 3.00 loaded. Feb 9 06:30:31.247334 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 06:30:31.247369 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 9 06:30:31.285738 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 06:30:31.286329 kernel: AES CTR mode by8 optimization enabled Feb 9 06:30:31.303335 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 06:30:31.303357 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 06:30:31.320336 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 06:30:31.337109 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 06:30:31.376926 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 06:30:31.377022 kernel: pps pps0: new PPS source ptp0 Feb 9 06:30:31.407341 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 06:30:31.407431 kernel: scsi host0: ahci Feb 9 06:30:31.407454 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 06:30:31.437981 kernel: scsi host1: ahci Feb 9 06:30:31.438005 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:2c Feb 9 06:30:31.467945 kernel: scsi host2: ahci Feb 9 06:30:31.480408 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 06:30:31.494894 kernel: scsi host3: ahci Feb 9 06:30:31.494918 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 06:30:31.534886 kernel: scsi host4: ahci Feb 9 06:30:31.534979 kernel: pps pps1: new PPS source ptp1 Feb 9 06:30:31.535051 kernel: scsi host5: ahci Feb 9 06:30:31.547125 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 06:30:31.547227 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 06:30:31.564331 kernel: scsi host6: ahci Feb 9 06:30:31.564356 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 06:30:31.587165 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 06:30:31.587244 kernel: scsi host7: ahci Feb 9 06:30:31.597730 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:2d Feb 9 06:30:31.614045 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 129 Feb 9 06:30:31.640138 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 06:30:31.640208 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 129 Feb 9 06:30:31.655839 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 06:30:31.672057 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 129 Feb 9 06:30:31.753985 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 129 Feb 9 06:30:31.754000 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 129 Feb 9 06:30:31.771079 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 129 Feb 9 06:30:31.788138 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 06:30:31.788213 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 129 Feb 9 06:30:31.841116 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 9 06:30:31.841189 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 129 Feb 9 06:30:31.841197 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 06:30:32.180330 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 06:30:32.180423 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 06:30:32.196363 kernel: port_module: 9 callbacks suppressed Feb 9 06:30:32.196375 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 06:30:32.196464 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 06:30:32.230365 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 06:30:32.230453 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 06:30:32.282330 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 06:30:32.299363 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 06:30:32.315369 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 06:30:32.332371 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 06:30:32.348393 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 06:30:32.366384 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 06:30:32.382387 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 06:30:32.442045 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 06:30:32.442088 kernel: ata2.00: Features: NCQ-prio Feb 9 06:30:32.442096 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 06:30:32.460337 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 06:30:32.460552 kernel: ata1.00: Features: NCQ-prio Feb 9 06:30:32.480359 kernel: ata2.00: configured for UDMA/133 Feb 9 06:30:32.509360 kernel: ata1.00: configured for UDMA/133 Feb 9 06:30:32.524410 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 06:30:32.543403 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 06:30:32.594251 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 06:30:32.594341 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 06:30:32.594399 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 06:30:32.650182 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 06:30:32.650279 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 06:30:32.650356 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 06:30:32.667944 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 06:30:32.699509 kernel: hub 1-0:1.0: USB hub found Feb 9 06:30:32.699600 kernel: hub 1-0:1.0: 16 ports detected Feb 9 06:30:32.714362 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:30:32.715379 kernel: hub 2-0:1.0: USB hub found Feb 9 06:30:32.715460 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 06:30:32.728587 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:30:32.728605 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 06:30:32.728686 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 06:30:32.728762 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 06:30:32.728818 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 06:30:32.728871 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 06:30:32.728933 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 06:30:32.728989 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:30:32.731338 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 06:30:32.731354 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:30:32.731361 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 06:30:32.756906 kernel: hub 2-0:1.0: 10 ports detected Feb 9 06:30:32.756980 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 06:30:32.789364 kernel: usb: port power management may be unreliable Feb 9 06:30:32.789379 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 06:30:32.792385 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth3 Feb 9 06:30:32.996034 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 06:30:32.996062 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 06:30:32.996130 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 06:30:33.028065 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:30:33.041633 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:30:33.041648 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 9 06:30:33.041720 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 06:30:33.098707 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 06:30:33.159440 kernel: BTRFS: device label OEM devid 1 transid 18 /dev/sdb6 scanned by (udev-worker) (517) Feb 9 06:30:33.159455 kernel: hub 1-14:1.0: USB hub found Feb 9 06:30:33.159609 kernel: hub 1-14:1.0: 4 ports detected Feb 9 06:30:33.127582 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 06:30:33.158086 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 06:30:33.169677 systemd[1]: Finished dracut-initqueue.service. Feb 9 06:30:33.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.200963 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 06:30:33.253539 kernel: audit: type=1130 audit(1707460233.196:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.245474 systemd[1]: Reached target initrd-root-device.target. Feb 9 06:30:33.253585 systemd[1]: Reached target remote-fs-pre.target. Feb 9 06:30:33.283544 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 06:30:33.291532 systemd[1]: Reached target remote-fs.target. Feb 9 06:30:33.309454 systemd[1]: Starting disk-uuid.service... Feb 9 06:30:33.324001 systemd[1]: Starting dracut-pre-mount.service... Feb 9 06:30:33.337008 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 06:30:33.441116 kernel: audit: type=1130 audit(1707460233.351:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.441208 kernel: audit: type=1131 audit(1707460233.351:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.337196 systemd[1]: Finished disk-uuid.service. Feb 9 06:30:33.514393 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 06:30:33.514417 kernel: audit: type=1130 audit(1707460233.453:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.352113 systemd[1]: Finished dracut-pre-mount.service. Feb 9 06:30:33.454209 systemd[1]: Reached target local-fs-pre.target. Feb 9 06:30:33.522523 systemd[1]: Reached target local-fs.target. Feb 9 06:30:33.530513 systemd[1]: Reached target sysinit.target. Feb 9 06:30:33.530546 systemd[1]: Reached target basic.target. Feb 9 06:30:33.544913 systemd[1]: Starting systemd-fsck-root.service... Feb 9 06:30:33.568867 systemd[1]: Starting verity-setup.service... Feb 9 06:30:33.579798 systemd-fsck[715]: ROOT: clean, 624/553520 files, 56033/553472 blocks Feb 9 06:30:33.602378 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 06:30:33.602414 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 06:30:33.616757 systemd[1]: Finished systemd-fsck-root.service. Feb 9 06:30:33.665462 kernel: audit: type=1130 audit(1707460233.618:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.619832 systemd[1]: Mounting sysroot.mount... Feb 9 06:30:33.769994 kernel: usbcore: registered new interface driver usbhid Feb 9 06:30:33.770008 kernel: usbhid: USB HID core driver Feb 9 06:30:33.770016 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 06:30:33.770097 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 06:30:33.718080 systemd[1]: Found device dev-mapper-usr.device. Feb 9 06:30:33.778928 systemd[1]: Mounted sysroot.mount. Feb 9 06:30:33.808500 systemd[1]: Finished verity-setup.service. Feb 9 06:30:33.962163 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 06:30:33.962355 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 06:30:33.962369 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 06:30:33.962458 kernel: audit: type=1130 audit(1707460233.871:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:33.871852 systemd[1]: Reached target initrd-root-fs.target. Feb 9 06:30:33.970908 systemd[1]: Mounting sysusr-usr.mount... Feb 9 06:30:34.010062 systemd[1]: Mounted sysusr-usr.mount. Feb 9 06:30:34.025566 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 06:30:34.018233 systemd[1]: Mounting sysroot-usr.mount... Feb 9 06:30:34.026052 systemd[1]: Mounted sysroot-usr.mount. Feb 9 06:30:34.047079 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 06:30:34.144656 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 06:30:34.144676 kernel: BTRFS info (device sdb6): using free space tree Feb 9 06:30:34.144684 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 06:30:34.144690 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 06:30:34.068921 systemd[1]: Starting initrd-setup-root.service... Feb 9 06:30:34.152637 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 06:30:34.159724 systemd[1]: Finished initrd-setup-root.service. Feb 9 06:30:34.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.188030 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 06:30:34.258570 kernel: audit: type=1130 audit(1707460234.187:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.248649 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 06:30:34.258735 initrd-setup-root-after-ignition[806]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 06:30:34.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.275573 systemd[1]: Reached target ignition-subsequent.target. Feb 9 06:30:34.346593 kernel: audit: type=1130 audit(1707460234.275:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.338845 systemd[1]: Starting initrd-parse-etc.service... Feb 9 06:30:34.359185 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 06:30:34.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.359233 systemd[1]: Finished initrd-parse-etc.service. Feb 9 06:30:34.446596 kernel: audit: type=1130 audit(1707460234.369:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.369590 systemd[1]: Reached target initrd-fs.target. Feb 9 06:30:34.432568 systemd[1]: Reached target initrd.target. Feb 9 06:30:34.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.432624 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 06:30:34.432965 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 06:30:34.453664 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 06:30:34.469931 systemd[1]: Starting initrd-cleanup.service... Feb 9 06:30:34.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.487741 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 06:30:34.502849 systemd[1]: Stopped target timers.target. Feb 9 06:30:34.518932 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 06:30:34.519259 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 06:30:34.535243 systemd[1]: Stopped target initrd.target. Feb 9 06:30:34.549986 systemd[1]: Stopped target basic.target. Feb 9 06:30:34.565980 systemd[1]: Stopped target ignition-subsequent.target. Feb 9 06:30:34.581985 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 9 06:30:34.600990 systemd[1]: Stopped target initrd-root-device.target. Feb 9 06:30:34.616969 systemd[1]: Stopped target paths.target. Feb 9 06:30:34.630979 systemd[1]: Stopped target remote-fs.target. Feb 9 06:30:34.646972 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 06:30:34.663969 systemd[1]: Stopped target slices.target. Feb 9 06:30:34.679972 systemd[1]: Stopped target sockets.target. Feb 9 06:30:34.697956 systemd[1]: Stopped target sysinit.target. Feb 9 06:30:34.713986 systemd[1]: Stopped target local-fs.target. Feb 9 06:30:34.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.729964 systemd[1]: Stopped target local-fs-pre.target. Feb 9 06:30:34.746962 systemd[1]: Stopped target swap.target. Feb 9 06:30:34.761936 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 06:30:34.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.762163 systemd[1]: Closed iscsid.socket. Feb 9 06:30:34.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.776984 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 06:30:34.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.777295 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 06:30:34.793176 systemd[1]: Stopped target cryptsetup.target. Feb 9 06:30:34.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.808863 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 06:30:34.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.814543 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 06:30:34.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.823906 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 06:30:34.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.824233 systemd[1]: Stopped dracut-initqueue.service. Feb 9 06:30:34.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.840106 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 06:30:34.840464 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 06:30:34.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.858055 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 06:30:35.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.858385 systemd[1]: Stopped initrd-setup-root.service. Feb 9 06:30:34.875399 systemd[1]: Stopping iscsiuio.service... Feb 9 06:30:34.889515 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 06:30:34.889937 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 06:30:35.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.905047 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 06:30:35.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.905376 systemd[1]: Stopped systemd-sysctl.service. Feb 9 06:30:35.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.920161 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 06:30:34.920494 systemd[1]: Stopped systemd-modules-load.service. Feb 9 06:30:35.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.940008 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 06:30:35.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:35.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.940315 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 06:30:35.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:35.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:34.957056 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 06:30:34.957380 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 06:30:34.973423 systemd[1]: Stopping systemd-udevd.service... Feb 9 06:30:34.988171 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 06:30:34.988615 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 06:30:34.988663 systemd[1]: Stopped iscsiuio.service. Feb 9 06:30:34.996888 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 06:30:34.996963 systemd[1]: Stopped systemd-udevd.service. Feb 9 06:30:35.293694 iscsid[447]: iscsid shutting down. Feb 9 06:30:35.020872 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 06:30:35.020947 systemd[1]: Closed iscsiuio.socket. Feb 9 06:30:35.037633 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 06:30:35.037739 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 06:30:35.053660 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 06:30:35.053757 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 06:30:35.068636 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 06:30:35.068791 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 06:30:35.087752 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 06:30:35.087883 systemd[1]: Stopped dracut-cmdline.service. Feb 9 06:30:35.103747 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 06:30:35.103879 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 06:30:35.122375 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 06:30:35.135507 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 06:30:35.135672 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 06:30:35.154536 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 06:30:35.154736 systemd[1]: Finished initrd-cleanup.service. Feb 9 06:30:35.170174 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 06:30:35.294336 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 9 06:30:35.170375 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 06:30:35.189540 systemd[1]: Reached target initrd-switch-root.target. Feb 9 06:30:35.204999 systemd[1]: Starting initrd-switch-root.service... Feb 9 06:30:35.240548 systemd[1]: Switching root. Feb 9 06:30:35.294495 systemd-journald[267]: Journal stopped Feb 9 06:30:39.140311 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 06:30:39.140327 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 06:30:39.140335 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 06:30:39.140340 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 06:30:39.140345 kernel: SELinux: policy capability open_perms=1 Feb 9 06:30:39.140350 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 06:30:39.140356 kernel: SELinux: policy capability always_check_network=0 Feb 9 06:30:39.140362 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 06:30:39.140368 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 06:30:39.140373 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 06:30:39.140378 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 06:30:39.140384 systemd[1]: Successfully loaded SELinux policy in 304.921ms. Feb 9 06:30:39.140391 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.711ms. Feb 9 06:30:39.140397 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 06:30:39.140405 systemd[1]: Detected architecture x86-64. Feb 9 06:30:39.140411 systemd[1]: Detected first boot. Feb 9 06:30:39.140416 systemd[1]: Hostname set to . Feb 9 06:30:39.140423 systemd[1]: Initializing machine ID from random generator. Feb 9 06:30:39.140429 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 06:30:39.140435 systemd[1]: Populated /etc with preset unit settings. Feb 9 06:30:39.140441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:30:39.140447 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:30:39.140455 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:30:39.140461 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 9 06:30:39.140466 kernel: audit: type=1334 audit(1707460237.638:60): prog-id=10 op=LOAD Feb 9 06:30:39.140473 kernel: audit: type=1334 audit(1707460237.638:61): prog-id=3 op=UNLOAD Feb 9 06:30:39.140478 kernel: audit: type=1334 audit(1707460237.680:62): prog-id=11 op=LOAD Feb 9 06:30:39.140484 kernel: audit: type=1334 audit(1707460237.722:63): prog-id=12 op=LOAD Feb 9 06:30:39.140489 kernel: audit: type=1334 audit(1707460237.722:64): prog-id=4 op=UNLOAD Feb 9 06:30:39.140495 kernel: audit: type=1334 audit(1707460237.722:65): prog-id=5 op=UNLOAD Feb 9 06:30:39.140500 kernel: audit: type=1334 audit(1707460237.784:66): prog-id=13 op=LOAD Feb 9 06:30:39.140506 kernel: audit: type=1334 audit(1707460237.784:67): prog-id=10 op=UNLOAD Feb 9 06:30:39.140511 kernel: audit: type=1334 audit(1707460237.823:68): prog-id=14 op=LOAD Feb 9 06:30:39.140517 kernel: audit: type=1334 audit(1707460237.842:69): prog-id=15 op=LOAD Feb 9 06:30:39.140523 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 06:30:39.140529 systemd[1]: Stopped iscsid.service. Feb 9 06:30:39.140535 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 06:30:39.140541 systemd[1]: Stopped initrd-switch-root.service. Feb 9 06:30:39.140547 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 06:30:39.140554 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 06:30:39.140561 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 06:30:39.140568 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 06:30:39.140575 systemd[1]: Created slice system-getty.slice. Feb 9 06:30:39.140581 systemd[1]: Created slice system-modprobe.slice. Feb 9 06:30:39.140587 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 06:30:39.140594 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 06:30:39.140600 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 06:30:39.140606 systemd[1]: Created slice user.slice. Feb 9 06:30:39.140612 systemd[1]: Started systemd-ask-password-console.path. Feb 9 06:30:39.140618 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 06:30:39.140625 systemd[1]: Set up automount boot.automount. Feb 9 06:30:39.140632 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 06:30:39.140638 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 06:30:39.140644 systemd[1]: Stopped target initrd-fs.target. Feb 9 06:30:39.140650 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 06:30:39.140656 systemd[1]: Reached target integritysetup.target. Feb 9 06:30:39.140663 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 06:30:39.140669 systemd[1]: Reached target remote-fs.target. Feb 9 06:30:39.140676 systemd[1]: Reached target slices.target. Feb 9 06:30:39.140682 systemd[1]: Reached target swap.target. Feb 9 06:30:39.140689 systemd[1]: Reached target torcx.target. Feb 9 06:30:39.140695 systemd[1]: Reached target veritysetup.target. Feb 9 06:30:39.140701 systemd[1]: Listening on systemd-coredump.socket. Feb 9 06:30:39.140708 systemd[1]: Listening on systemd-initctl.socket. Feb 9 06:30:39.140715 systemd[1]: Listening on systemd-networkd.socket. Feb 9 06:30:39.140722 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 06:30:39.140728 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 06:30:39.140734 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 06:30:39.140741 systemd[1]: Mounting dev-hugepages.mount... Feb 9 06:30:39.140747 systemd[1]: Mounting dev-mqueue.mount... Feb 9 06:30:39.140753 systemd[1]: Mounting media.mount... Feb 9 06:30:39.140760 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 06:30:39.140767 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 06:30:39.140774 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 06:30:39.140780 systemd[1]: Mounting tmp.mount... Feb 9 06:30:39.140786 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 06:30:39.140793 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 06:30:39.140799 systemd[1]: Starting kmod-static-nodes.service... Feb 9 06:30:39.140805 systemd[1]: Starting modprobe@configfs.service... Feb 9 06:30:39.140812 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 06:30:39.140818 systemd[1]: Starting modprobe@drm.service... Feb 9 06:30:39.140825 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 06:30:39.140832 systemd[1]: Starting modprobe@fuse.service... Feb 9 06:30:39.140838 kernel: fuse: init (API version 7.34) Feb 9 06:30:39.140844 systemd[1]: Starting modprobe@loop.service... Feb 9 06:30:39.140850 kernel: loop: module loaded Feb 9 06:30:39.140856 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 06:30:39.140863 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 06:30:39.140870 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 06:30:39.140876 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 06:30:39.140883 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 06:30:39.140890 systemd[1]: Stopped systemd-journald.service. Feb 9 06:30:39.140896 systemd[1]: Starting systemd-journald.service... Feb 9 06:30:39.140903 systemd[1]: Starting systemd-modules-load.service... Feb 9 06:30:39.140911 systemd-journald[947]: Journal started Feb 9 06:30:39.140935 systemd-journald[947]: Runtime Journal (/run/log/journal/ed52503f8966451ea6fe7235091f62cd) is 8.0M, max 639.3M, 631.3M free. Feb 9 06:30:35.777000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 06:30:36.036000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 06:30:36.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 06:30:36.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 06:30:36.038000 audit: BPF prog-id=8 op=LOAD Feb 9 06:30:36.038000 audit: BPF prog-id=8 op=UNLOAD Feb 9 06:30:36.039000 audit: BPF prog-id=9 op=LOAD Feb 9 06:30:36.039000 audit: BPF prog-id=9 op=UNLOAD Feb 9 06:30:36.107000 audit[838]: AVC avc: denied { associate } for pid=838 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 06:30:36.107000 audit[838]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=821 pid=838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:30:36.107000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 06:30:36.132000 audit[838]: AVC avc: denied { associate } for pid=838 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 06:30:36.132000 audit[838]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=821 pid=838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:30:36.132000 audit: CWD cwd="/" Feb 9 06:30:36.132000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:36.132000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:36.132000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 06:30:37.638000 audit: BPF prog-id=10 op=LOAD Feb 9 06:30:37.638000 audit: BPF prog-id=3 op=UNLOAD Feb 9 06:30:37.680000 audit: BPF prog-id=11 op=LOAD Feb 9 06:30:37.722000 audit: BPF prog-id=12 op=LOAD Feb 9 06:30:37.722000 audit: BPF prog-id=4 op=UNLOAD Feb 9 06:30:37.722000 audit: BPF prog-id=5 op=UNLOAD Feb 9 06:30:37.784000 audit: BPF prog-id=13 op=LOAD Feb 9 06:30:37.784000 audit: BPF prog-id=10 op=UNLOAD Feb 9 06:30:37.823000 audit: BPF prog-id=14 op=LOAD Feb 9 06:30:37.842000 audit: BPF prog-id=15 op=LOAD Feb 9 06:30:37.842000 audit: BPF prog-id=11 op=UNLOAD Feb 9 06:30:37.842000 audit: BPF prog-id=12 op=UNLOAD Feb 9 06:30:37.861000 audit: BPF prog-id=16 op=LOAD Feb 9 06:30:37.861000 audit: BPF prog-id=13 op=UNLOAD Feb 9 06:30:37.861000 audit: BPF prog-id=17 op=LOAD Feb 9 06:30:37.861000 audit: BPF prog-id=18 op=LOAD Feb 9 06:30:37.861000 audit: BPF prog-id=14 op=UNLOAD Feb 9 06:30:37.861000 audit: BPF prog-id=15 op=UNLOAD Feb 9 06:30:37.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:37.900000 audit: BPF prog-id=16 op=UNLOAD Feb 9 06:30:37.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:37.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:37.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.112000 audit: BPF prog-id=19 op=LOAD Feb 9 06:30:39.113000 audit: BPF prog-id=20 op=LOAD Feb 9 06:30:39.113000 audit: BPF prog-id=21 op=LOAD Feb 9 06:30:39.113000 audit: BPF prog-id=17 op=UNLOAD Feb 9 06:30:39.113000 audit: BPF prog-id=18 op=UNLOAD Feb 9 06:30:39.138000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 06:30:39.138000 audit[947]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff92f51ed0 a2=4000 a3=7fff92f51f6c items=0 ppid=1 pid=947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:30:39.138000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 06:30:36.105564 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:30:37.637184 systemd[1]: Queued start job for default target multi-user.target. Feb 9 06:30:36.106029 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 06:30:37.637191 systemd[1]: Unnecessary job was removed for dev-sdb6.device. Feb 9 06:30:36.106042 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 06:30:37.862613 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 06:30:36.106062 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 06:30:36.106069 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 06:30:36.106089 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 06:30:36.106098 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 06:30:36.106228 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 06:30:36.106254 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 06:30:36.106262 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 06:30:36.106776 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 06:30:36.106800 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 06:30:36.106813 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 06:30:36.106822 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 06:30:36.106833 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 06:30:36.106842 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 06:30:37.297154 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:30:37.297300 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:30:37.297363 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:30:37.297491 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:30:37.297521 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 06:30:37.297557 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T06:30:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 06:30:39.171546 systemd[1]: Starting systemd-network-generator.service... Feb 9 06:30:39.194517 systemd[1]: Starting systemd-remount-fs.service... Feb 9 06:30:39.215386 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 06:30:39.247907 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 06:30:39.247930 systemd[1]: Stopped verity-setup.service. Feb 9 06:30:39.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.282375 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 06:30:39.297515 systemd[1]: Started systemd-journald.service. Feb 9 06:30:39.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.304843 systemd[1]: Mounted dev-hugepages.mount. Feb 9 06:30:39.312669 systemd[1]: Mounted dev-mqueue.mount. Feb 9 06:30:39.319585 systemd[1]: Mounted media.mount. Feb 9 06:30:39.326593 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 06:30:39.335603 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 06:30:39.344553 systemd[1]: Mounted tmp.mount. Feb 9 06:30:39.351658 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 06:30:39.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.360683 systemd[1]: Finished kmod-static-nodes.service. Feb 9 06:30:39.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.369730 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 06:30:39.369838 systemd[1]: Finished modprobe@configfs.service. Feb 9 06:30:39.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.378772 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 06:30:39.378908 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 06:30:39.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.387905 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 06:30:39.388098 systemd[1]: Finished modprobe@drm.service. Feb 9 06:30:39.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.397153 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 06:30:39.397658 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 06:30:39.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.407175 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 06:30:39.407498 systemd[1]: Finished modprobe@fuse.service. Feb 9 06:30:39.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.416143 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 06:30:39.416464 systemd[1]: Finished modprobe@loop.service. Feb 9 06:30:39.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.425153 systemd[1]: Finished systemd-modules-load.service. Feb 9 06:30:39.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.434238 systemd[1]: Finished systemd-network-generator.service. Feb 9 06:30:39.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.443137 systemd[1]: Finished systemd-remount-fs.service. Feb 9 06:30:39.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.452116 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 06:30:39.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.461699 systemd[1]: Reached target network-pre.target. Feb 9 06:30:39.473187 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 06:30:39.482028 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 06:30:39.489530 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 06:30:39.490563 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 06:30:39.497959 systemd[1]: Starting systemd-journal-flush.service... Feb 9 06:30:39.501817 systemd-journald[947]: Time spent on flushing to /var/log/journal/ed52503f8966451ea6fe7235091f62cd is 11.367ms for 1305 entries. Feb 9 06:30:39.501817 systemd-journald[947]: System Journal (/var/log/journal/ed52503f8966451ea6fe7235091f62cd) is 8.0M, max 195.6M, 187.6M free. Feb 9 06:30:39.538707 systemd-journald[947]: Received client request to flush runtime journal. Feb 9 06:30:39.515444 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 06:30:39.516015 systemd[1]: Starting systemd-random-seed.service... Feb 9 06:30:39.525434 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 06:30:39.525951 systemd[1]: Starting systemd-sysctl.service... Feb 9 06:30:39.534259 systemd[1]: Starting systemd-sysusers.service... Feb 9 06:30:39.542029 systemd[1]: Starting systemd-udev-settle.service... Feb 9 06:30:39.549434 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 06:30:39.557530 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 06:30:39.565525 systemd[1]: Finished systemd-journal-flush.service. Feb 9 06:30:39.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.573548 systemd[1]: Finished systemd-random-seed.service. Feb 9 06:30:39.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.581549 systemd[1]: Finished systemd-sysctl.service. Feb 9 06:30:39.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.590539 systemd[1]: Finished systemd-sysusers.service. Feb 9 06:30:39.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.599509 systemd[1]: Reached target first-boot-complete.target. Feb 9 06:30:39.607676 udevadm[963]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 06:30:39.794232 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 06:30:39.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.802000 audit: BPF prog-id=22 op=LOAD Feb 9 06:30:39.802000 audit: BPF prog-id=23 op=LOAD Feb 9 06:30:39.802000 audit: BPF prog-id=6 op=UNLOAD Feb 9 06:30:39.802000 audit: BPF prog-id=7 op=UNLOAD Feb 9 06:30:39.803616 systemd[1]: Starting systemd-udevd.service... Feb 9 06:30:39.815439 systemd-udevd[964]: Using default interface naming scheme 'v252'. Feb 9 06:30:39.832855 systemd[1]: Started systemd-udevd.service. Feb 9 06:30:39.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.843394 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 06:30:39.843000 audit: BPF prog-id=24 op=LOAD Feb 9 06:30:39.844567 systemd[1]: Starting systemd-networkd.service... Feb 9 06:30:39.862000 audit: BPF prog-id=25 op=LOAD Feb 9 06:30:39.876019 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 06:30:39.876101 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 06:30:39.876120 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 06:30:39.875000 audit: BPF prog-id=26 op=LOAD Feb 9 06:30:39.892000 audit: BPF prog-id=27 op=LOAD Feb 9 06:30:39.874000 audit[1038]: AVC avc: denied { confidentiality } for pid=1038 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 06:30:39.893821 systemd[1]: Starting systemd-userdbd.service... Feb 9 06:30:39.913347 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 06:30:39.913410 kernel: IPMI message handler: version 39.2 Feb 9 06:30:39.927340 kernel: ACPI: button: Power Button [PWRF] Feb 9 06:30:39.943737 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 06:30:39.958558 systemd[1]: Started systemd-userdbd.service. Feb 9 06:30:39.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:39.987001 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 06:30:39.987162 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 06:30:39.874000 audit[1038]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e6acedf590 a1=4d8bc a2=7f2a82c1abc5 a3=5 items=42 ppid=964 pid=1038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:30:39.874000 audit: CWD cwd="/" Feb 9 06:30:39.874000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=1 name=(null) inode=13547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=2 name=(null) inode=13547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=3 name=(null) inode=13548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=4 name=(null) inode=13547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=5 name=(null) inode=13549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=6 name=(null) inode=13547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=7 name=(null) inode=13550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=8 name=(null) inode=13550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=9 name=(null) inode=13551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=10 name=(null) inode=13550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=11 name=(null) inode=13552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=12 name=(null) inode=13550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=13 name=(null) inode=13553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=14 name=(null) inode=13550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=15 name=(null) inode=13554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=16 name=(null) inode=13550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=17 name=(null) inode=13555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=18 name=(null) inode=13547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=19 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=20 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=21 name=(null) inode=13557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=22 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=23 name=(null) inode=13558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=24 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=25 name=(null) inode=13559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=26 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=27 name=(null) inode=13560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=28 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=29 name=(null) inode=13561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=30 name=(null) inode=13547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=31 name=(null) inode=13562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=32 name=(null) inode=13562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=33 name=(null) inode=13563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=34 name=(null) inode=13562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.988349 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 06:30:39.988440 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 06:30:39.988529 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 06:30:39.874000 audit: PATH item=35 name=(null) inode=13564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=36 name=(null) inode=13562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=37 name=(null) inode=13565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=38 name=(null) inode=13562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=39 name=(null) inode=13566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=40 name=(null) inode=13562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PATH item=41 name=(null) inode=13567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:30:39.874000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 06:30:40.057337 kernel: ipmi device interface Feb 9 06:30:40.057375 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 06:30:40.102335 kernel: ipmi_si: IPMI System Interface driver Feb 9 06:30:40.102384 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 06:30:40.102567 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 06:30:40.119028 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 06:30:40.150086 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 06:30:40.150186 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 06:30:40.210272 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 06:30:40.210405 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 06:30:40.210488 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 06:30:40.245828 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 06:30:40.300065 kernel: intel_rapl_common: Found RAPL domain package Feb 9 06:30:40.300120 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 06:30:40.300254 kernel: intel_rapl_common: Found RAPL domain core Feb 9 06:30:40.304743 systemd-networkd[1020]: bond0: netdev ready Feb 9 06:30:40.307072 systemd-networkd[1020]: lo: Link UP Feb 9 06:30:40.307075 systemd-networkd[1020]: lo: Gained carrier Feb 9 06:30:40.307619 systemd-networkd[1020]: Enumeration completed Feb 9 06:30:40.307674 systemd[1]: Started systemd-networkd.service. Feb 9 06:30:40.307892 systemd-networkd[1020]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 06:30:40.314162 systemd-networkd[1020]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d7:77:67.network. Feb 9 06:30:40.337798 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 06:30:40.337879 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 06:30:40.337898 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 06:30:40.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.380068 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 06:30:40.413366 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 06:30:40.430330 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 06:30:40.432568 systemd[1]: Finished systemd-udev-settle.service. Feb 9 06:30:40.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.441052 systemd[1]: Starting lvm2-activation-early.service... Feb 9 06:30:40.456109 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 06:30:40.484728 systemd[1]: Finished lvm2-activation-early.service. Feb 9 06:30:40.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.494425 systemd[1]: Reached target cryptsetup.target. Feb 9 06:30:40.504029 systemd[1]: Starting lvm2-activation.service... Feb 9 06:30:40.505851 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 06:30:40.538740 systemd[1]: Finished lvm2-activation.service. Feb 9 06:30:40.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.547410 systemd[1]: Reached target local-fs-pre.target. Feb 9 06:30:40.556376 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 06:30:40.556389 systemd[1]: Reached target local-fs.target. Feb 9 06:30:40.565366 systemd[1]: Reached target machines.target. Feb 9 06:30:40.575021 systemd[1]: Starting ldconfig.service... Feb 9 06:30:40.582767 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 06:30:40.582789 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:30:40.583447 systemd[1]: Starting systemd-boot-update.service... Feb 9 06:30:40.590898 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 06:30:40.602174 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 06:30:40.602291 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 06:30:40.602333 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 06:30:40.602974 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 06:30:40.603208 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Feb 9 06:30:40.603930 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 06:30:40.615862 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 06:30:40.616295 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 06:30:40.618361 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 06:30:40.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.622833 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 06:30:40.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.623445 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 06:30:40.628859 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 06:30:40.680231 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) Feb 9 06:30:40.680231 systemd-fsck[1081]: /dev/sdb1: 789 files, 115332/258078 clusters Feb 9 06:30:40.680967 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 06:30:40.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.693554 systemd[1]: Mounting boot.mount... Feb 9 06:30:40.714789 systemd[1]: Mounted boot.mount. Feb 9 06:30:40.732447 systemd[1]: Finished systemd-boot-update.service. Feb 9 06:30:40.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.765788 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 06:30:40.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:30:40.776142 systemd[1]: Starting audit-rules.service... Feb 9 06:30:40.783942 systemd[1]: Starting clean-ca-certificates.service... Feb 9 06:30:40.794181 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 06:30:40.796000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 06:30:40.796000 audit[1104]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff81fd8c10 a2=420 a3=0 items=0 ppid=1087 pid=1104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:30:40.796000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 06:30:40.797341 augenrules[1104]: No rules Feb 9 06:30:40.804427 systemd[1]: Starting systemd-resolved.service... Feb 9 06:30:40.813285 systemd[1]: Starting systemd-timesyncd.service... Feb 9 06:30:40.820904 systemd[1]: Starting systemd-update-utmp.service... Feb 9 06:30:40.827707 systemd[1]: Finished audit-rules.service. Feb 9 06:30:40.839769 systemd[1]: Finished clean-ca-certificates.service. Feb 9 06:30:40.850370 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 06:30:40.867556 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 06:30:40.874344 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 06:30:40.874868 systemd-networkd[1020]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d7:77:66.network. Feb 9 06:30:40.886036 systemd[1]: Finished systemd-update-utmp.service. Feb 9 06:30:40.886619 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 06:30:40.895494 systemd[1]: Finished ldconfig.service. Feb 9 06:30:40.903094 systemd[1]: Starting systemd-update-done.service... Feb 9 06:30:40.910367 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 06:30:40.910537 systemd[1]: Finished systemd-update-done.service. Feb 9 06:30:40.915000 systemd-resolved[1109]: Positive Trust Anchors: Feb 9 06:30:40.915008 systemd-resolved[1109]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 06:30:40.915028 systemd-resolved[1109]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 06:30:40.919478 systemd[1]: Started systemd-timesyncd.service. Feb 9 06:30:40.928442 systemd[1]: Reached target time-set.target. Feb 9 06:30:40.933513 systemd-resolved[1109]: Using system hostname 'ci-3510.3.2-a-ff5cd92b7e'. Feb 9 06:30:40.951382 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:30:41.077473 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:30:41.111456 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 06:30:41.136336 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 06:30:41.158372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 06:30:41.159068 systemd-networkd[1020]: bond0: Link UP Feb 9 06:30:41.159402 systemd-networkd[1020]: enp2s0f1np1: Link UP Feb 9 06:30:41.159651 systemd-networkd[1020]: enp2s0f0np0: Link UP Feb 9 06:30:41.159852 systemd-networkd[1020]: enp2s0f1np1: Gained carrier Feb 9 06:30:41.160252 systemd[1]: Started systemd-resolved.service. Feb 9 06:30:41.161518 systemd-networkd[1020]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d7:77:66.network. Feb 9 06:30:41.177495 systemd[1]: Reached target network.target. Feb 9 06:30:41.183368 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 06:30:41.183416 kernel: bond0: active interface up! Feb 9 06:30:41.215430 systemd[1]: Reached target nss-lookup.target. Feb 9 06:30:41.218401 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 06:30:41.225538 systemd[1]: Reached target sysinit.target. Feb 9 06:30:41.233472 systemd[1]: Started motdgen.path. Feb 9 06:30:41.240436 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 06:30:41.250486 systemd[1]: Started logrotate.timer. Feb 9 06:30:41.257461 systemd[1]: Started mdadm.timer. Feb 9 06:30:41.264405 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 06:30:41.272404 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 06:30:41.272424 systemd[1]: Reached target paths.target. Feb 9 06:30:41.279404 systemd[1]: Reached target timers.target. Feb 9 06:30:41.286522 systemd[1]: Listening on dbus.socket. Feb 9 06:30:41.293997 systemd[1]: Starting docker.socket... Feb 9 06:30:41.301721 systemd[1]: Listening on sshd.socket. Feb 9 06:30:41.308491 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:30:41.308703 systemd[1]: Listening on docker.socket. Feb 9 06:30:41.309448 systemd-networkd[1020]: bond0: Gained carrier Feb 9 06:30:41.309563 systemd-networkd[1020]: enp2s0f0np0: Gained carrier Feb 9 06:30:41.309569 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.315626 systemd[1]: Reached target sockets.target. Feb 9 06:30:41.330981 systemd[1]: Reached target basic.target. Feb 9 06:30:41.343329 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 06:30:41.343376 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 06:30:41.344537 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.344566 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.344773 systemd-networkd[1020]: enp2s0f1np1: Link DOWN Feb 9 06:30:41.344776 systemd-networkd[1020]: enp2s0f1np1: Lost carrier Feb 9 06:30:41.366497 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.366525 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.366626 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.367452 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 06:30:41.367467 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 06:30:41.367927 systemd[1]: Starting containerd.service... Feb 9 06:30:41.374854 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 06:30:41.383849 systemd[1]: Starting coreos-metadata.service... Feb 9 06:30:41.390867 systemd[1]: Starting dbus.service... Feb 9 06:30:41.397055 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 06:30:41.402849 jq[1123]: false Feb 9 06:30:41.404048 systemd[1]: Starting extend-filesystems.service... Feb 9 06:30:41.410379 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 06:30:41.411011 systemd[1]: Starting motdgen.service... Feb 9 06:30:41.411465 dbus-daemon[1122]: [system] SELinux support is enabled Feb 9 06:30:41.412438 extend-filesystems[1126]: Found sda Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb1 Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb2 Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb3 Feb 9 06:30:41.431121 extend-filesystems[1126]: Found usr Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb4 Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb6 Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb7 Feb 9 06:30:41.431121 extend-filesystems[1126]: Found sdb9 Feb 9 06:30:41.431121 extend-filesystems[1126]: Checking size of /dev/sdb9 Feb 9 06:30:41.431121 extend-filesystems[1126]: Resized partition /dev/sdb9 Feb 9 06:30:41.619406 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 06:30:41.619438 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 06:30:41.619532 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 06:30:41.619544 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 06:30:41.619555 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 06:30:41.418186 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 06:30:41.619658 coreos-metadata[1119]: Feb 09 06:30:41.444 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:30:41.619763 extend-filesystems[1141]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 06:30:41.614408 dbus-daemon[1122]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 06:30:41.628437 coreos-metadata[1118]: Feb 09 06:30:41.444 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:30:41.443120 systemd[1]: Starting sshd-keygen.service... Feb 9 06:30:41.463709 systemd[1]: Starting systemd-logind.service... Feb 9 06:30:41.480367 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:30:41.628841 update_engine[1154]: I0209 06:30:41.538727 1154 main.cc:92] Flatcar Update Engine starting Feb 9 06:30:41.628841 update_engine[1154]: I0209 06:30:41.541893 1154 update_check_scheduler.cc:74] Next update check in 8m31s Feb 9 06:30:41.480949 systemd[1]: Starting tcsd.service... Feb 9 06:30:41.629024 jq[1155]: true Feb 9 06:30:41.487643 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 06:30:41.487958 systemd[1]: Starting update-engine.service... Feb 9 06:30:41.629211 jq[1157]: false Feb 9 06:30:41.490205 systemd-logind[1152]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 06:30:41.629387 env[1158]: time="2024-02-09T06:30:41.623034974Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 06:30:41.490215 systemd-logind[1152]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 06:30:41.490225 systemd-logind[1152]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 06:30:41.490323 systemd-logind[1152]: New seat seat0. Feb 9 06:30:41.512692 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 06:30:41.534138 systemd[1]: Started dbus.service. Feb 9 06:30:41.535244 systemd-networkd[1020]: enp2s0f1np1: Link UP Feb 9 06:30:41.535374 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.535443 systemd-networkd[1020]: enp2s0f1np1: Gained carrier Feb 9 06:30:41.535463 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.543481 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.543510 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.543600 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:41.567018 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 06:30:41.567104 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 06:30:41.567248 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 06:30:41.567327 systemd[1]: Finished motdgen.service. Feb 9 06:30:41.594494 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 06:30:41.594570 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 06:30:41.614894 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 9 06:30:41.614976 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 9 06:30:41.619130 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 06:30:41.619215 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 06:30:41.620059 systemd[1]: Started update-engine.service. Feb 9 06:30:41.631339 env[1158]: time="2024-02-09T06:30:41.631317767Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 06:30:41.631386 env[1158]: time="2024-02-09T06:30:41.631377847Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:30:41.631960 env[1158]: time="2024-02-09T06:30:41.631946949Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:30:41.631980 env[1158]: time="2024-02-09T06:30:41.631961434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632067 env[1158]: time="2024-02-09T06:30:41.632056961Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632086 env[1158]: time="2024-02-09T06:30:41.632067130Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632086 env[1158]: time="2024-02-09T06:30:41.632074405Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 06:30:41.632086 env[1158]: time="2024-02-09T06:30:41.632080029Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632146 env[1158]: time="2024-02-09T06:30:41.632123701Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632248 env[1158]: time="2024-02-09T06:30:41.632240208Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632314 env[1158]: time="2024-02-09T06:30:41.632301476Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:30:41.632314 env[1158]: time="2024-02-09T06:30:41.632310953Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 06:30:41.632356 env[1158]: time="2024-02-09T06:30:41.632341067Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 06:30:41.632356 env[1158]: time="2024-02-09T06:30:41.632350998Z" level=info msg="metadata content store policy set" policy=shared Feb 9 06:30:41.639415 systemd[1]: Started systemd-logind.service. Feb 9 06:30:41.642462 env[1158]: time="2024-02-09T06:30:41.642448593Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 06:30:41.642504 env[1158]: time="2024-02-09T06:30:41.642465945Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 06:30:41.642504 env[1158]: time="2024-02-09T06:30:41.642478548Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 06:30:41.642565 env[1158]: time="2024-02-09T06:30:41.642501289Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642565 env[1158]: time="2024-02-09T06:30:41.642516239Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642565 env[1158]: time="2024-02-09T06:30:41.642530018Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642565 env[1158]: time="2024-02-09T06:30:41.642541430Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642565 env[1158]: time="2024-02-09T06:30:41.642554765Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642695 env[1158]: time="2024-02-09T06:30:41.642566781Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642695 env[1158]: time="2024-02-09T06:30:41.642578997Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642695 env[1158]: time="2024-02-09T06:30:41.642591742Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642695 env[1158]: time="2024-02-09T06:30:41.642602875Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 06:30:41.642695 env[1158]: time="2024-02-09T06:30:41.642667879Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 06:30:41.642823 env[1158]: time="2024-02-09T06:30:41.642728577Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 06:30:41.642906 env[1158]: time="2024-02-09T06:30:41.642895744Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 06:30:41.642939 env[1158]: time="2024-02-09T06:30:41.642917698Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.642939 env[1158]: time="2024-02-09T06:30:41.642931587Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 06:30:41.642990 env[1158]: time="2024-02-09T06:30:41.642966695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.642990 env[1158]: time="2024-02-09T06:30:41.642979947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643042 env[1158]: time="2024-02-09T06:30:41.642991089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643042 env[1158]: time="2024-02-09T06:30:41.643001774Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643042 env[1158]: time="2024-02-09T06:30:41.643013386Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643042 env[1158]: time="2024-02-09T06:30:41.643027001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643042 env[1158]: time="2024-02-09T06:30:41.643039107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643165 env[1158]: time="2024-02-09T06:30:41.643049589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643265 env[1158]: time="2024-02-09T06:30:41.643251898Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 06:30:41.643444 env[1158]: time="2024-02-09T06:30:41.643358087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643478 env[1158]: time="2024-02-09T06:30:41.643448981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643478 env[1158]: time="2024-02-09T06:30:41.643459424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643478 env[1158]: time="2024-02-09T06:30:41.643467201Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 06:30:41.643605 env[1158]: time="2024-02-09T06:30:41.643475579Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 06:30:41.643605 env[1158]: time="2024-02-09T06:30:41.643484349Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 06:30:41.643605 env[1158]: time="2024-02-09T06:30:41.643494366Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 06:30:41.643605 env[1158]: time="2024-02-09T06:30:41.643518262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 06:30:41.643669 env[1158]: time="2024-02-09T06:30:41.643626020Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 06:30:41.643669 env[1158]: time="2024-02-09T06:30:41.643657041Z" level=info msg="Connect containerd service" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.643675921Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.643943265Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644060501Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644043745Z" level=info msg="Start subscribing containerd event" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644085136Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644097571Z" level=info msg="Start recovering state" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644111642Z" level=info msg="containerd successfully booted in 0.021425s" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644135704Z" level=info msg="Start event monitor" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644151629Z" level=info msg="Start snapshots syncer" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644157466Z" level=info msg="Start cni network conf syncer for default" Feb 9 06:30:41.645372 env[1158]: time="2024-02-09T06:30:41.644161743Z" level=info msg="Start streaming server" Feb 9 06:30:41.647412 systemd[1]: Started containerd.service. Feb 9 06:30:41.655964 systemd[1]: Started locksmithd.service. Feb 9 06:30:41.662424 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 06:30:41.662505 systemd[1]: Reached target system-config.target. Feb 9 06:30:41.670398 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 06:30:41.670463 systemd[1]: Reached target user-config.target. Feb 9 06:30:41.713833 locksmithd[1181]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 06:30:41.760257 sshd_keygen[1151]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 06:30:41.771756 systemd[1]: Finished sshd-keygen.service. Feb 9 06:30:41.780170 systemd[1]: Starting issuegen.service... Feb 9 06:30:41.787527 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 06:30:41.787600 systemd[1]: Finished issuegen.service. Feb 9 06:30:41.796060 systemd[1]: Starting systemd-user-sessions.service... Feb 9 06:30:41.805534 systemd[1]: Finished systemd-user-sessions.service. Feb 9 06:30:41.815002 systemd[1]: Started getty@tty1.service. Feb 9 06:30:41.822976 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 06:30:41.832452 systemd[1]: Reached target getty.target. Feb 9 06:30:41.930375 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 06:30:41.956340 extend-filesystems[1141]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 06:30:41.956340 extend-filesystems[1141]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 06:30:41.956340 extend-filesystems[1141]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 06:30:41.995407 extend-filesystems[1126]: Resized filesystem in /dev/sdb9 Feb 9 06:30:41.956655 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 06:30:41.956748 systemd[1]: Finished extend-filesystems.service. Feb 9 06:30:42.777681 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:42.905368 systemd-networkd[1020]: bond0: Gained IPv6LL Feb 9 06:30:42.905638 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:42.906711 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 06:30:42.916630 systemd[1]: Reached target network-online.target. Feb 9 06:30:43.945556 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 06:30:46.844283 login[1201]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 06:30:46.850970 login[1200]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 06:30:46.851011 systemd[1]: Created slice user-500.slice. Feb 9 06:30:46.851577 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 06:30:46.852617 systemd-logind[1152]: New session 1 of user core. Feb 9 06:30:46.854601 systemd-logind[1152]: New session 2 of user core. Feb 9 06:30:46.856500 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 06:30:46.857155 systemd[1]: Starting user@500.service... Feb 9 06:30:46.858892 (systemd)[1207]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:30:46.924182 systemd[1207]: Queued start job for default target default.target. Feb 9 06:30:46.924408 systemd[1207]: Reached target paths.target. Feb 9 06:30:46.924420 systemd[1207]: Reached target sockets.target. Feb 9 06:30:46.924427 systemd[1207]: Reached target timers.target. Feb 9 06:30:46.924434 systemd[1207]: Reached target basic.target. Feb 9 06:30:46.924453 systemd[1207]: Reached target default.target. Feb 9 06:30:46.924466 systemd[1207]: Startup finished in 62ms. Feb 9 06:30:46.924512 systemd[1]: Started user@500.service. Feb 9 06:30:46.925060 systemd[1]: Started session-1.scope. Feb 9 06:30:46.925447 systemd[1]: Started session-2.scope. Feb 9 06:30:47.578610 coreos-metadata[1119]: Feb 09 06:30:47.578 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 06:30:47.579374 coreos-metadata[1118]: Feb 09 06:30:47.578 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 06:30:48.579013 coreos-metadata[1118]: Feb 09 06:30:48.578 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 06:30:48.579263 coreos-metadata[1119]: Feb 09 06:30:48.578 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 06:30:49.247605 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 06:30:49.247754 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 06:30:49.664082 coreos-metadata[1118]: Feb 09 06:30:49.663 INFO Fetch successful Feb 9 06:30:49.664865 coreos-metadata[1119]: Feb 09 06:30:49.663 INFO Fetch successful Feb 9 06:30:49.689151 systemd[1]: Finished coreos-metadata.service. Feb 9 06:30:49.690061 systemd[1]: Starting etcd-member.service... Feb 9 06:30:49.690394 unknown[1118]: wrote ssh authorized keys file for user: core Feb 9 06:30:49.690805 systemd[1]: Started packet-phone-home.service. Feb 9 06:30:49.696817 curl[1230]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 06:30:49.696924 curl[1230]: Dload Upload Total Spent Left Speed Feb 9 06:30:49.706233 update-ssh-keys[1231]: Updated "/home/core/.ssh/authorized_keys" Feb 9 06:30:49.706621 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 06:30:49.708273 systemd[1]: Starting docker.service... Feb 9 06:30:49.725158 env[1246]: time="2024-02-09T06:30:49.725100020Z" level=info msg="Starting up" Feb 9 06:30:49.725724 env[1246]: time="2024-02-09T06:30:49.725683060Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 06:30:49.725724 env[1246]: time="2024-02-09T06:30:49.725691888Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 06:30:49.725724 env[1246]: time="2024-02-09T06:30:49.725706050Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 06:30:49.725724 env[1246]: time="2024-02-09T06:30:49.725712370Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 06:30:49.726474 env[1246]: time="2024-02-09T06:30:49.726465331Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 06:30:49.726474 env[1246]: time="2024-02-09T06:30:49.726472772Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 06:30:49.726522 env[1246]: time="2024-02-09T06:30:49.726479853Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 06:30:49.726522 env[1246]: time="2024-02-09T06:30:49.726484778Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 06:30:49.740380 env[1246]: time="2024-02-09T06:30:49.740336213Z" level=info msg="Loading containers: start." Feb 9 06:30:49.820335 kernel: Initializing XFRM netlink socket Feb 9 06:30:49.863892 env[1246]: time="2024-02-09T06:30:49.863846191Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 06:30:49.864764 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:49.864826 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:49.867788 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:49.867899 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:49.886734 curl[1230]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 06:30:49.887297 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 06:30:49.902195 systemd-networkd[1020]: docker0: Link UP Feb 9 06:30:49.902378 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 06:30:49.907965 env[1246]: time="2024-02-09T06:30:49.907922836Z" level=info msg="Loading containers: done." Feb 9 06:30:49.934350 env[1246]: time="2024-02-09T06:30:49.934200480Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 06:30:49.934565 env[1246]: time="2024-02-09T06:30:49.934489507Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 06:30:49.934669 env[1246]: time="2024-02-09T06:30:49.934640571Z" level=info msg="Daemon has completed initialization" Feb 9 06:30:49.955504 systemd[1]: Started docker.service. Feb 9 06:30:49.971523 env[1246]: time="2024-02-09T06:30:49.971409626Z" level=info msg="API listen on /run/docker.sock" Feb 9 06:30:49.973586 etcd-wrapper[1235]: Error response from daemon: No such container: etcd-member Feb 9 06:30:50.021199 etcd-wrapper[1371]: Error: No such container: etcd-member Feb 9 06:30:50.075471 etcd-wrapper[1395]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 06:30:51.375474 etcd-wrapper[1395]: v3.5.0: Pulling from coreos/etcd Feb 9 06:30:51.670811 etcd-wrapper[1395]: 1813d21adc01: Pulling fs layer Feb 9 06:30:51.670811 etcd-wrapper[1395]: 6e96907ab677: Pulling fs layer Feb 9 06:30:51.670811 etcd-wrapper[1395]: 444ed0ea8673: Pulling fs layer Feb 9 06:30:51.670811 etcd-wrapper[1395]: 0fd2df5633f0: Pulling fs layer Feb 9 06:30:51.671563 etcd-wrapper[1395]: 8cc22b9456bb: Pulling fs layer Feb 9 06:30:51.671563 etcd-wrapper[1395]: 7ac70aecd290: Pulling fs layer Feb 9 06:30:51.671563 etcd-wrapper[1395]: 4b376c64dfe4: Pulling fs layer Feb 9 06:30:51.671563 etcd-wrapper[1395]: 0fd2df5633f0: Waiting Feb 9 06:30:51.671563 etcd-wrapper[1395]: 8cc22b9456bb: Waiting Feb 9 06:30:51.861419 systemd[1]: Created slice system-sshd.slice. Feb 9 06:30:51.861957 systemd[1]: Started sshd@0-139.178.91.169:22-147.75.109.163:43596.service. Feb 9 06:30:51.912439 sshd[1406]: Accepted publickey for core from 147.75.109.163 port 43596 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:30:51.913195 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:30:51.915621 systemd-logind[1152]: New session 3 of user core. Feb 9 06:30:51.916210 systemd[1]: Started session-3.scope. Feb 9 06:30:51.963900 systemd[1]: Started sshd@1-139.178.91.169:22-147.75.109.163:43600.service. Feb 9 06:30:52.001917 sshd[1411]: Accepted publickey for core from 147.75.109.163 port 43600 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:30:52.002931 sshd[1411]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:30:52.005608 systemd-logind[1152]: New session 4 of user core. Feb 9 06:30:52.006263 systemd[1]: Started session-4.scope. Feb 9 06:30:52.036998 etcd-wrapper[1395]: 444ed0ea8673: Verifying Checksum Feb 9 06:30:52.036998 etcd-wrapper[1395]: 444ed0ea8673: Download complete Feb 9 06:30:52.038683 etcd-wrapper[1395]: 6e96907ab677: Verifying Checksum Feb 9 06:30:52.038683 etcd-wrapper[1395]: 6e96907ab677: Download complete Feb 9 06:30:52.054740 sshd[1411]: pam_unix(sshd:session): session closed for user core Feb 9 06:30:52.056461 systemd[1]: sshd@1-139.178.91.169:22-147.75.109.163:43600.service: Deactivated successfully. Feb 9 06:30:52.056915 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 06:30:52.057265 systemd-logind[1152]: Session 4 logged out. Waiting for processes to exit. Feb 9 06:30:52.057930 systemd[1]: Started sshd@2-139.178.91.169:22-147.75.109.163:43610.service. Feb 9 06:30:52.058287 systemd-logind[1152]: Removed session 4. Feb 9 06:30:52.087440 etcd-wrapper[1395]: 1813d21adc01: Verifying Checksum Feb 9 06:30:52.087440 etcd-wrapper[1395]: 1813d21adc01: Download complete Feb 9 06:30:52.094831 sshd[1417]: Accepted publickey for core from 147.75.109.163 port 43610 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:30:52.095660 sshd[1417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:30:52.097931 systemd-logind[1152]: New session 5 of user core. Feb 9 06:30:52.098557 systemd[1]: Started session-5.scope. Feb 9 06:30:52.148008 sshd[1417]: pam_unix(sshd:session): session closed for user core Feb 9 06:30:52.149421 systemd[1]: sshd@2-139.178.91.169:22-147.75.109.163:43610.service: Deactivated successfully. Feb 9 06:30:52.149823 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 06:30:52.150162 systemd-logind[1152]: Session 5 logged out. Waiting for processes to exit. Feb 9 06:30:52.150731 systemd-logind[1152]: Removed session 5. Feb 9 06:30:52.347340 etcd-wrapper[1395]: 8cc22b9456bb: Verifying Checksum Feb 9 06:30:52.347340 etcd-wrapper[1395]: 8cc22b9456bb: Download complete Feb 9 06:30:52.384527 etcd-wrapper[1395]: 7ac70aecd290: Download complete Feb 9 06:30:52.396677 etcd-wrapper[1395]: 0fd2df5633f0: Verifying Checksum Feb 9 06:30:52.396677 etcd-wrapper[1395]: 0fd2df5633f0: Download complete Feb 9 06:30:52.593488 etcd-wrapper[1395]: 1813d21adc01: Pull complete Feb 9 06:30:52.653460 etcd-wrapper[1395]: 4b376c64dfe4: Verifying Checksum Feb 9 06:30:52.785825 systemd[1]: var-lib-docker-overlay2-6a17b8fe1b05fe48dd19766e5f7acd952ef67fc2b4416933c3416d431b6aa570-merged.mount: Deactivated successfully. Feb 9 06:30:53.020420 etcd-wrapper[1395]: 6e96907ab677: Pull complete Feb 9 06:30:53.177293 systemd[1]: var-lib-docker-overlay2-c008072fd549026c11ef64b4edcc24e7aae5449e8dac535b026720e6b9689a4f-merged.mount: Deactivated successfully. Feb 9 06:30:53.228915 etcd-wrapper[1395]: 444ed0ea8673: Pull complete Feb 9 06:30:53.414562 etcd-wrapper[1395]: 0fd2df5633f0: Pull complete Feb 9 06:30:53.523362 etcd-wrapper[1395]: 8cc22b9456bb: Pull complete Feb 9 06:30:53.546146 etcd-wrapper[1395]: 7ac70aecd290: Pull complete Feb 9 06:30:53.568765 etcd-wrapper[1395]: 4b376c64dfe4: Pull complete Feb 9 06:30:53.571311 etcd-wrapper[1395]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 06:30:53.572054 etcd-wrapper[1395]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 06:30:53.596024 systemd[1]: var-lib-docker-overlay2-6c09fc1f01049d3716771f6c8baf5f24932c5c965cc83f75942bf235aecfa6b8-merged.mount: Deactivated successfully. Feb 9 06:30:53.609108 env[1158]: time="2024-02-09T06:30:53.609072909Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:30:53.609108 env[1158]: time="2024-02-09T06:30:53.609095654Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:30:53.609108 env[1158]: time="2024-02-09T06:30:53.609102994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:30:53.609381 env[1158]: time="2024-02-09T06:30:53.609172466Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/887e633e6b8850d2844a763a9837dc0dc574675803328590beb01b5d56c26e2f pid=1589 runtime=io.containerd.runc.v2 Feb 9 06:30:53.638154 systemd[1]: Started docker-887e633e6b8850d2844a763a9837dc0dc574675803328590beb01b5d56c26e2f.scope. Feb 9 06:30:53.741161 etcd-wrapper[1395]: {"level":"info","ts":1707460253.7409909,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 06:30:53.741161 etcd-wrapper[1395]: {"level":"info","ts":1707460253.7410486,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"ed52503f8966451ea6fe7235091f62cd"} Feb 9 06:30:53.741161 etcd-wrapper[1395]: {"level":"warn","ts":1707460253.7410753,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 06:30:53.741161 etcd-wrapper[1395]: {"level":"warn","ts":1707460253.741082,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 06:30:53.741161 etcd-wrapper[1395]: {"level":"warn","ts":1707460253.7410874,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 06:30:53.741161 etcd-wrapper[1395]: {"level":"warn","ts":1707460253.7410927,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 06:30:53.741430 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.741Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.1:2379"]} Feb 9 06:30:53.741430 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.741Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 9 06:30:53.741691 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.741Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 06:30:53.741812 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.741Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"ed52503f8966451ea6fe7235091f62cd","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.1:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"ed52503f8966451ea6fe7235091f62cd=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 06:30:53.742714 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.742Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"629.447µs"} Feb 9 06:30:53.744307 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.744Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 9 06:30:53.744307 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.744Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 9 06:30:53.744307 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.744Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 9 06:30:53.744307 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.744Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 06:30:53.744307 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.744Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 9 06:30:53.744307 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.744Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 06:30:53.744999 etcd-wrapper[1395]: {"level":"warn","ts":"2024-02-09T06:30:53.744Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 06:30:53.745544 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.745Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 06:30:53.745813 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.745Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 06:30:53.746061 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.745Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 06:30:53.746166 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.746Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 9 06:30:53.746796 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.746Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 06:30:53.746871 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.746Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 9 06:30:53.748135 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.747Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 9 06:30:53.748135 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.747Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.1:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 06:30:53.748135 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.747Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.944Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.944Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.944Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.944Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.944Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 9 06:30:53.945372 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:ed52503f8966451ea6fe7235091f62cd ClientURLs:[http://10.67.80.1:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.945Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.946Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.946Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 06:30:53.946566 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.946Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 9 06:30:53.946659 systemd[1]: Started etcd-member.service. Feb 9 06:30:53.947431 systemd[1]: Reached target multi-user.target. Feb 9 06:30:53.947904 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T06:30:53.947Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 06:30:53.950886 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 06:30:53.958657 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 06:30:53.958739 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 06:30:53.958888 systemd[1]: Startup finished in 2.015s (kernel) + 6.617s (initrd) + 18.510s (userspace) = 27.144s. Feb 9 06:31:02.156635 systemd[1]: Started sshd@3-139.178.91.169:22-147.75.109.163:44098.service. Feb 9 06:31:02.194508 sshd[1644]: Accepted publickey for core from 147.75.109.163 port 44098 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:02.195154 sshd[1644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:02.197884 systemd-logind[1152]: New session 6 of user core. Feb 9 06:31:02.198349 systemd[1]: Started session-6.scope. Feb 9 06:31:02.252156 sshd[1644]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:02.256421 systemd[1]: sshd@3-139.178.91.169:22-147.75.109.163:44098.service: Deactivated successfully. Feb 9 06:31:02.257444 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 06:31:02.258598 systemd-logind[1152]: Session 6 logged out. Waiting for processes to exit. Feb 9 06:31:02.260753 systemd[1]: Started sshd@4-139.178.91.169:22-147.75.109.163:44108.service. Feb 9 06:31:02.262572 systemd-logind[1152]: Removed session 6. Feb 9 06:31:02.323077 sshd[1650]: Accepted publickey for core from 147.75.109.163 port 44108 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:02.323764 sshd[1650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:02.326072 systemd-logind[1152]: New session 7 of user core. Feb 9 06:31:02.326524 systemd[1]: Started session-7.scope. Feb 9 06:31:02.379201 sshd[1650]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:02.386037 systemd[1]: sshd@4-139.178.91.169:22-147.75.109.163:44108.service: Deactivated successfully. Feb 9 06:31:02.387265 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 06:31:02.387673 systemd-logind[1152]: Session 7 logged out. Waiting for processes to exit. Feb 9 06:31:02.388125 systemd[1]: Started sshd@5-139.178.91.169:22-147.75.109.163:44118.service. Feb 9 06:31:02.388533 systemd-logind[1152]: Removed session 7. Feb 9 06:31:02.425676 sshd[1657]: Accepted publickey for core from 147.75.109.163 port 44118 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:02.426410 sshd[1657]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:02.429241 systemd-logind[1152]: New session 8 of user core. Feb 9 06:31:02.429810 systemd[1]: Started session-8.scope. Feb 9 06:31:02.483933 sshd[1657]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:02.485405 systemd[1]: sshd@5-139.178.91.169:22-147.75.109.163:44118.service: Deactivated successfully. Feb 9 06:31:02.485746 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 06:31:02.486097 systemd-logind[1152]: Session 8 logged out. Waiting for processes to exit. Feb 9 06:31:02.486658 systemd[1]: Started sshd@6-139.178.91.169:22-147.75.109.163:44122.service. Feb 9 06:31:02.487109 systemd-logind[1152]: Removed session 8. Feb 9 06:31:02.525212 sshd[1663]: Accepted publickey for core from 147.75.109.163 port 44122 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:02.526263 sshd[1663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:02.529772 systemd-logind[1152]: New session 9 of user core. Feb 9 06:31:02.530563 systemd[1]: Started session-9.scope. Feb 9 06:31:02.611565 sudo[1666]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 06:31:02.612172 sudo[1666]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:31:02.633829 dbus-daemon[1122]: Ѝ\xb8\xdaMV: received setenforce notice (enforcing=-511641984) Feb 9 06:31:02.638900 sudo[1666]: pam_unix(sudo:session): session closed for user root Feb 9 06:31:02.644042 sshd[1663]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:02.651265 systemd[1]: sshd@6-139.178.91.169:22-147.75.109.163:44122.service: Deactivated successfully. Feb 9 06:31:02.653087 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 06:31:02.654989 systemd-logind[1152]: Session 9 logged out. Waiting for processes to exit. Feb 9 06:31:02.657766 systemd[1]: Started sshd@7-139.178.91.169:22-147.75.109.163:44128.service. Feb 9 06:31:02.660396 systemd-logind[1152]: Removed session 9. Feb 9 06:31:02.721757 sshd[1670]: Accepted publickey for core from 147.75.109.163 port 44128 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:02.722367 sshd[1670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:02.724695 systemd-logind[1152]: New session 10 of user core. Feb 9 06:31:02.725106 systemd[1]: Started session-10.scope. Feb 9 06:31:02.777295 sudo[1674]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 06:31:02.777533 sudo[1674]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:31:02.781066 sudo[1674]: pam_unix(sudo:session): session closed for user root Feb 9 06:31:02.787095 sudo[1673]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 06:31:02.787196 sudo[1673]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:31:02.792321 systemd[1]: Stopping audit-rules.service... Feb 9 06:31:02.792000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 06:31:02.793213 auditctl[1677]: No rules Feb 9 06:31:02.793406 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 06:31:02.793520 systemd[1]: Stopped audit-rules.service. Feb 9 06:31:02.794338 systemd[1]: Starting audit-rules.service... Feb 9 06:31:02.798642 kernel: kauditd_printk_skb: 118 callbacks suppressed Feb 9 06:31:02.798683 kernel: audit: type=1305 audit(1707460262.792:139): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 06:31:02.804247 augenrules[1694]: No rules Feb 9 06:31:02.804542 systemd[1]: Finished audit-rules.service. Feb 9 06:31:02.805023 sudo[1673]: pam_unix(sudo:session): session closed for user root Feb 9 06:31:02.805805 sshd[1670]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:02.807397 systemd[1]: sshd@7-139.178.91.169:22-147.75.109.163:44128.service: Deactivated successfully. Feb 9 06:31:02.807756 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 06:31:02.808094 systemd-logind[1152]: Session 10 logged out. Waiting for processes to exit. Feb 9 06:31:02.808680 systemd[1]: Started sshd@8-139.178.91.169:22-147.75.109.163:44138.service. Feb 9 06:31:02.809116 systemd-logind[1152]: Removed session 10. Feb 9 06:31:02.792000 audit[1677]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc79ae480 a2=420 a3=0 items=0 ppid=1 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:31:02.845188 kernel: audit: type=1300 audit(1707460262.792:139): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc79ae480 a2=420 a3=0 items=0 ppid=1 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:31:02.845246 kernel: audit: type=1327 audit(1707460262.792:139): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 06:31:02.792000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 06:31:02.854711 kernel: audit: type=1131 audit(1707460262.793:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.877144 kernel: audit: type=1130 audit(1707460262.804:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.887063 sshd[1700]: Accepted publickey for core from 147.75.109.163 port 44138 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:02.888305 sshd[1700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:02.890455 systemd-logind[1152]: New session 11 of user core. Feb 9 06:31:02.891119 systemd[1]: Started session-11.scope. Feb 9 06:31:02.899590 kernel: audit: type=1106 audit(1707460262.804:142): pid=1673 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.804000 audit[1673]: USER_END pid=1673 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.925641 kernel: audit: type=1104 audit(1707460262.804:143): pid=1673 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.804000 audit[1673]: CRED_DISP pid=1673 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.937043 sshd[1700]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:02.938382 systemd[1]: sshd@8-139.178.91.169:22-147.75.109.163:44138.service: Deactivated successfully. Feb 9 06:31:02.938696 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 06:31:02.939025 systemd-logind[1152]: Session 11 logged out. Waiting for processes to exit. Feb 9 06:31:02.939532 systemd[1]: Started sshd@9-139.178.91.169:22-147.75.109.163:44144.service. Feb 9 06:31:02.940009 systemd-logind[1152]: Removed session 11. Feb 9 06:31:02.949303 kernel: audit: type=1106 audit(1707460262.805:144): pid=1670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.805000 audit[1670]: USER_END pid=1670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.981574 kernel: audit: type=1104 audit(1707460262.805:145): pid=1670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.805000 audit[1670]: CRED_DISP pid=1670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.007624 kernel: audit: type=1131 audit(1707460262.807:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.169:22-147.75.109.163:44128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.169:22-147.75.109.163:44128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:03.013627 sshd[1708]: Accepted publickey for core from 147.75.109.163 port 44144 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:31:03.015646 sshd[1708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:31:03.017968 systemd-logind[1152]: New session 12 of user core. Feb 9 06:31:03.018442 systemd[1]: Started session-12.scope. Feb 9 06:31:02.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.169:22-147.75.109.163:44138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.886000 audit[1700]: USER_ACCT pid=1700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.887000 audit[1700]: CRED_ACQ pid=1700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.887000 audit[1700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc353f6fa0 a2=3 a3=0 items=0 ppid=1 pid=1700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:31:02.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:31:02.893000 audit[1700]: USER_START pid=1700 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.893000 audit[1702]: CRED_ACQ pid=1702 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.937000 audit[1700]: USER_END pid=1700 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.937000 audit[1700]: CRED_DISP pid=1700 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:02.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.169:22-147.75.109.163:44138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:02.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.169:22-147.75.109.163:44144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:03.013000 audit[1708]: USER_ACCT pid=1708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.015000 audit[1708]: CRED_ACQ pid=1708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.015000 audit[1708]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb3cf7750 a2=3 a3=0 items=0 ppid=1 pid=1708 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:31:03.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:31:03.020000 audit[1708]: USER_START pid=1708 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.021000 audit[1710]: CRED_ACQ pid=1710 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.399069 sshd[1708]: pam_unix(sshd:session): session closed for user core Feb 9 06:31:03.401000 audit[1708]: USER_END pid=1708 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.401000 audit[1708]: CRED_DISP pid=1708 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:31:03.404888 systemd[1]: sshd@9-139.178.91.169:22-147.75.109.163:44144.service: Deactivated successfully. Feb 9 06:31:03.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.169:22-147.75.109.163:44144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:03.406904 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 06:31:03.408796 systemd-logind[1152]: Session 12 logged out. Waiting for processes to exit. Feb 9 06:31:03.411115 systemd-logind[1152]: Removed session 12. Feb 9 06:31:20.912428 systemd-resolved[1109]: Clock change detected. Flushing caches. Feb 9 06:31:20.912765 systemd-timesyncd[1110]: Contacted time server [2604:a880:400:d0::83:2002]:123 (2.flatcar.pool.ntp.org). Feb 9 06:31:20.912902 systemd-timesyncd[1110]: Initial clock synchronization to Fri 2024-02-09 06:31:20.912239 UTC. Feb 9 06:31:21.592962 systemd[1]: Started sshd@10-139.178.91.169:22-101.43.123.18:57508.service. Feb 9 06:31:21.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-101.43.123.18:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:21.598625 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 9 06:31:21.598660 kernel: audit: type=1130 audit(1707460281.592:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-101.43.123.18:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:23.029333 sshd[1734]: Invalid user almalinux from 101.43.123.18 port 57508 Feb 9 06:31:23.035732 sshd[1734]: pam_faillock(sshd:auth): User unknown Feb 9 06:31:23.036751 sshd[1734]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:31:23.036839 sshd[1734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:31:23.037758 sshd[1734]: pam_faillock(sshd:auth): User unknown Feb 9 06:31:23.037000 audit[1734]: USER_AUTH pid=1734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="almalinux" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:31:23.115570 kernel: audit: type=1100 audit(1707460283.037:166): pid=1734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="almalinux" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:31:24.952172 sshd[1734]: Failed password for invalid user almalinux from 101.43.123.18 port 57508 ssh2 Feb 9 06:31:26.741680 sshd[1734]: Received disconnect from 101.43.123.18 port 57508:11: Bye Bye [preauth] Feb 9 06:31:26.741680 sshd[1734]: Disconnected from invalid user almalinux 101.43.123.18 port 57508 [preauth] Feb 9 06:31:26.744349 systemd[1]: sshd@10-139.178.91.169:22-101.43.123.18:57508.service: Deactivated successfully. Feb 9 06:31:26.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-101.43.123.18:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:26.824461 kernel: audit: type=1131 audit(1707460286.744:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.169:22-101.43.123.18:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:31:27.615629 update_engine[1154]: I0209 06:31:27.615515 1154 update_attempter.cc:509] Updating boot flags... Feb 9 06:32:48.693071 systemd[1]: Started sshd@11-139.178.91.169:22-101.43.123.18:43452.service. Feb 9 06:32:48.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-101.43.123.18:43452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:32:48.775425 kernel: audit: type=1130 audit(1707460368.691:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-101.43.123.18:43452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:33:16.578560 sshd[1756]: Connection closed by 101.43.123.18 port 43452 [preauth] Feb 9 06:33:16.580418 systemd[1]: sshd@11-139.178.91.169:22-101.43.123.18:43452.service: Deactivated successfully. Feb 9 06:33:16.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-101.43.123.18:43452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:33:16.667561 kernel: audit: type=1131 audit(1707460396.580:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.169:22-101.43.123.18:43452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:08.394972 systemd[1]: Started sshd@12-139.178.91.169:22-101.43.123.18:57634.service. Feb 9 06:34:08.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-101.43.123.18:57634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:08.484562 kernel: audit: type=1130 audit(1707460448.393:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-101.43.123.18:57634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:09.863775 sshd[1762]: Invalid user wdq from 101.43.123.18 port 57634 Feb 9 06:34:09.869844 sshd[1762]: pam_faillock(sshd:auth): User unknown Feb 9 06:34:09.871000 sshd[1762]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:34:09.871088 sshd[1762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:34:09.871983 sshd[1762]: pam_faillock(sshd:auth): User unknown Feb 9 06:34:09.870000 audit[1762]: USER_AUTH pid=1762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wdq" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:34:09.961578 kernel: audit: type=1100 audit(1707460449.870:171): pid=1762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wdq" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:34:12.574386 sshd[1762]: Failed password for invalid user wdq from 101.43.123.18 port 57634 ssh2 Feb 9 06:34:14.379412 sshd[1762]: Received disconnect from 101.43.123.18 port 57634:11: Bye Bye [preauth] Feb 9 06:34:14.379412 sshd[1762]: Disconnected from invalid user wdq 101.43.123.18 port 57634 [preauth] Feb 9 06:34:14.381949 systemd[1]: sshd@12-139.178.91.169:22-101.43.123.18:57634.service: Deactivated successfully. Feb 9 06:34:14.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-101.43.123.18:57634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:14.474563 kernel: audit: type=1131 audit(1707460454.381:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.169:22-101.43.123.18:57634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:21.669117 systemd[1]: Started sshd@13-139.178.91.169:22-218.92.0.27:33320.service. Feb 9 06:34:21.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-218.92.0.27:33320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:21.759368 kernel: audit: type=1130 audit(1707460461.667:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-218.92.0.27:33320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:22.802128 sshd[1766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:34:22.801000 audit[1766]: USER_AUTH pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:22.894548 kernel: audit: type=1100 audit(1707460462.801:174): pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:24.290022 sshd[1766]: Failed password for root from 218.92.0.27 port 33320 ssh2 Feb 9 06:34:25.624000 audit[1766]: USER_AUTH pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:25.717548 kernel: audit: type=1100 audit(1707460465.624:175): pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:27.525409 sshd[1766]: Failed password for root from 218.92.0.27 port 33320 ssh2 Feb 9 06:34:28.433000 audit[1766]: USER_AUTH pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:28.524564 kernel: audit: type=1100 audit(1707460468.433:176): pid=1766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:30.076909 sshd[1766]: Failed password for root from 218.92.0.27 port 33320 ssh2 Feb 9 06:34:30.816475 sshd[1766]: Received disconnect from 218.92.0.27 port 33320:11: [preauth] Feb 9 06:34:30.816475 sshd[1766]: Disconnected from authenticating user root 218.92.0.27 port 33320 [preauth] Feb 9 06:34:30.817019 sshd[1766]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:34:30.819056 systemd[1]: sshd@13-139.178.91.169:22-218.92.0.27:33320.service: Deactivated successfully. Feb 9 06:34:30.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-218.92.0.27:33320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:30.911545 kernel: audit: type=1131 audit(1707460470.819:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.169:22-218.92.0.27:33320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:30.958111 systemd[1]: Started sshd@14-139.178.91.169:22-218.92.0.27:27205.service. Feb 9 06:34:30.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-218.92.0.27:27205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:31.048554 kernel: audit: type=1130 audit(1707460470.957:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-218.92.0.27:27205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:31.977292 sshd[1770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:34:31.977000 audit[1770]: USER_AUTH pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:32.069470 kernel: audit: type=1100 audit(1707460471.977:179): pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:34.368288 sshd[1770]: Failed password for root from 218.92.0.27 port 27205 ssh2 Feb 9 06:34:36.575000 audit[1770]: ANOM_LOGIN_FAILURES pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:36.575821 sshd[1770]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 06:34:36.575000 audit[1770]: USER_AUTH pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:36.732115 kernel: audit: type=2100 audit(1707460476.575:180): pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:36.732149 kernel: audit: type=1100 audit(1707460476.575:181): pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:38.319438 sshd[1770]: Failed password for root from 218.92.0.27 port 27205 ssh2 Feb 9 06:34:38.956000 audit[1770]: USER_AUTH pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:39.049553 kernel: audit: type=1100 audit(1707460478.956:182): pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:41.307557 sshd[1770]: Failed password for root from 218.92.0.27 port 27205 ssh2 Feb 9 06:34:43.555451 sshd[1770]: Received disconnect from 218.92.0.27 port 27205:11: [preauth] Feb 9 06:34:43.555451 sshd[1770]: Disconnected from authenticating user root 218.92.0.27 port 27205 [preauth] Feb 9 06:34:43.556018 sshd[1770]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:34:43.558051 systemd[1]: sshd@14-139.178.91.169:22-218.92.0.27:27205.service: Deactivated successfully. Feb 9 06:34:43.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-218.92.0.27:27205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:43.650560 kernel: audit: type=1131 audit(1707460483.558:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.169:22-218.92.0.27:27205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:43.708146 systemd[1]: Started sshd@15-139.178.91.169:22-218.92.0.27:45884.service. Feb 9 06:34:43.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-218.92.0.27:45884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:43.800369 kernel: audit: type=1130 audit(1707460483.707:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-218.92.0.27:45884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:44.718921 sshd[1774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:34:44.718000 audit[1774]: USER_AUTH pid=1774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:44.811426 kernel: audit: type=1100 audit(1707460484.718:185): pid=1774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:46.894308 sshd[1774]: Failed password for root from 218.92.0.27 port 45884 ssh2 Feb 9 06:34:47.097000 audit[1774]: USER_AUTH pid=1774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:47.190558 kernel: audit: type=1100 audit(1707460487.097:186): pid=1774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:48.349815 sshd[1774]: Failed password for root from 218.92.0.27 port 45884 ssh2 Feb 9 06:34:49.468000 audit[1774]: USER_AUTH pid=1774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:49.561555 kernel: audit: type=1100 audit(1707460489.468:187): pid=1774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:34:50.996788 sshd[1774]: Failed password for root from 218.92.0.27 port 45884 ssh2 Feb 9 06:34:51.847400 sshd[1774]: Received disconnect from 218.92.0.27 port 45884:11: [preauth] Feb 9 06:34:51.847400 sshd[1774]: Disconnected from authenticating user root 218.92.0.27 port 45884 [preauth] Feb 9 06:34:51.848108 sshd[1774]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:34:51.850131 systemd[1]: sshd@15-139.178.91.169:22-218.92.0.27:45884.service: Deactivated successfully. Feb 9 06:34:51.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-218.92.0.27:45884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:34:51.942422 kernel: audit: type=1131 audit(1707460491.850:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.169:22-218.92.0.27:45884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:35:34.520994 systemd[1]: Started sshd@16-139.178.91.169:22-101.43.123.18:43554.service. Feb 9 06:35:34.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-101.43.123.18:43554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:35:34.614560 kernel: audit: type=1130 audit(1707460534.519:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-101.43.123.18:43554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:35:36.142487 sshd[1781]: Invalid user ss from 101.43.123.18 port 43554 Feb 9 06:35:36.148858 sshd[1781]: pam_faillock(sshd:auth): User unknown Feb 9 06:35:36.149985 sshd[1781]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:35:36.150076 sshd[1781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:35:36.150968 sshd[1781]: pam_faillock(sshd:auth): User unknown Feb 9 06:35:36.149000 audit[1781]: USER_AUTH pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ss" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:35:36.243566 kernel: audit: type=1100 audit(1707460536.149:190): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ss" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:35:38.130610 sshd[1781]: Failed password for invalid user ss from 101.43.123.18 port 43554 ssh2 Feb 9 06:35:38.528564 sshd[1781]: Received disconnect from 101.43.123.18 port 43554:11: Bye Bye [preauth] Feb 9 06:35:38.528564 sshd[1781]: Disconnected from invalid user ss 101.43.123.18 port 43554 [preauth] Feb 9 06:35:38.531243 systemd[1]: sshd@16-139.178.91.169:22-101.43.123.18:43554.service: Deactivated successfully. Feb 9 06:35:38.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-101.43.123.18:43554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:35:38.624418 kernel: audit: type=1131 audit(1707460538.531:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.169:22-101.43.123.18:43554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:09.959639 systemd[1]: Started sshd@17-139.178.91.169:22-218.92.0.25:28540.service. Feb 9 06:36:09.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-218.92.0.25:28540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:10.053572 kernel: audit: type=1130 audit(1707460569.959:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-218.92.0.25:28540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:10.928005 sshd[1790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 06:36:10.927000 audit[1790]: USER_AUTH pid=1790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:11.021434 kernel: audit: type=1100 audit(1707460570.927:193): pid=1790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:12.240639 sshd[1790]: Failed password for root from 218.92.0.25 port 28540 ssh2 Feb 9 06:36:13.291000 audit[1790]: USER_AUTH pid=1790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:13.383550 kernel: audit: type=1100 audit(1707460573.291:194): pid=1790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:15.351434 sshd[1790]: Failed password for root from 218.92.0.25 port 28540 ssh2 Feb 9 06:36:15.654000 audit[1790]: USER_AUTH pid=1790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:15.747497 kernel: audit: type=1100 audit(1707460575.654:195): pid=1790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:17.990633 sshd[1790]: Failed password for root from 218.92.0.25 port 28540 ssh2 Feb 9 06:36:20.236464 sshd[1790]: Received disconnect from 218.92.0.25 port 28540:11: [preauth] Feb 9 06:36:20.236464 sshd[1790]: Disconnected from authenticating user root 218.92.0.25 port 28540 [preauth] Feb 9 06:36:20.237032 sshd[1790]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 06:36:20.239042 systemd[1]: sshd@17-139.178.91.169:22-218.92.0.25:28540.service: Deactivated successfully. Feb 9 06:36:20.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-218.92.0.25:28540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:20.332407 kernel: audit: type=1131 audit(1707460580.238:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.169:22-218.92.0.25:28540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:20.383145 systemd[1]: Started sshd@18-139.178.91.169:22-218.92.0.25:39917.service. Feb 9 06:36:20.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-218.92.0.25:39917 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:20.475385 kernel: audit: type=1130 audit(1707460580.381:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-218.92.0.25:39917 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:21.353160 sshd[1796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 06:36:21.352000 audit[1796]: USER_AUTH pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:21.445544 kernel: audit: type=1100 audit(1707460581.352:198): pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:23.177285 sshd[1796]: Failed password for root from 218.92.0.25 port 39917 ssh2 Feb 9 06:36:23.716000 audit[1796]: USER_AUTH pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:23.810415 kernel: audit: type=1100 audit(1707460583.716:199): pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:25.817344 sshd[1796]: Failed password for root from 218.92.0.25 port 39917 ssh2 Feb 9 06:36:26.080000 audit[1796]: USER_AUTH pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:26.173427 kernel: audit: type=1100 audit(1707460586.080:200): pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:27.925594 sshd[1796]: Failed password for root from 218.92.0.25 port 39917 ssh2 Feb 9 06:36:28.445273 sshd[1796]: Received disconnect from 218.92.0.25 port 39917:11: [preauth] Feb 9 06:36:28.445273 sshd[1796]: Disconnected from authenticating user root 218.92.0.25 port 39917 [preauth] Feb 9 06:36:28.445861 sshd[1796]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 06:36:28.447881 systemd[1]: sshd@18-139.178.91.169:22-218.92.0.25:39917.service: Deactivated successfully. Feb 9 06:36:28.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-218.92.0.25:39917 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:28.541565 kernel: audit: type=1131 audit(1707460588.447:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.169:22-218.92.0.25:39917 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:28.612487 systemd[1]: Started sshd@19-139.178.91.169:22-218.92.0.25:38212.service. Feb 9 06:36:28.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-218.92.0.25:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:28.703370 kernel: audit: type=1130 audit(1707460588.611:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-218.92.0.25:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:29.637140 sshd[1800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 06:36:29.636000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:29.730582 kernel: audit: type=1100 audit(1707460589.636:203): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:31.225496 sshd[1800]: Failed password for root from 218.92.0.25 port 38212 ssh2 Feb 9 06:36:32.011000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:32.105553 kernel: audit: type=1100 audit(1707460592.011:204): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:34.012480 sshd[1800]: Failed password for root from 218.92.0.25 port 38212 ssh2 Feb 9 06:36:34.386000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:34.480565 kernel: audit: type=1100 audit(1707460594.386:205): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 06:36:36.332086 sshd[1800]: Failed password for root from 218.92.0.25 port 38212 ssh2 Feb 9 06:36:36.762404 sshd[1800]: Received disconnect from 218.92.0.25 port 38212:11: [preauth] Feb 9 06:36:36.762404 sshd[1800]: Disconnected from authenticating user root 218.92.0.25 port 38212 [preauth] Feb 9 06:36:36.762962 sshd[1800]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 06:36:36.764961 systemd[1]: sshd@19-139.178.91.169:22-218.92.0.25:38212.service: Deactivated successfully. Feb 9 06:36:36.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-218.92.0.25:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:36.858566 kernel: audit: type=1131 audit(1707460596.764:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.169:22-218.92.0.25:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:54.247181 systemd[1]: Started sshd@20-139.178.91.169:22-218.92.0.47:11390.service. Feb 9 06:36:54.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-218.92.0.47:11390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:54.340573 kernel: audit: type=1130 audit(1707460614.246:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-218.92.0.47:11390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:54.401719 sshd[1804]: Unable to negotiate with 218.92.0.47 port 11390: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 06:36:54.402247 systemd[1]: sshd@20-139.178.91.169:22-218.92.0.47:11390.service: Deactivated successfully. Feb 9 06:36:54.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-218.92.0.47:11390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:36:54.494569 kernel: audit: type=1131 audit(1707460614.402:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.169:22-218.92.0.47:11390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:01.731096 systemd[1]: Started sshd@21-139.178.91.169:22-101.43.123.18:57730.service. Feb 9 06:37:01.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.169:22-101.43.123.18:57730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:01.824560 kernel: audit: type=1130 audit(1707460621.729:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.169:22-101.43.123.18:57730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:03.296870 sshd[1808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 user=root Feb 9 06:37:03.295000 audit[1808]: USER_AUTH pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:37:03.389549 kernel: audit: type=1100 audit(1707460623.295:210): pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:37:05.221235 sshd[1808]: Failed password for root from 101.43.123.18 port 57730 ssh2 Feb 9 06:37:05.641770 sshd[1808]: Received disconnect from 101.43.123.18 port 57730:11: Bye Bye [preauth] Feb 9 06:37:05.641770 sshd[1808]: Disconnected from authenticating user root 101.43.123.18 port 57730 [preauth] Feb 9 06:37:05.644193 systemd[1]: sshd@21-139.178.91.169:22-101.43.123.18:57730.service: Deactivated successfully. Feb 9 06:37:05.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.169:22-101.43.123.18:57730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:05.738563 kernel: audit: type=1131 audit(1707460625.643:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.169:22-101.43.123.18:57730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:36.256156 systemd[1]: Started sshd@22-139.178.91.169:22-180.101.88.197:56265.service. Feb 9 06:37:36.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.169:22-180.101.88.197:56265 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:36.349441 kernel: audit: type=1130 audit(1707460656.255:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.169:22-180.101.88.197:56265 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:37.552772 sshd[1813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 06:37:37.552000 audit[1813]: USER_AUTH pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:37.645430 kernel: audit: type=1100 audit(1707460657.552:213): pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:39.477396 sshd[1813]: Failed password for root from 180.101.88.197 port 56265 ssh2 Feb 9 06:37:39.925000 audit[1813]: USER_AUTH pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:40.019565 kernel: audit: type=1100 audit(1707460659.925:214): pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:41.790320 sshd[1813]: Failed password for root from 180.101.88.197 port 56265 ssh2 Feb 9 06:37:42.694000 audit[1813]: USER_AUTH pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:42.787553 kernel: audit: type=1100 audit(1707460662.694:215): pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:44.639309 sshd[1813]: Failed password for root from 180.101.88.197 port 56265 ssh2 Feb 9 06:37:45.084318 sshd[1813]: Received disconnect from 180.101.88.197 port 56265:11: [preauth] Feb 9 06:37:45.084318 sshd[1813]: Disconnected from authenticating user root 180.101.88.197 port 56265 [preauth] Feb 9 06:37:45.084865 sshd[1813]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 06:37:45.086890 systemd[1]: sshd@22-139.178.91.169:22-180.101.88.197:56265.service: Deactivated successfully. Feb 9 06:37:45.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.169:22-180.101.88.197:56265 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:45.181548 kernel: audit: type=1131 audit(1707460665.087:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.169:22-180.101.88.197:56265 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:45.257622 systemd[1]: Started sshd@23-139.178.91.169:22-180.101.88.197:54888.service. Feb 9 06:37:45.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-180.101.88.197:54888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:45.349412 kernel: audit: type=1130 audit(1707460665.257:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-180.101.88.197:54888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:46.348336 sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 06:37:46.348000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:46.441430 kernel: audit: type=1100 audit(1707460666.348:218): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:47.840613 sshd[1817]: Failed password for root from 180.101.88.197 port 54888 ssh2 Feb 9 06:37:48.723000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:48.816555 kernel: audit: type=1100 audit(1707460668.723:219): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:50.823625 sshd[1817]: Failed password for root from 180.101.88.197 port 54888 ssh2 Feb 9 06:37:51.099000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:51.193430 kernel: audit: type=1100 audit(1707460671.099:220): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:53.279770 sshd[1817]: Failed password for root from 180.101.88.197 port 54888 ssh2 Feb 9 06:37:53.479524 sshd[1817]: Received disconnect from 180.101.88.197 port 54888:11: [preauth] Feb 9 06:37:53.479524 sshd[1817]: Disconnected from authenticating user root 180.101.88.197 port 54888 [preauth] Feb 9 06:37:53.480099 sshd[1817]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 06:37:53.482108 systemd[1]: sshd@23-139.178.91.169:22-180.101.88.197:54888.service: Deactivated successfully. Feb 9 06:37:53.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-180.101.88.197:54888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:53.576564 kernel: audit: type=1131 audit(1707460673.481:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.169:22-180.101.88.197:54888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:53.634233 systemd[1]: Started sshd@24-139.178.91.169:22-180.101.88.197:51763.service. Feb 9 06:37:53.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-180.101.88.197:51763 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:53.727556 kernel: audit: type=1130 audit(1707460673.632:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-180.101.88.197:51763 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:37:54.704848 sshd[1822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 06:37:54.703000 audit[1822]: USER_AUTH pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:54.797409 kernel: audit: type=1100 audit(1707460674.703:223): pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:56.964777 sshd[1822]: Failed password for root from 180.101.88.197 port 51763 ssh2 Feb 9 06:37:59.309000 audit[1822]: USER_AUTH pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:37:59.404519 kernel: audit: type=1100 audit(1707460679.309:224): pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:38:01.255688 sshd[1822]: Failed password for root from 180.101.88.197 port 51763 ssh2 Feb 9 06:38:01.698000 audit[1822]: USER_AUTH pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:38:01.793427 kernel: audit: type=1100 audit(1707460681.698:225): pid=1822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 06:38:03.583629 sshd[1822]: Failed password for root from 180.101.88.197 port 51763 ssh2 Feb 9 06:38:04.087917 sshd[1822]: Received disconnect from 180.101.88.197 port 51763:11: [preauth] Feb 9 06:38:04.087917 sshd[1822]: Disconnected from authenticating user root 180.101.88.197 port 51763 [preauth] Feb 9 06:38:04.088466 sshd[1822]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 06:38:04.090462 systemd[1]: sshd@24-139.178.91.169:22-180.101.88.197:51763.service: Deactivated successfully. Feb 9 06:38:04.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-180.101.88.197:51763 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:38:04.184568 kernel: audit: type=1131 audit(1707460684.089:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.169:22-180.101.88.197:51763 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:38:29.467819 systemd[1]: Started sshd@25-139.178.91.169:22-101.43.123.18:43678.service. Feb 9 06:38:29.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-101.43.123.18:43678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:38:29.560429 kernel: audit: type=1130 audit(1707460709.467:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-101.43.123.18:43678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:38:31.038042 sshd[1826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 user=root Feb 9 06:38:31.037000 audit[1826]: USER_AUTH pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:38:31.130548 kernel: audit: type=1100 audit(1707460711.037:228): pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:38:33.042837 sshd[1826]: Failed password for root from 101.43.123.18 port 43678 ssh2 Feb 9 06:38:33.387639 sshd[1826]: Received disconnect from 101.43.123.18 port 43678:11: Bye Bye [preauth] Feb 9 06:38:33.387639 sshd[1826]: Disconnected from authenticating user root 101.43.123.18 port 43678 [preauth] Feb 9 06:38:33.390046 systemd[1]: sshd@25-139.178.91.169:22-101.43.123.18:43678.service: Deactivated successfully. Feb 9 06:38:33.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-101.43.123.18:43678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:38:33.484567 kernel: audit: type=1131 audit(1707460713.390:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.169:22-101.43.123.18:43678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:39:13.605527 update_engine[1154]: I0209 06:39:13.605417 1154 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 06:39:13.605527 update_engine[1154]: I0209 06:39:13.605496 1154 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 06:39:13.607165 update_engine[1154]: I0209 06:39:13.607081 1154 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 06:39:13.608154 update_engine[1154]: I0209 06:39:13.608079 1154 omaha_request_params.cc:62] Current group set to lts Feb 9 06:39:13.608467 update_engine[1154]: I0209 06:39:13.608395 1154 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 06:39:13.608467 update_engine[1154]: I0209 06:39:13.608417 1154 update_attempter.cc:643] Scheduling an action processor start. Feb 9 06:39:13.608467 update_engine[1154]: I0209 06:39:13.608454 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 06:39:13.608877 update_engine[1154]: I0209 06:39:13.608520 1154 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 06:39:13.608877 update_engine[1154]: I0209 06:39:13.608664 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 06:39:13.608877 update_engine[1154]: I0209 06:39:13.608680 1154 omaha_request_action.cc:271] Request: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: Feb 9 06:39:13.608877 update_engine[1154]: I0209 06:39:13.608690 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:39:13.610042 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 06:39:13.611844 update_engine[1154]: I0209 06:39:13.611769 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:39:13.612025 update_engine[1154]: E0209 06:39:13.612005 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:39:13.612197 update_engine[1154]: I0209 06:39:13.612164 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 06:39:23.602466 update_engine[1154]: I0209 06:39:23.602326 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:39:23.603239 update_engine[1154]: I0209 06:39:23.602814 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:39:23.603239 update_engine[1154]: E0209 06:39:23.603019 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:39:23.603239 update_engine[1154]: I0209 06:39:23.603193 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 06:39:33.602656 update_engine[1154]: I0209 06:39:33.602537 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:39:33.603468 update_engine[1154]: I0209 06:39:33.602999 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:39:33.603468 update_engine[1154]: E0209 06:39:33.603204 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:39:33.603468 update_engine[1154]: I0209 06:39:33.603408 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 06:39:43.601709 update_engine[1154]: I0209 06:39:43.601505 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:39:43.602490 update_engine[1154]: I0209 06:39:43.601971 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:39:43.602490 update_engine[1154]: E0209 06:39:43.602185 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:39:43.602490 update_engine[1154]: I0209 06:39:43.602337 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 06:39:43.602490 update_engine[1154]: I0209 06:39:43.602353 1154 omaha_request_action.cc:621] Omaha request response: Feb 9 06:39:43.602919 update_engine[1154]: E0209 06:39:43.602519 1154 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602550 1154 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602558 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602566 1154 update_attempter.cc:306] Processing Done. Feb 9 06:39:43.602919 update_engine[1154]: E0209 06:39:43.602591 1154 update_attempter.cc:619] Update failed. Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602600 1154 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602609 1154 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602618 1154 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602777 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602831 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602841 1154 omaha_request_action.cc:271] Request: Feb 9 06:39:43.602919 update_engine[1154]: Feb 9 06:39:43.602919 update_engine[1154]: Feb 9 06:39:43.602919 update_engine[1154]: Feb 9 06:39:43.602919 update_engine[1154]: Feb 9 06:39:43.602919 update_engine[1154]: Feb 9 06:39:43.602919 update_engine[1154]: Feb 9 06:39:43.602919 update_engine[1154]: I0209 06:39:43.602851 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603164 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:39:43.604596 update_engine[1154]: E0209 06:39:43.603329 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603483 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603499 1154 omaha_request_action.cc:621] Omaha request response: Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603509 1154 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603518 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603525 1154 update_attempter.cc:306] Processing Done. Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603533 1154 update_attempter.cc:310] Error event sent. Feb 9 06:39:43.604596 update_engine[1154]: I0209 06:39:43.603560 1154 update_check_scheduler.cc:74] Next update check in 45m24s Feb 9 06:39:43.605420 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 06:39:43.605420 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 06:39:56.727877 systemd[1]: Started sshd@26-139.178.91.169:22-101.43.123.18:57828.service. Feb 9 06:39:56.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-101.43.123.18:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:39:56.820577 kernel: audit: type=1130 audit(1707460796.726:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-101.43.123.18:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:39:58.244468 sshd[1831]: Invalid user advance from 101.43.123.18 port 57828 Feb 9 06:39:58.250499 sshd[1831]: pam_faillock(sshd:auth): User unknown Feb 9 06:39:58.251582 sshd[1831]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:39:58.251672 sshd[1831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:39:58.252659 sshd[1831]: pam_faillock(sshd:auth): User unknown Feb 9 06:39:58.251000 audit[1831]: USER_AUTH pid=1831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="advance" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:39:58.346566 kernel: audit: type=1100 audit(1707460798.251:231): pid=1831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="advance" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:40:00.533511 sshd[1831]: Failed password for invalid user advance from 101.43.123.18 port 57828 ssh2 Feb 9 06:40:02.448642 sshd[1831]: Received disconnect from 101.43.123.18 port 57828:11: Bye Bye [preauth] Feb 9 06:40:02.448642 sshd[1831]: Disconnected from invalid user advance 101.43.123.18 port 57828 [preauth] Feb 9 06:40:02.451120 systemd[1]: sshd@26-139.178.91.169:22-101.43.123.18:57828.service: Deactivated successfully. Feb 9 06:40:02.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-101.43.123.18:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:40:02.544368 kernel: audit: type=1131 audit(1707460802.450:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.169:22-101.43.123.18:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:40:23.546675 systemd[1]: Started sshd@27-139.178.91.169:22-141.98.11.11:22738.service. Feb 9 06:40:23.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-141.98.11.11:22738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:40:23.640568 kernel: audit: type=1130 audit(1707460823.545:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-141.98.11.11:22738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:40:24.846131 sshd[1836]: Invalid user test from 141.98.11.11 port 22738 Feb 9 06:40:25.043436 sshd[1836]: pam_faillock(sshd:auth): User unknown Feb 9 06:40:25.044405 sshd[1836]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:40:25.044497 sshd[1836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 9 06:40:25.045470 sshd[1836]: pam_faillock(sshd:auth): User unknown Feb 9 06:40:25.044000 audit[1836]: USER_AUTH pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 9 06:40:25.138427 kernel: audit: type=1100 audit(1707460825.044:234): pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 9 06:40:27.365651 sshd[1836]: Failed password for invalid user test from 141.98.11.11 port 22738 ssh2 Feb 9 06:40:28.158037 sshd[1836]: Connection closed by invalid user test 141.98.11.11 port 22738 [preauth] Feb 9 06:40:28.160534 systemd[1]: sshd@27-139.178.91.169:22-141.98.11.11:22738.service: Deactivated successfully. Feb 9 06:40:28.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-141.98.11.11:22738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:40:28.254451 kernel: audit: type=1131 audit(1707460828.159:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.91.169:22-141.98.11.11:22738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:21.192661 systemd[1]: Started sshd@28-139.178.91.169:22-101.43.123.18:43892.service. Feb 9 06:41:21.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-101.43.123.18:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:21.286563 kernel: audit: type=1130 audit(1707460881.191:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-101.43.123.18:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:22.733563 sshd[1844]: Invalid user ftp-user from 101.43.123.18 port 43892 Feb 9 06:41:22.739619 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 9 06:41:22.740813 sshd[1844]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:41:22.740903 sshd[1844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:41:22.741832 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 9 06:41:22.740000 audit[1844]: USER_AUTH pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp-user" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:41:22.835564 kernel: audit: type=1100 audit(1707460882.740:237): pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp-user" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:41:24.555709 sshd[1844]: Failed password for invalid user ftp-user from 101.43.123.18 port 43892 ssh2 Feb 9 06:41:25.950225 sshd[1844]: Received disconnect from 101.43.123.18 port 43892:11: Bye Bye [preauth] Feb 9 06:41:25.950225 sshd[1844]: Disconnected from invalid user ftp-user 101.43.123.18 port 43892 [preauth] Feb 9 06:41:25.952756 systemd[1]: sshd@28-139.178.91.169:22-101.43.123.18:43892.service: Deactivated successfully. Feb 9 06:41:25.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-101.43.123.18:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:26.046569 kernel: audit: type=1131 audit(1707460885.951:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.91.169:22-101.43.123.18:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:38.294342 systemd[1]: Started sshd@29-139.178.91.169:22-218.92.0.29:23810.service. Feb 9 06:41:38.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-218.92.0.29:23810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:38.387562 kernel: audit: type=1130 audit(1707460898.294:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-218.92.0.29:23810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:40.048119 sshd[1848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 06:41:40.048000 audit[1848]: USER_AUTH pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:41:40.140552 kernel: audit: type=1100 audit(1707460900.048:240): pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:41:42.665219 sshd[1848]: Failed password for root from 218.92.0.29 port 23810 ssh2 Feb 9 06:41:44.640000 audit[1848]: USER_AUTH pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:41:44.732552 kernel: audit: type=1100 audit(1707460904.640:241): pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:41:46.474214 sshd[1848]: Failed password for root from 218.92.0.29 port 23810 ssh2 Feb 9 06:41:47.013000 audit[1848]: USER_AUTH pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:41:47.105428 kernel: audit: type=1100 audit(1707460907.013:242): pid=1848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:41:48.591938 sshd[1848]: Failed password for root from 218.92.0.29 port 23810 ssh2 Feb 9 06:41:49.386154 sshd[1848]: Received disconnect from 218.92.0.29 port 23810:11: [preauth] Feb 9 06:41:49.386154 sshd[1848]: Disconnected from authenticating user root 218.92.0.29 port 23810 [preauth] Feb 9 06:41:49.386726 sshd[1848]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 06:41:49.388719 systemd[1]: sshd@29-139.178.91.169:22-218.92.0.29:23810.service: Deactivated successfully. Feb 9 06:41:49.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-218.92.0.29:23810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:49.482575 kernel: audit: type=1131 audit(1707460909.388:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.91.169:22-218.92.0.29:23810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:49.542537 systemd[1]: Started sshd@30-139.178.91.169:22-218.92.0.29:49345.service. Feb 9 06:41:49.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-218.92.0.29:49345 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:49.633560 kernel: audit: type=1130 audit(1707460909.542:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-218.92.0.29:49345 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:59.854687 systemd[1]: Started sshd@31-139.178.91.169:22-218.92.0.29:15501.service. Feb 9 06:41:59.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-218.92.0.29:15501 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:41:59.947445 kernel: audit: type=1130 audit(1707460919.853:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-218.92.0.29:15501 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:01.201735 sshd[1856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 06:42:01.200000 audit[1856]: USER_AUTH pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:01.294552 kernel: audit: type=1100 audit(1707460921.200:246): pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:03.035924 sshd[1856]: Failed password for root from 218.92.0.29 port 15501 ssh2 Feb 9 06:42:03.563000 audit[1856]: ANOM_LOGIN_FAILURES pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:03.565295 sshd[1856]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 06:42:03.564000 audit[1856]: USER_AUTH pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:03.721801 kernel: audit: type=2100 audit(1707460923.563:247): pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:03.721845 kernel: audit: type=1100 audit(1707460923.564:248): pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:06.006650 sshd[1856]: Failed password for root from 218.92.0.29 port 15501 ssh2 Feb 9 06:42:08.146000 audit[1856]: USER_AUTH pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:08.240537 kernel: audit: type=1100 audit(1707460928.146:249): pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:09.941790 sshd[1856]: Failed password for root from 218.92.0.29 port 15501 ssh2 Feb 9 06:42:10.511010 sshd[1856]: Received disconnect from 218.92.0.29 port 15501:11: [preauth] Feb 9 06:42:10.511010 sshd[1856]: Disconnected from authenticating user root 218.92.0.29 port 15501 [preauth] Feb 9 06:42:10.511580 sshd[1856]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 06:42:10.513572 systemd[1]: sshd@31-139.178.91.169:22-218.92.0.29:15501.service: Deactivated successfully. Feb 9 06:42:10.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-218.92.0.29:15501 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:10.607578 kernel: audit: type=1131 audit(1707460930.512:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.91.169:22-218.92.0.29:15501 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:10.679194 systemd[1]: Started sshd@32-139.178.91.169:22-218.92.0.29:41692.service. Feb 9 06:42:10.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-218.92.0.29:41692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:10.770562 kernel: audit: type=1130 audit(1707460930.677:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-218.92.0.29:41692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:21.005213 systemd[1]: Started sshd@33-139.178.91.169:22-218.92.0.29:61473.service. Feb 9 06:42:21.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-218.92.0.29:61473 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:21.097425 kernel: audit: type=1130 audit(1707460941.004:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-218.92.0.29:61473 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:31.341914 systemd[1]: Started sshd@34-139.178.91.169:22-218.92.0.29:21333.service. Feb 9 06:42:31.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-218.92.0.29:21333 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:31.434426 kernel: audit: type=1130 audit(1707460951.341:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-218.92.0.29:21333 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:41.666492 systemd[1]: Started sshd@35-139.178.91.169:22-218.92.0.29:40916.service. Feb 9 06:42:41.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-218.92.0.29:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:41.758579 kernel: audit: type=1130 audit(1707460961.665:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-218.92.0.29:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:43.411735 sshd[1867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 06:42:43.410000 audit[1867]: USER_AUTH pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:43.503418 kernel: audit: type=1100 audit(1707460963.410:255): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:45.010284 sshd[1867]: Failed password for root from 218.92.0.29 port 40916 ssh2 Feb 9 06:42:45.781000 audit[1867]: USER_AUTH pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:45.874408 kernel: audit: type=1100 audit(1707460965.781:256): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:47.656785 sshd[1867]: Failed password for root from 218.92.0.29 port 40916 ssh2 Feb 9 06:42:48.152000 audit[1867]: USER_AUTH pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:48.246554 kernel: audit: type=1100 audit(1707460968.152:257): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 06:42:49.280348 systemd[1]: Started sshd@36-139.178.91.169:22-101.43.123.18:58136.service. Feb 9 06:42:49.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-101.43.123.18:58136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:49.373565 kernel: audit: type=1130 audit(1707460969.279:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-101.43.123.18:58136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:49.772419 sshd[1867]: Failed password for root from 218.92.0.29 port 40916 ssh2 Feb 9 06:42:50.524303 sshd[1867]: Received disconnect from 218.92.0.29 port 40916:11: [preauth] Feb 9 06:42:50.524303 sshd[1867]: Disconnected from authenticating user root 218.92.0.29 port 40916 [preauth] Feb 9 06:42:50.524868 sshd[1867]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 06:42:50.526882 systemd[1]: sshd@35-139.178.91.169:22-218.92.0.29:40916.service: Deactivated successfully. Feb 9 06:42:50.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-218.92.0.29:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:50.620570 kernel: audit: type=1131 audit(1707460970.526:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.91.169:22-218.92.0.29:40916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:50.764229 sshd[1870]: Invalid user superset from 101.43.123.18 port 58136 Feb 9 06:42:50.770220 sshd[1870]: pam_faillock(sshd:auth): User unknown Feb 9 06:42:50.771206 sshd[1870]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:42:50.771294 sshd[1870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:42:50.772324 sshd[1870]: pam_faillock(sshd:auth): User unknown Feb 9 06:42:50.771000 audit[1870]: USER_AUTH pid=1870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="superset" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:42:50.871577 kernel: audit: type=1100 audit(1707460970.771:260): pid=1870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="superset" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:42:52.666648 sshd[1870]: Failed password for invalid user superset from 101.43.123.18 port 58136 ssh2 Feb 9 06:42:54.495321 sshd[1870]: Received disconnect from 101.43.123.18 port 58136:11: Bye Bye [preauth] Feb 9 06:42:54.495321 sshd[1870]: Disconnected from invalid user superset 101.43.123.18 port 58136 [preauth] Feb 9 06:42:54.497792 systemd[1]: sshd@36-139.178.91.169:22-101.43.123.18:58136.service: Deactivated successfully. Feb 9 06:42:54.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-101.43.123.18:58136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:42:54.591571 kernel: audit: type=1131 audit(1707460974.497:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.91.169:22-101.43.123.18:58136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:49.549316 sshd[1854]: Timeout before authentication for 218.92.0.29 port 49345 Feb 9 06:43:49.550739 systemd[1]: sshd@30-139.178.91.169:22-218.92.0.29:49345.service: Deactivated successfully. Feb 9 06:43:49.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-218.92.0.29:49345 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:49.644562 kernel: audit: type=1131 audit(1707461029.550:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.91.169:22-218.92.0.29:49345 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:10.686356 sshd[1861]: Timeout before authentication for 218.92.0.29 port 41692 Feb 9 06:44:10.687665 systemd[1]: sshd@32-139.178.91.169:22-218.92.0.29:41692.service: Deactivated successfully. Feb 9 06:44:10.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-218.92.0.29:41692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:10.780511 kernel: audit: type=1131 audit(1707461050.686:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.91.169:22-218.92.0.29:41692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:15.457653 systemd[1]: Started sshd@37-139.178.91.169:22-101.43.123.18:44074.service. Feb 9 06:44:15.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-101.43.123.18:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:15.551573 kernel: audit: type=1130 audit(1707461055.456:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-101.43.123.18:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:21.010702 sshd[1863]: Timeout before authentication for 218.92.0.29 port 61473 Feb 9 06:44:21.012145 systemd[1]: sshd@33-139.178.91.169:22-218.92.0.29:61473.service: Deactivated successfully. Feb 9 06:44:21.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-218.92.0.29:61473 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:21.105582 kernel: audit: type=1131 audit(1707461061.012:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.91.169:22-218.92.0.29:61473 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:31.347225 sshd[1865]: Timeout before authentication for 218.92.0.29 port 21333 Feb 9 06:44:31.348744 systemd[1]: sshd@34-139.178.91.169:22-218.92.0.29:21333.service: Deactivated successfully. Feb 9 06:44:31.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-218.92.0.29:21333 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:31.441586 kernel: audit: type=1131 audit(1707461071.348:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.91.169:22-218.92.0.29:21333 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:39.660299 systemd[1]: Started sshd@38-139.178.91.169:22-101.43.123.18:58258.service. Feb 9 06:45:39.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-101.43.123.18:58258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:39.661082 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 9 06:45:39.753435 kernel: audit: type=1130 audit(1707461139.659:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-101.43.123.18:58258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:39.757507 systemd-tmpfiles[1883]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 06:45:39.757729 systemd-tmpfiles[1883]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 06:45:39.758418 systemd-tmpfiles[1883]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 06:45:39.768565 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 9 06:45:39.768652 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 9 06:45:39.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:39.769815 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 9 06:45:39.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:39.945938 kernel: audit: type=1130 audit(1707461139.767:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:39.945972 kernel: audit: type=1131 audit(1707461139.767:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:15.462803 sshd[1878]: Timeout before authentication for 101.43.123.18 port 44074 Feb 9 06:46:15.464238 systemd[1]: sshd@37-139.178.91.169:22-101.43.123.18:44074.service: Deactivated successfully. Feb 9 06:46:15.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-101.43.123.18:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:15.557601 kernel: audit: type=1131 audit(1707461175.464:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.91.169:22-101.43.123.18:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:10.966681 systemd[1]: Started sshd@39-139.178.91.169:22-101.43.123.18:44206.service. Feb 9 06:47:10.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-101.43.123.18:44206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:11.059556 kernel: audit: type=1130 audit(1707461230.965:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-101.43.123.18:44206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:12.442036 sshd[1891]: Invalid user vps1 from 101.43.123.18 port 44206 Feb 9 06:47:12.448160 sshd[1891]: pam_faillock(sshd:auth): User unknown Feb 9 06:47:12.449240 sshd[1891]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:47:12.449328 sshd[1891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:47:12.450221 sshd[1891]: pam_faillock(sshd:auth): User unknown Feb 9 06:47:12.449000 audit[1891]: USER_AUTH pid=1891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vps1" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:47:12.543555 kernel: audit: type=1100 audit(1707461232.449:272): pid=1891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vps1" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:47:14.645636 sshd[1891]: Failed password for invalid user vps1 from 101.43.123.18 port 44206 ssh2 Feb 9 06:47:16.203711 sshd[1891]: Received disconnect from 101.43.123.18 port 44206:11: Bye Bye [preauth] Feb 9 06:47:16.203711 sshd[1891]: Disconnected from invalid user vps1 101.43.123.18 port 44206 [preauth] Feb 9 06:47:16.206348 systemd[1]: sshd@39-139.178.91.169:22-101.43.123.18:44206.service: Deactivated successfully. Feb 9 06:47:16.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-101.43.123.18:44206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:16.300569 kernel: audit: type=1131 audit(1707461236.205:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.91.169:22-101.43.123.18:44206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:39.665717 sshd[1882]: Timeout before authentication for 101.43.123.18 port 58258 Feb 9 06:47:39.667183 systemd[1]: sshd@38-139.178.91.169:22-101.43.123.18:58258.service: Deactivated successfully. Feb 9 06:47:39.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-101.43.123.18:58258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:39.760435 kernel: audit: type=1131 audit(1707461259.667:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.91.169:22-101.43.123.18:58258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:04.387669 systemd[1]: Started sshd@40-139.178.91.169:22-202.88.237.198:37784.service. Feb 9 06:48:04.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-202.88.237.198:37784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:04.480448 kernel: audit: type=1130 audit(1707461284.386:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-202.88.237.198:37784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:06.970980 sshd[1897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.237.198 user=root Feb 9 06:48:06.969000 audit[1897]: USER_AUTH pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=202.88.237.198 addr=202.88.237.198 terminal=ssh res=failed' Feb 9 06:48:07.063400 kernel: audit: type=1100 audit(1707461286.969:276): pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=202.88.237.198 addr=202.88.237.198 terminal=ssh res=failed' Feb 9 06:48:09.582535 sshd[1897]: Failed password for root from 202.88.237.198 port 37784 ssh2 Feb 9 06:48:11.401545 sshd[1897]: Connection closed by authenticating user root 202.88.237.198 port 37784 [preauth] Feb 9 06:48:11.404059 systemd[1]: sshd@40-139.178.91.169:22-202.88.237.198:37784.service: Deactivated successfully. Feb 9 06:48:11.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-202.88.237.198:37784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:11.497465 kernel: audit: type=1131 audit(1707461291.404:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.91.169:22-202.88.237.198:37784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:11.575985 systemd[1]: Started sshd@41-139.178.91.169:22-177.72.87.7:42828.service. Feb 9 06:48:11.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-177.72.87.7:42828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:11.667559 kernel: audit: type=1130 audit(1707461291.576:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-177.72.87.7:42828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:13.587636 sshd[1901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.72.87.7 user=root Feb 9 06:48:13.587000 audit[1901]: USER_AUTH pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.72.87.7 addr=177.72.87.7 terminal=ssh res=failed' Feb 9 06:48:13.679429 kernel: audit: type=1100 audit(1707461293.587:279): pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.72.87.7 addr=177.72.87.7 terminal=ssh res=failed' Feb 9 06:48:15.491785 sshd[1901]: Failed password for root from 177.72.87.7 port 42828 ssh2 Feb 9 06:48:16.813000 audit[1903]: USER_AUTH pid=1903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.72.87.7 addr=177.72.87.7 terminal=ssh res=failed' Feb 9 06:48:16.905549 kernel: audit: type=1100 audit(1707461296.813:280): pid=1903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.72.87.7 addr=177.72.87.7 terminal=ssh res=failed' Feb 9 06:48:18.461735 sshd[1901]: PAM: Permission denied for root from 177.72.87.7 Feb 9 06:48:18.955687 sshd[1901]: Connection closed by authenticating user root 177.72.87.7 port 42828 [preauth] Feb 9 06:48:18.958388 systemd[1]: sshd@41-139.178.91.169:22-177.72.87.7:42828.service: Deactivated successfully. Feb 9 06:48:18.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-177.72.87.7:42828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:19.051566 kernel: audit: type=1131 audit(1707461298.957:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.91.169:22-177.72.87.7:42828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:41.936164 systemd[1]: Started sshd@42-139.178.91.169:22-101.43.123.18:58424.service. Feb 9 06:48:41.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.91.169:22-101.43.123.18:58424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:42.029690 kernel: audit: type=1130 audit(1707461321.934:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.91.169:22-101.43.123.18:58424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:43.137312 sshd[1906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 user=root Feb 9 06:48:43.136000 audit[1906]: USER_AUTH pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:48:43.230553 kernel: audit: type=1100 audit(1707461323.136:283): pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:48:45.161641 sshd[1906]: Failed password for root from 101.43.123.18 port 58424 ssh2 Feb 9 06:48:45.482497 sshd[1906]: Received disconnect from 101.43.123.18 port 58424:11: Bye Bye [preauth] Feb 9 06:48:45.482497 sshd[1906]: Disconnected from authenticating user root 101.43.123.18 port 58424 [preauth] Feb 9 06:48:45.485031 systemd[1]: sshd@42-139.178.91.169:22-101.43.123.18:58424.service: Deactivated successfully. Feb 9 06:48:45.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.91.169:22-101.43.123.18:58424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:45.578426 kernel: audit: type=1131 audit(1707461325.484:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.91.169:22-101.43.123.18:58424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:01.947474 systemd[1]: Started sshd@43-139.178.91.169:22-218.92.0.52:15814.service. Feb 9 06:50:01.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-218.92.0.52:15814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:02.040568 kernel: audit: type=1130 audit(1707461401.946:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-218.92.0.52:15814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:02.107216 sshd[1910]: Unable to negotiate with 218.92.0.52 port 15814: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 06:50:02.107797 systemd[1]: sshd@43-139.178.91.169:22-218.92.0.52:15814.service: Deactivated successfully. Feb 9 06:50:02.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-218.92.0.52:15814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:02.199558 kernel: audit: type=1131 audit(1707461402.106:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.91.169:22-218.92.0.52:15814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:07.229828 systemd[1]: Started sshd@44-139.178.91.169:22-101.43.123.18:44438.service. Feb 9 06:50:07.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-101.43.123.18:44438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:07.322425 kernel: audit: type=1130 audit(1707461407.228:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-101.43.123.18:44438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:04.543698 sshd[1915]: Connection closed by 101.43.123.18 port 44438 [preauth] Feb 9 06:51:04.545548 systemd[1]: sshd@44-139.178.91.169:22-101.43.123.18:44438.service: Deactivated successfully. Feb 9 06:51:04.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-101.43.123.18:44438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:04.638436 kernel: audit: type=1131 audit(1707461464.544:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.91.169:22-101.43.123.18:44438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:33.256889 systemd[1]: Started sshd@45-139.178.91.169:22-101.43.123.18:58616.service. Feb 9 06:51:33.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-101.43.123.18:58616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:33.349561 kernel: audit: type=1130 audit(1707461493.255:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-101.43.123.18:58616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:03.309768 systemd[1]: Started sshd@46-139.178.91.169:22-101.43.123.18:44560.service. Feb 9 06:53:03.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-101.43.123.18:44560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:03.402559 kernel: audit: type=1130 audit(1707461583.308:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-101.43.123.18:44560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:04.758950 sshd[1927]: Invalid user grid from 101.43.123.18 port 44560 Feb 9 06:53:04.765015 sshd[1927]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:04.766138 sshd[1927]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:53:04.766226 sshd[1927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:53:04.767128 sshd[1927]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:04.765000 audit[1927]: USER_AUTH pid=1927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="grid" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:53:04.860564 kernel: audit: type=1100 audit(1707461584.765:291): pid=1927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="grid" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:53:06.620995 sshd[1927]: Failed password for invalid user grid from 101.43.123.18 port 44560 ssh2 Feb 9 06:53:08.584057 sshd[1927]: Received disconnect from 101.43.123.18 port 44560:11: Bye Bye [preauth] Feb 9 06:53:08.584057 sshd[1927]: Disconnected from invalid user grid 101.43.123.18 port 44560 [preauth] Feb 9 06:53:08.586599 systemd[1]: sshd@46-139.178.91.169:22-101.43.123.18:44560.service: Deactivated successfully. Feb 9 06:53:08.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-101.43.123.18:44560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:08.679439 kernel: audit: type=1131 audit(1707461588.585:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.91.169:22-101.43.123.18:44560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:17.169738 systemd[1]: Started sshd@47-139.178.91.169:22-218.92.0.27:64312.service. Feb 9 06:53:17.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-218.92.0.27:64312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:17.262570 kernel: audit: type=1130 audit(1707461597.169:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-218.92.0.27:64312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:18.778482 sshd[1931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:53:18.778000 audit[1931]: USER_AUTH pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:18.870431 kernel: audit: type=1100 audit(1707461598.778:294): pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:20.888301 sshd[1931]: Failed password for root from 218.92.0.27 port 64312 ssh2 Feb 9 06:53:21.167000 audit[1931]: USER_AUTH pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:21.260554 kernel: audit: type=1100 audit(1707461601.167:295): pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:23.021662 sshd[1931]: Failed password for root from 218.92.0.27 port 64312 ssh2 Feb 9 06:53:23.978000 audit[1931]: USER_AUTH pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:24.070551 kernel: audit: type=1100 audit(1707461603.978:296): pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:26.108137 sshd[1931]: Failed password for root from 218.92.0.27 port 64312 ssh2 Feb 9 06:53:26.370736 sshd[1931]: Received disconnect from 218.92.0.27 port 64312:11: [preauth] Feb 9 06:53:26.370736 sshd[1931]: Disconnected from authenticating user root 218.92.0.27 port 64312 [preauth] Feb 9 06:53:26.371133 sshd[1931]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:53:26.373091 systemd[1]: sshd@47-139.178.91.169:22-218.92.0.27:64312.service: Deactivated successfully. Feb 9 06:53:26.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-218.92.0.27:64312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:26.466551 kernel: audit: type=1131 audit(1707461606.373:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.91.169:22-218.92.0.27:64312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:26.548223 systemd[1]: Started sshd@48-139.178.91.169:22-218.92.0.27:63131.service. Feb 9 06:53:26.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-218.92.0.27:63131 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:26.641453 kernel: audit: type=1130 audit(1707461606.548:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-218.92.0.27:63131 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:28.875579 sshd[1936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:53:28.874000 audit[1936]: USER_AUTH pid=1936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:28.967433 kernel: audit: type=1100 audit(1707461608.874:299): pid=1936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:29.608608 systemd[1]: Started sshd@49-139.178.91.169:22-218.92.0.112:30591.service. Feb 9 06:53:29.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-218.92.0.112:30591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:29.701450 kernel: audit: type=1130 audit(1707461609.607:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-218.92.0.112:30591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:30.611195 sshd[1939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 06:53:30.610000 audit[1939]: ANOM_LOGIN_FAILURES pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:30.611474 sshd[1939]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 06:53:30.610000 audit[1939]: USER_AUTH pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:30.688501 sshd[1936]: Failed password for root from 218.92.0.27 port 63131 ssh2 Feb 9 06:53:30.767219 kernel: audit: type=2100 audit(1707461610.610:301): pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:30.767250 kernel: audit: type=1100 audit(1707461610.610:302): pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:31.260000 audit[1936]: USER_AUTH pid=1936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:31.354536 kernel: audit: type=1100 audit(1707461611.260:303): pid=1936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:32.701186 sshd[1939]: Failed password for root from 218.92.0.112 port 30591 ssh2 Feb 9 06:53:32.979000 audit[1939]: USER_AUTH pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:33.073538 kernel: audit: type=1100 audit(1707461612.979:304): pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:33.155848 sshd[1936]: Failed password for root from 218.92.0.27 port 63131 ssh2 Feb 9 06:53:33.262092 sshd[1921]: Timeout before authentication for 101.43.123.18 port 58616 Feb 9 06:53:33.263555 systemd[1]: sshd@45-139.178.91.169:22-101.43.123.18:58616.service: Deactivated successfully. Feb 9 06:53:33.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-101.43.123.18:58616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:33.363568 kernel: audit: type=1131 audit(1707461613.262:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.91.169:22-101.43.123.18:58616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:33.647000 audit[1936]: USER_AUTH pid=1936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:33.748423 kernel: audit: type=1100 audit(1707461613.647:306): pid=1936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:34.679103 sshd[1939]: Failed password for root from 218.92.0.112 port 30591 ssh2 Feb 9 06:53:35.350000 audit[1939]: USER_AUTH pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:35.443564 kernel: audit: type=1100 audit(1707461615.350:307): pid=1939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:35.482543 sshd[1936]: Failed password for root from 218.92.0.27 port 63131 ssh2 Feb 9 06:53:36.034945 sshd[1936]: Received disconnect from 218.92.0.27 port 63131:11: [preauth] Feb 9 06:53:36.034945 sshd[1936]: Disconnected from authenticating user root 218.92.0.27 port 63131 [preauth] Feb 9 06:53:36.035486 sshd[1936]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:53:36.037500 systemd[1]: sshd@48-139.178.91.169:22-218.92.0.27:63131.service: Deactivated successfully. Feb 9 06:53:36.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-218.92.0.27:63131 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:36.130412 kernel: audit: type=1131 audit(1707461616.036:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.91.169:22-218.92.0.27:63131 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:36.208303 systemd[1]: Started sshd@50-139.178.91.169:22-218.92.0.27:12607.service. Feb 9 06:53:36.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-218.92.0.27:12607 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:36.301563 kernel: audit: type=1130 audit(1707461616.207:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-218.92.0.27:12607 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:37.461408 sshd[1939]: Failed password for root from 218.92.0.112 port 30591 ssh2 Feb 9 06:53:37.721341 sshd[1939]: Received disconnect from 218.92.0.112 port 30591:11: [preauth] Feb 9 06:53:37.721341 sshd[1939]: Disconnected from authenticating user root 218.92.0.112 port 30591 [preauth] Feb 9 06:53:37.721774 sshd[1939]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 06:53:37.723777 systemd[1]: sshd@49-139.178.91.169:22-218.92.0.112:30591.service: Deactivated successfully. Feb 9 06:53:37.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-218.92.0.112:30591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:37.817558 kernel: audit: type=1131 audit(1707461617.722:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.91.169:22-218.92.0.112:30591 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:37.883852 systemd[1]: Started sshd@51-139.178.91.169:22-218.92.0.112:30906.service. Feb 9 06:53:37.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-218.92.0.112:30906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:37.975610 kernel: audit: type=1130 audit(1707461617.882:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-218.92.0.112:30906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:38.060308 sshd[1946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:53:38.059000 audit[1946]: USER_AUTH pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:38.151552 kernel: audit: type=1100 audit(1707461618.059:312): pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:38.916901 sshd[1950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 06:53:38.915000 audit[1950]: USER_AUTH pid=1950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:39.009538 kernel: audit: type=1100 audit(1707461618.915:313): pid=1950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:39.773832 systemd[1]: Started sshd@52-139.178.91.169:22-85.209.11.254:6546.service. Feb 9 06:53:39.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-85.209.11.254:6546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:39.865541 kernel: audit: type=1130 audit(1707461619.772:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-85.209.11.254:6546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:40.581605 sshd[1946]: Failed password for root from 218.92.0.27 port 12607 ssh2 Feb 9 06:53:41.231562 sshd[1953]: Invalid user test from 85.209.11.254 port 6546 Feb 9 06:53:41.438102 sshd[1950]: Failed password for root from 218.92.0.112 port 30906 ssh2 Feb 9 06:53:41.439421 sshd[1953]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:41.440360 sshd[1953]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:53:41.440470 sshd[1953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 Feb 9 06:53:41.441380 sshd[1953]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:41.440000 audit[1953]: USER_AUTH pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 9 06:53:41.534565 kernel: audit: type=1100 audit(1707461621.440:315): pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 9 06:53:42.651000 audit[1946]: USER_AUTH pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:42.744544 kernel: audit: type=1100 audit(1707461622.651:316): pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:43.374788 sshd[1953]: Failed password for invalid user test from 85.209.11.254 port 6546 ssh2 Feb 9 06:53:43.509000 audit[1950]: USER_AUTH pid=1950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:43.602537 kernel: audit: type=1100 audit(1707461623.509:317): pid=1950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:44.390829 sshd[1946]: Failed password for root from 218.92.0.27 port 12607 ssh2 Feb 9 06:53:44.563395 sshd[1953]: Connection closed by invalid user test 85.209.11.254 port 6546 [preauth] Feb 9 06:53:44.565887 systemd[1]: sshd@52-139.178.91.169:22-85.209.11.254:6546.service: Deactivated successfully. Feb 9 06:53:44.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-85.209.11.254:6546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:44.659563 kernel: audit: type=1131 audit(1707461624.565:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.91.169:22-85.209.11.254:6546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:45.036000 audit[1946]: USER_AUTH pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:45.129410 kernel: audit: type=1100 audit(1707461625.036:319): pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 06:53:45.384458 sshd[1950]: Failed password for root from 218.92.0.112 port 30906 ssh2 Feb 9 06:53:45.886000 audit[1950]: USER_AUTH pid=1950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:45.979556 kernel: audit: type=1100 audit(1707461625.886:320): pid=1950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:47.187534 sshd[1946]: Failed password for root from 218.92.0.27 port 12607 ssh2 Feb 9 06:53:47.421892 sshd[1946]: Received disconnect from 218.92.0.27 port 12607:11: [preauth] Feb 9 06:53:47.421892 sshd[1946]: Disconnected from authenticating user root 218.92.0.27 port 12607 [preauth] Feb 9 06:53:47.422486 sshd[1946]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 06:53:47.424523 systemd[1]: sshd@50-139.178.91.169:22-218.92.0.27:12607.service: Deactivated successfully. Feb 9 06:53:47.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-218.92.0.27:12607 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:47.517555 kernel: audit: type=1131 audit(1707461627.423:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.91.169:22-218.92.0.27:12607 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:48.037094 sshd[1950]: Failed password for root from 218.92.0.112 port 30906 ssh2 Feb 9 06:53:48.264173 sshd[1950]: Received disconnect from 218.92.0.112 port 30906:11: [preauth] Feb 9 06:53:48.264173 sshd[1950]: Disconnected from authenticating user root 218.92.0.112 port 30906 [preauth] Feb 9 06:53:48.264754 sshd[1950]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 06:53:48.266861 systemd[1]: sshd@51-139.178.91.169:22-218.92.0.112:30906.service: Deactivated successfully. Feb 9 06:53:48.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-218.92.0.112:30906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:48.359435 kernel: audit: type=1131 audit(1707461628.265:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.91.169:22-218.92.0.112:30906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:48.412039 systemd[1]: Started sshd@53-139.178.91.169:22-218.92.0.112:51893.service. Feb 9 06:53:48.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.91.169:22-218.92.0.112:51893 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:48.504565 kernel: audit: type=1130 audit(1707461628.410:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.91.169:22-218.92.0.112:51893 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:49.415356 sshd[1961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 06:53:49.414000 audit[1961]: USER_AUTH pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:49.507551 kernel: audit: type=1100 audit(1707461629.414:324): pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:52.112625 sshd[1961]: Failed password for root from 218.92.0.112 port 51893 ssh2 Feb 9 06:53:54.004000 audit[1961]: USER_AUTH pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:54.097697 kernel: audit: type=1100 audit(1707461634.004:325): pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:55.722744 sshd[1961]: Failed password for root from 218.92.0.112 port 51893 ssh2 Feb 9 06:53:56.373000 audit[1961]: USER_AUTH pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:56.466546 kernel: audit: type=1100 audit(1707461636.373:326): pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 06:53:58.699599 sshd[1961]: Failed password for root from 218.92.0.112 port 51893 ssh2 Feb 9 06:54:00.963813 sshd[1961]: Received disconnect from 218.92.0.112 port 51893:11: [preauth] Feb 9 06:54:00.963813 sshd[1961]: Disconnected from authenticating user root 218.92.0.112 port 51893 [preauth] Feb 9 06:54:00.964348 sshd[1961]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 06:54:00.966351 systemd[1]: sshd@53-139.178.91.169:22-218.92.0.112:51893.service: Deactivated successfully. Feb 9 06:54:00.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.91.169:22-218.92.0.112:51893 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:01.059571 kernel: audit: type=1131 audit(1707461640.966:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.91.169:22-218.92.0.112:51893 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:29.562995 systemd[1]: Started sshd@54-139.178.91.169:22-101.43.123.18:58740.service. Feb 9 06:54:29.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-101.43.123.18:58740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:29.656710 kernel: audit: type=1130 audit(1707461669.562:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-101.43.123.18:58740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:55:53.010826 systemd[1]: Started sshd@55-139.178.91.169:22-218.92.0.118:51661.service. Feb 9 06:55:53.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.91.169:22-218.92.0.118:51661 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:55:53.103558 kernel: audit: type=1130 audit(1707461753.010:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.91.169:22-218.92.0.118:51661 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:55:54.654333 sshd[1967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 06:55:54.654000 audit[1967]: USER_AUTH pid=1967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:55:54.746535 kernel: audit: type=1100 audit(1707461754.654:330): pid=1967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:55:56.513216 sshd[1967]: Failed password for root from 218.92.0.118 port 51661 ssh2 Feb 9 06:55:57.755000 audit[1967]: USER_AUTH pid=1967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:55:57.848565 kernel: audit: type=1100 audit(1707461757.755:331): pid=1967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:55:59.359790 sshd[1967]: Failed password for root from 218.92.0.118 port 51661 ssh2 Feb 9 06:55:59.619033 systemd[1]: Started sshd@56-139.178.91.169:22-101.43.123.18:44678.service. Feb 9 06:55:59.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-101.43.123.18:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:55:59.711568 kernel: audit: type=1130 audit(1707461759.617:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-101.43.123.18:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:00.344000 audit[1967]: USER_AUTH pid=1967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:00.438553 kernel: audit: type=1100 audit(1707461760.344:333): pid=1967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:02.360648 sshd[1967]: Failed password for root from 218.92.0.118 port 51661 ssh2 Feb 9 06:56:02.758442 sshd[1967]: Received disconnect from 218.92.0.118 port 51661:11: [preauth] Feb 9 06:56:02.758442 sshd[1967]: Disconnected from authenticating user root 218.92.0.118 port 51661 [preauth] Feb 9 06:56:02.759006 sshd[1967]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 06:56:02.760993 systemd[1]: sshd@55-139.178.91.169:22-218.92.0.118:51661.service: Deactivated successfully. Feb 9 06:56:02.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.91.169:22-218.92.0.118:51661 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:02.854706 kernel: audit: type=1131 audit(1707461762.760:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.91.169:22-218.92.0.118:51661 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:02.979979 systemd[1]: Started sshd@57-139.178.91.169:22-218.92.0.118:51864.service. Feb 9 06:56:02.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-218.92.0.118:51864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:03.071401 kernel: audit: type=1130 audit(1707461762.978:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-218.92.0.118:51864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:04.011177 sshd[1973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 06:56:04.010000 audit[1973]: USER_AUTH pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:04.103369 kernel: audit: type=1100 audit(1707461764.010:336): pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:05.910000 sshd[1973]: Failed password for root from 218.92.0.118 port 51864 ssh2 Feb 9 06:56:06.384000 audit[1973]: ANOM_LOGIN_FAILURES pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:06.385824 sshd[1973]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 06:56:06.384000 audit[1973]: USER_AUTH pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:06.541615 kernel: audit: type=2100 audit(1707461766.384:337): pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:06.541647 kernel: audit: type=1100 audit(1707461766.384:338): pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:08.224595 sshd[1973]: Failed password for root from 218.92.0.118 port 51864 ssh2 Feb 9 06:56:08.759000 audit[1973]: USER_AUTH pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:08.852368 kernel: audit: type=1100 audit(1707461768.759:339): pid=1973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:10.874998 sshd[1973]: Failed password for root from 218.92.0.118 port 51864 ssh2 Feb 9 06:56:11.134249 sshd[1973]: Received disconnect from 218.92.0.118 port 51864:11: [preauth] Feb 9 06:56:11.134249 sshd[1973]: Disconnected from authenticating user root 218.92.0.118 port 51864 [preauth] Feb 9 06:56:11.134714 sshd[1973]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 06:56:11.136708 systemd[1]: sshd@57-139.178.91.169:22-218.92.0.118:51864.service: Deactivated successfully. Feb 9 06:56:11.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-218.92.0.118:51864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:11.230697 kernel: audit: type=1131 audit(1707461771.135:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.91.169:22-218.92.0.118:51864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:11.300941 systemd[1]: Started sshd@58-139.178.91.169:22-218.92.0.118:47481.service. Feb 9 06:56:11.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-218.92.0.118:47481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:11.392420 kernel: audit: type=1130 audit(1707461771.299:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-218.92.0.118:47481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:12.341485 sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 06:56:12.340000 audit[1978]: USER_AUTH pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:12.433430 kernel: audit: type=1100 audit(1707461772.340:342): pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:14.335958 sshd[1978]: Failed password for root from 218.92.0.118 port 47481 ssh2 Feb 9 06:56:14.715000 audit[1978]: USER_AUTH pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:14.808368 kernel: audit: type=1100 audit(1707461774.715:343): pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:17.322934 sshd[1978]: Failed password for root from 218.92.0.118 port 47481 ssh2 Feb 9 06:56:19.311000 audit[1978]: USER_AUTH pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:19.405550 kernel: audit: type=1100 audit(1707461779.311:344): pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 9 06:56:21.603524 sshd[1978]: Failed password for root from 218.92.0.118 port 47481 ssh2 Feb 9 06:56:24.289797 sshd[1978]: Received disconnect from 218.92.0.118 port 47481:11: [preauth] Feb 9 06:56:24.289797 sshd[1978]: Disconnected from authenticating user root 218.92.0.118 port 47481 [preauth] Feb 9 06:56:24.290350 sshd[1978]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 9 06:56:24.292392 systemd[1]: sshd@58-139.178.91.169:22-218.92.0.118:47481.service: Deactivated successfully. Feb 9 06:56:24.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-218.92.0.118:47481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:24.385564 kernel: audit: type=1131 audit(1707461784.292:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.91.169:22-218.92.0.118:47481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:29.568049 sshd[1965]: Timeout before authentication for 101.43.123.18 port 58740 Feb 9 06:56:29.569485 systemd[1]: sshd@54-139.178.91.169:22-101.43.123.18:58740.service: Deactivated successfully. Feb 9 06:56:29.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-101.43.123.18:58740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:56:29.662558 kernel: audit: type=1131 audit(1707461789.569:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.91.169:22-101.43.123.18:58740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:20.458917 systemd[1]: Started sshd@59-139.178.91.169:22-218.92.0.34:63567.service. Feb 9 06:57:20.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-218.92.0.34:63567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:20.551388 kernel: audit: type=1130 audit(1707461840.457:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-218.92.0.34:63567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:20.867821 systemd[1]: Started sshd@60-139.178.91.169:22-101.43.123.18:58848.service. Feb 9 06:57:20.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-101.43.123.18:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:20.959562 kernel: audit: type=1130 audit(1707461840.866:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-101.43.123.18:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:21.474476 sshd[1990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 9 06:57:21.473000 audit[1990]: USER_AUTH pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:21.566390 kernel: audit: type=1100 audit(1707461841.473:349): pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:22.340014 sshd[1993]: Invalid user bitwarden from 101.43.123.18 port 58848 Feb 9 06:57:22.346141 sshd[1993]: pam_faillock(sshd:auth): User unknown Feb 9 06:57:22.347241 sshd[1993]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:57:22.347329 sshd[1993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 06:57:22.348301 sshd[1993]: pam_faillock(sshd:auth): User unknown Feb 9 06:57:22.347000 audit[1993]: USER_AUTH pid=1993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bitwarden" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:57:22.441563 kernel: audit: type=1100 audit(1707461842.347:350): pid=1993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bitwarden" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:57:23.277997 sshd[1990]: Failed password for root from 218.92.0.34 port 63567 ssh2 Feb 9 06:57:23.844000 audit[1990]: USER_AUTH pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:23.938539 kernel: audit: type=1100 audit(1707461843.844:351): pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:24.287436 sshd[1993]: Failed password for invalid user bitwarden from 101.43.123.18 port 58848 ssh2 Feb 9 06:57:24.635447 sshd[1993]: Received disconnect from 101.43.123.18 port 58848:11: Bye Bye [preauth] Feb 9 06:57:24.635447 sshd[1993]: Disconnected from invalid user bitwarden 101.43.123.18 port 58848 [preauth] Feb 9 06:57:24.637825 systemd[1]: sshd@60-139.178.91.169:22-101.43.123.18:58848.service: Deactivated successfully. Feb 9 06:57:24.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-101.43.123.18:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:24.731564 kernel: audit: type=1131 audit(1707461844.636:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.91.169:22-101.43.123.18:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:25.589347 sshd[1990]: Failed password for root from 218.92.0.34 port 63567 ssh2 Feb 9 06:57:26.216000 audit[1990]: USER_AUTH pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:26.310551 kernel: audit: type=1100 audit(1707461846.216:353): pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:28.372809 sshd[1990]: Failed password for root from 218.92.0.34 port 63567 ssh2 Feb 9 06:57:28.589282 sshd[1990]: Received disconnect from 218.92.0.34 port 63567:11: [preauth] Feb 9 06:57:28.589282 sshd[1990]: Disconnected from authenticating user root 218.92.0.34 port 63567 [preauth] Feb 9 06:57:28.590057 sshd[1990]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 9 06:57:28.592035 systemd[1]: sshd@59-139.178.91.169:22-218.92.0.34:63567.service: Deactivated successfully. Feb 9 06:57:28.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-218.92.0.34:63567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:28.684562 kernel: audit: type=1131 audit(1707461848.591:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.91.169:22-218.92.0.34:63567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:28.748763 systemd[1]: Started sshd@61-139.178.91.169:22-218.92.0.34:62056.service. Feb 9 06:57:28.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.91.169:22-218.92.0.34:62056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:28.841568 kernel: audit: type=1130 audit(1707461848.747:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.91.169:22-218.92.0.34:62056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:29.782290 sshd[1998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 9 06:57:29.781000 audit[1998]: USER_AUTH pid=1998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:29.873554 kernel: audit: type=1100 audit(1707461849.781:356): pid=1998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:31.680771 sshd[1998]: Failed password for root from 218.92.0.34 port 62056 ssh2 Feb 9 06:57:32.156000 audit[1998]: USER_AUTH pid=1998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:32.249551 kernel: audit: type=1100 audit(1707461852.156:357): pid=1998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:34.803665 sshd[1998]: Failed password for root from 218.92.0.34 port 62056 ssh2 Feb 9 06:57:36.749000 audit[1998]: USER_AUTH pid=1998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:36.842369 kernel: audit: type=1100 audit(1707461856.749:358): pid=1998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:38.944776 sshd[1998]: Failed password for root from 218.92.0.34 port 62056 ssh2 Feb 9 06:57:39.124814 sshd[1998]: Received disconnect from 218.92.0.34 port 62056:11: [preauth] Feb 9 06:57:39.124814 sshd[1998]: Disconnected from authenticating user root 218.92.0.34 port 62056 [preauth] Feb 9 06:57:39.125343 sshd[1998]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 9 06:57:39.127288 systemd[1]: sshd@61-139.178.91.169:22-218.92.0.34:62056.service: Deactivated successfully. Feb 9 06:57:39.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.91.169:22-218.92.0.34:62056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:39.220560 kernel: audit: type=1131 audit(1707461859.126:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.91.169:22-218.92.0.34:62056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:39.258842 systemd[1]: Started sshd@62-139.178.91.169:22-218.92.0.34:25670.service. Feb 9 06:57:39.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.91.169:22-218.92.0.34:25670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:39.350566 kernel: audit: type=1130 audit(1707461859.257:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.91.169:22-218.92.0.34:25670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:40.212664 sshd[2002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 9 06:57:40.211000 audit[2002]: USER_AUTH pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:40.305560 kernel: audit: type=1100 audit(1707461860.211:361): pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:41.956258 sshd[2002]: Failed password for root from 218.92.0.34 port 25670 ssh2 Feb 9 06:57:42.574000 audit[2002]: USER_AUTH pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:42.666441 kernel: audit: type=1100 audit(1707461862.574:362): pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:44.593877 sshd[2002]: Failed password for root from 218.92.0.34 port 25670 ssh2 Feb 9 06:57:44.935000 audit[2002]: USER_AUTH pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:45.028563 kernel: audit: type=1100 audit(1707461864.935:363): pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 9 06:57:47.562733 sshd[2002]: Failed password for root from 218.92.0.34 port 25670 ssh2 Feb 9 06:57:49.516065 sshd[2002]: Received disconnect from 218.92.0.34 port 25670:11: [preauth] Feb 9 06:57:49.516065 sshd[2002]: Disconnected from authenticating user root 218.92.0.34 port 25670 [preauth] Feb 9 06:57:49.516619 sshd[2002]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 9 06:57:49.518608 systemd[1]: sshd@62-139.178.91.169:22-218.92.0.34:25670.service: Deactivated successfully. Feb 9 06:57:49.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.91.169:22-218.92.0.34:25670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:49.611435 kernel: audit: type=1131 audit(1707461869.518:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.91.169:22-218.92.0.34:25670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:59.624342 sshd[1970]: Timeout before authentication for 101.43.123.18 port 44678 Feb 9 06:57:59.625860 systemd[1]: sshd@56-139.178.91.169:22-101.43.123.18:44678.service: Deactivated successfully. Feb 9 06:57:59.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-101.43.123.18:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:57:59.719570 kernel: audit: type=1131 audit(1707461879.624:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.91.169:22-101.43.123.18:44678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:58:54.556668 systemd[1]: Started sshd@63-139.178.91.169:22-101.43.123.18:45092.service. Feb 9 06:58:54.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.91.169:22-101.43.123.18:45092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:58:54.649564 kernel: audit: type=1130 audit(1707461934.555:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.91.169:22-101.43.123.18:45092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:58:56.045210 sshd[2008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 user=root Feb 9 06:58:56.044000 audit[2008]: USER_AUTH pid=2008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:58:56.137551 kernel: audit: type=1100 audit(1707461936.044:367): pid=2008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 06:58:58.556548 sshd[2008]: Failed password for root from 101.43.123.18 port 45092 ssh2 Feb 9 06:59:00.614416 sshd[2008]: Received disconnect from 101.43.123.18 port 45092:11: Bye Bye [preauth] Feb 9 06:59:00.614416 sshd[2008]: Disconnected from authenticating user root 101.43.123.18 port 45092 [preauth] Feb 9 06:59:00.616872 systemd[1]: sshd@63-139.178.91.169:22-101.43.123.18:45092.service: Deactivated successfully. Feb 9 06:59:00.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.91.169:22-101.43.123.18:45092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:59:00.710568 kernel: audit: type=1131 audit(1707461940.616:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.91.169:22-101.43.123.18:45092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:02.471375 systemd[1]: Started sshd@64-139.178.91.169:22-202.165.16.209:50992.service. Feb 9 07:00:02.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.91.169:22-202.165.16.209:50992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:02.564567 kernel: audit: type=1130 audit(1707462002.471:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.91.169:22-202.165.16.209:50992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:04.487166 sshd[2012]: Invalid user admin from 202.165.16.209 port 50992 Feb 9 07:00:04.493316 sshd[2012]: pam_faillock(sshd:auth): User unknown Feb 9 07:00:04.494352 sshd[2012]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:00:04.494469 sshd[2012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.16.209 Feb 9 07:00:04.495434 sshd[2012]: pam_faillock(sshd:auth): User unknown Feb 9 07:00:04.494000 audit[2012]: USER_AUTH pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=202.165.16.209 addr=202.165.16.209 terminal=ssh res=failed' Feb 9 07:00:04.588555 kernel: audit: type=1100 audit(1707462004.494:370): pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=202.165.16.209 addr=202.165.16.209 terminal=ssh res=failed' Feb 9 07:00:06.338770 sshd[2012]: Failed password for invalid user admin from 202.165.16.209 port 50992 ssh2 Feb 9 07:00:07.088694 sshd[2014]: pam_faillock(sshd:auth): User unknown Feb 9 07:00:07.094663 sshd[2012]: Postponed keyboard-interactive for invalid user admin from 202.165.16.209 port 50992 ssh2 [preauth] Feb 9 07:00:07.577628 sshd[2014]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:00:07.578831 sshd[2014]: pam_faillock(sshd:auth): User unknown Feb 9 07:00:07.577000 audit[2014]: USER_AUTH pid=2014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=202.165.16.209 addr=202.165.16.209 terminal=ssh res=failed' Feb 9 07:00:07.671416 kernel: audit: type=1100 audit(1707462007.577:371): pid=2014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=202.165.16.209 addr=202.165.16.209 terminal=ssh res=failed' Feb 9 07:00:09.503061 sshd[2012]: PAM: Permission denied for illegal user admin from 202.165.16.209 Feb 9 07:00:09.504047 sshd[2012]: Failed keyboard-interactive/pam for invalid user admin from 202.165.16.209 port 50992 ssh2 Feb 9 07:00:09.930945 sshd[2012]: Connection closed by invalid user admin 202.165.16.209 port 50992 [preauth] Feb 9 07:00:09.933510 systemd[1]: sshd@64-139.178.91.169:22-202.165.16.209:50992.service: Deactivated successfully. Feb 9 07:00:09.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.91.169:22-202.165.16.209:50992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:10.026562 kernel: audit: type=1131 audit(1707462009.932:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.91.169:22-202.165.16.209:50992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:32.798980 systemd[1]: Started sshd@65-139.178.91.169:22-101.43.123.18:58984.service. Feb 9 07:00:32.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-101.43.123.18:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:32.891422 kernel: audit: type=1130 audit(1707462032.798:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-101.43.123.18:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:34.283126 sshd[2017]: Invalid user cx from 101.43.123.18 port 58984 Feb 9 07:00:34.284318 sshd[2017]: pam_faillock(sshd:auth): User unknown Feb 9 07:00:34.284522 sshd[2017]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:00:34.284539 sshd[2017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 Feb 9 07:00:34.284711 sshd[2017]: pam_faillock(sshd:auth): User unknown Feb 9 07:00:34.284000 audit[2017]: USER_AUTH pid=2017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cx" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 07:00:34.377559 kernel: audit: type=1100 audit(1707462034.284:374): pid=2017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cx" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 07:00:36.248738 sshd[2017]: Failed password for invalid user cx from 101.43.123.18 port 58984 ssh2 Feb 9 07:00:37.703483 sshd[2017]: Received disconnect from 101.43.123.18 port 58984:11: Bye Bye [preauth] Feb 9 07:00:37.703483 sshd[2017]: Disconnected from invalid user cx 101.43.123.18 port 58984 [preauth] Feb 9 07:00:37.706023 systemd[1]: sshd@65-139.178.91.169:22-101.43.123.18:58984.service: Deactivated successfully. Feb 9 07:00:37.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-101.43.123.18:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:00:37.799559 kernel: audit: type=1131 audit(1707462037.706:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.91.169:22-101.43.123.18:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:02:03.197164 systemd[1]: Started sshd@66-139.178.91.169:22-101.43.123.18:44936.service. Feb 9 07:02:03.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-101.43.123.18:44936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:02:03.288422 kernel: audit: type=1130 audit(1707462123.196:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-101.43.123.18:44936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:02:59.952208 systemd[1]: Started sshd@67-139.178.91.169:22-218.92.0.33:57980.service. Feb 9 07:02:59.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-218.92.0.33:57980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:00.044549 kernel: audit: type=1130 audit(1707462179.950:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-218.92.0.33:57980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:00.100498 sshd[2028]: Unable to negotiate with 218.92.0.33 port 57980: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 07:03:00.100998 systemd[1]: sshd@67-139.178.91.169:22-218.92.0.33:57980.service: Deactivated successfully. Feb 9 07:03:00.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-218.92.0.33:57980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:00.192560 kernel: audit: type=1131 audit(1707462180.099:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.91.169:22-218.92.0.33:57980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:28.303312 systemd[1]: Started sshd@68-139.178.91.169:22-101.43.123.18:59142.service. Feb 9 07:03:28.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-101.43.123.18:59142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:03:28.396560 kernel: audit: type=1130 audit(1707462208.303:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-101.43.123.18:59142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:03.204176 sshd[2023]: Timeout before authentication for 101.43.123.18 port 44936 Feb 9 07:04:03.205624 systemd[1]: sshd@66-139.178.91.169:22-101.43.123.18:44936.service: Deactivated successfully. Feb 9 07:04:03.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-101.43.123.18:44936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:03.299585 kernel: audit: type=1131 audit(1707462243.204:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.91.169:22-101.43.123.18:44936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:53.574667 systemd[1]: Started sshd@69-139.178.91.169:22-101.43.123.18:45228.service. Feb 9 07:04:53.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-101.43.123.18:45228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:53.667370 kernel: audit: type=1130 audit(1707462293.573:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-101.43.123.18:45228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:54.354612 sshd[2038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.123.18 user=root Feb 9 07:04:54.353000 audit[2038]: USER_AUTH pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 07:04:54.447550 kernel: audit: type=1100 audit(1707462294.353:382): pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.123.18 addr=101.43.123.18 terminal=ssh res=failed' Feb 9 07:04:56.680085 sshd[2038]: Failed password for root from 101.43.123.18 port 45228 ssh2 Feb 9 07:04:58.917609 sshd[2038]: Received disconnect from 101.43.123.18 port 45228:11: Bye Bye [preauth] Feb 9 07:04:58.917609 sshd[2038]: Disconnected from authenticating user root 101.43.123.18 port 45228 [preauth] Feb 9 07:04:58.920034 systemd[1]: sshd@69-139.178.91.169:22-101.43.123.18:45228.service: Deactivated successfully. Feb 9 07:04:58.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-101.43.123.18:45228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:04:59.013560 kernel: audit: type=1131 audit(1707462298.920:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.91.169:22-101.43.123.18:45228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:28.308642 sshd[2032]: Timeout before authentication for 101.43.123.18 port 59142 Feb 9 07:05:28.310112 systemd[1]: sshd@68-139.178.91.169:22-101.43.123.18:59142.service: Deactivated successfully. Feb 9 07:05:28.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-101.43.123.18:59142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:05:28.403571 kernel: audit: type=1131 audit(1707462328.310:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.91.169:22-101.43.123.18:59142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:04.701295 systemd[1]: Started sshd@70-139.178.91.169:22-115.241.16.251:54031.service. Feb 9 07:11:04.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-115.241.16.251:54031 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:04.792442 kernel: audit: type=1130 audit(1707462664.700:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-115.241.16.251:54031 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:07.058459 sshd[2048]: Invalid user test from 115.241.16.251 port 54031 Feb 9 07:11:07.064501 sshd[2048]: pam_faillock(sshd:auth): User unknown Feb 9 07:11:07.065639 sshd[2048]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:11:07.065729 sshd[2048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.16.251 Feb 9 07:11:07.066773 sshd[2048]: pam_faillock(sshd:auth): User unknown Feb 9 07:11:07.065000 audit[2048]: USER_AUTH pid=2048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=115.241.16.251 addr=115.241.16.251 terminal=ssh res=failed' Feb 9 07:11:07.160571 kernel: audit: type=1100 audit(1707462667.065:386): pid=2048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=115.241.16.251 addr=115.241.16.251 terminal=ssh res=failed' Feb 9 07:11:09.597634 sshd[2048]: Failed password for invalid user test from 115.241.16.251 port 54031 ssh2 Feb 9 07:11:10.733330 sshd[2050]: pam_faillock(sshd:auth): User unknown Feb 9 07:11:10.736775 sshd[2048]: Postponed keyboard-interactive for invalid user test from 115.241.16.251 port 54031 ssh2 [preauth] Feb 9 07:11:11.301101 sshd[2050]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:11:11.302280 sshd[2050]: pam_faillock(sshd:auth): User unknown Feb 9 07:11:11.301000 audit[2050]: USER_AUTH pid=2050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=115.241.16.251 addr=115.241.16.251 terminal=ssh res=failed' Feb 9 07:11:11.395443 kernel: audit: type=1100 audit(1707462671.301:387): pid=2050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=115.241.16.251 addr=115.241.16.251 terminal=ssh res=failed' Feb 9 07:11:12.910444 sshd[2048]: PAM: Permission denied for illegal user test from 115.241.16.251 Feb 9 07:11:12.911242 sshd[2048]: Failed keyboard-interactive/pam for invalid user test from 115.241.16.251 port 54031 ssh2 Feb 9 07:11:13.457283 sshd[2048]: Connection closed by invalid user test 115.241.16.251 port 54031 [preauth] Feb 9 07:11:13.459913 systemd[1]: sshd@70-139.178.91.169:22-115.241.16.251:54031.service: Deactivated successfully. Feb 9 07:11:13.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-115.241.16.251:54031 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:11:13.553564 kernel: audit: type=1131 audit(1707462673.459:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.91.169:22-115.241.16.251:54031 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:21.195156 systemd[1]: Started sshd@71-139.178.91.169:22-218.92.0.113:30085.service. Feb 9 07:12:21.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-218.92.0.113:30085 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:21.288562 kernel: audit: type=1130 audit(1707462741.193:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-218.92.0.113:30085 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:22.107107 sshd[2057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:12:22.106000 audit[2057]: USER_AUTH pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:22.199550 kernel: audit: type=1100 audit(1707462742.106:390): pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:23.931286 sshd[2057]: Failed password for root from 218.92.0.113 port 30085 ssh2 Feb 9 07:12:24.459000 audit[2057]: USER_AUTH pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:24.553553 kernel: audit: type=1100 audit(1707462744.459:391): pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:26.228595 sshd[2057]: Failed password for root from 218.92.0.113 port 30085 ssh2 Feb 9 07:12:27.169000 audit[2057]: USER_AUTH pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:27.262555 kernel: audit: type=1100 audit(1707462747.169:392): pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:29.349917 sshd[2057]: Failed password for root from 218.92.0.113 port 30085 ssh2 Feb 9 07:12:29.523941 sshd[2057]: Received disconnect from 218.92.0.113 port 30085:11: [preauth] Feb 9 07:12:29.523941 sshd[2057]: Disconnected from authenticating user root 218.92.0.113 port 30085 [preauth] Feb 9 07:12:29.524480 sshd[2057]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:12:29.526527 systemd[1]: sshd@71-139.178.91.169:22-218.92.0.113:30085.service: Deactivated successfully. Feb 9 07:12:29.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-218.92.0.113:30085 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:29.619431 kernel: audit: type=1131 audit(1707462749.526:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.91.169:22-218.92.0.113:30085 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:29.677946 systemd[1]: Started sshd@72-139.178.91.169:22-218.92.0.113:27106.service. Feb 9 07:12:29.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-218.92.0.113:27106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:29.771566 kernel: audit: type=1130 audit(1707462749.677:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-218.92.0.113:27106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:30.853808 sshd[2066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:12:30.853000 audit[2066]: USER_AUTH pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:30.946582 kernel: audit: type=1100 audit(1707462750.853:395): pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:32.778101 sshd[2066]: Failed password for root from 218.92.0.113 port 27106 ssh2 Feb 9 07:12:33.215000 audit[2066]: ANOM_LOGIN_FAILURES pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:33.216223 sshd[2066]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 07:12:33.215000 audit[2066]: USER_AUTH pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:33.371872 kernel: audit: type=2100 audit(1707462753.215:396): pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:33.371908 kernel: audit: type=1100 audit(1707462753.215:397): pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:35.551884 sshd[2066]: Failed password for root from 218.92.0.113 port 27106 ssh2 Feb 9 07:12:37.794000 audit[2066]: USER_AUTH pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:37.887552 kernel: audit: type=1100 audit(1707462757.794:398): pid=2066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:39.347962 sshd[2066]: Failed password for root from 218.92.0.113 port 27106 ssh2 Feb 9 07:12:40.157619 sshd[2066]: Received disconnect from 218.92.0.113 port 27106:11: [preauth] Feb 9 07:12:40.157619 sshd[2066]: Disconnected from authenticating user root 218.92.0.113 port 27106 [preauth] Feb 9 07:12:40.158076 sshd[2066]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:12:40.160068 systemd[1]: sshd@72-139.178.91.169:22-218.92.0.113:27106.service: Deactivated successfully. Feb 9 07:12:40.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-218.92.0.113:27106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:40.253587 kernel: audit: type=1131 audit(1707462760.159:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.91.169:22-218.92.0.113:27106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:40.304786 systemd[1]: Started sshd@73-139.178.91.169:22-218.92.0.113:32949.service. Feb 9 07:12:40.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-218.92.0.113:32949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:40.397369 kernel: audit: type=1130 audit(1707462760.303:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-218.92.0.113:32949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:41.662604 sshd[2070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:12:41.661000 audit[2070]: USER_AUTH pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:41.755551 kernel: audit: type=1100 audit(1707462761.661:401): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:43.762630 sshd[2070]: Failed password for root from 218.92.0.113 port 32949 ssh2 Feb 9 07:12:44.023000 audit[2070]: USER_AUTH pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:44.117557 kernel: audit: type=1100 audit(1707462764.023:402): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:46.204697 sshd[2070]: Failed password for root from 218.92.0.113 port 32949 ssh2 Feb 9 07:12:46.385000 audit[2070]: USER_AUTH pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:46.479553 kernel: audit: type=1100 audit(1707462766.385:403): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:12:48.175561 sshd[2070]: Failed password for root from 218.92.0.113 port 32949 ssh2 Feb 9 07:12:48.749000 sshd[2070]: Received disconnect from 218.92.0.113 port 32949:11: [preauth] Feb 9 07:12:48.749000 sshd[2070]: Disconnected from authenticating user root 218.92.0.113 port 32949 [preauth] Feb 9 07:12:48.749484 sshd[2070]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:12:48.751470 systemd[1]: sshd@73-139.178.91.169:22-218.92.0.113:32949.service: Deactivated successfully. Feb 9 07:12:48.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-218.92.0.113:32949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:48.844433 kernel: audit: type=1131 audit(1707462768.750:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.91.169:22-218.92.0.113:32949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:54.666951 systemd[1]: Started sshd@74-139.178.91.169:22-218.92.0.56:38430.service. Feb 9 07:12:54.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-218.92.0.56:38430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:54.759419 kernel: audit: type=1130 audit(1707462774.665:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-218.92.0.56:38430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:12:56.149532 sshd[2075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 07:12:56.148000 audit[2075]: USER_AUTH pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:12:56.241425 kernel: audit: type=1100 audit(1707462776.148:406): pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:12:58.309630 sshd[2075]: Failed password for root from 218.92.0.56 port 38430 ssh2 Feb 9 07:12:58.524000 audit[2075]: USER_AUTH pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:12:58.616424 kernel: audit: type=1100 audit(1707462778.524:407): pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:00.292649 sshd[2075]: Failed password for root from 218.92.0.56 port 38430 ssh2 Feb 9 07:13:00.907000 audit[2075]: USER_AUTH pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:01.000552 kernel: audit: type=1100 audit(1707462780.907:408): pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:02.616309 sshd[2075]: Failed password for root from 218.92.0.56 port 38430 ssh2 Feb 9 07:13:03.298148 sshd[2075]: Received disconnect from 218.92.0.56 port 38430:11: [preauth] Feb 9 07:13:03.298148 sshd[2075]: Disconnected from authenticating user root 218.92.0.56 port 38430 [preauth] Feb 9 07:13:03.298708 sshd[2075]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 07:13:03.300728 systemd[1]: sshd@74-139.178.91.169:22-218.92.0.56:38430.service: Deactivated successfully. Feb 9 07:13:03.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-218.92.0.56:38430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:03.394573 kernel: audit: type=1131 audit(1707462783.300:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.91.169:22-218.92.0.56:38430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:03.487954 systemd[1]: Started sshd@75-139.178.91.169:22-218.92.0.56:32283.service. Feb 9 07:13:03.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-218.92.0.56:32283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:03.580432 kernel: audit: type=1130 audit(1707462783.487:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-218.92.0.56:32283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:04.607274 sshd[2080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 07:13:04.607000 audit[2080]: USER_AUTH pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:04.699551 kernel: audit: type=1100 audit(1707462784.607:411): pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:06.531704 sshd[2080]: Failed password for root from 218.92.0.56 port 32283 ssh2 Feb 9 07:13:07.001000 audit[2080]: USER_AUTH pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:07.093543 kernel: audit: type=1100 audit(1707462787.001:412): pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:09.337505 sshd[2080]: Failed password for root from 218.92.0.56 port 32283 ssh2 Feb 9 07:13:11.603000 audit[2080]: USER_AUTH pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:11.696561 kernel: audit: type=1100 audit(1707462791.603:413): pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:13.157392 sshd[2080]: Failed password for root from 218.92.0.56 port 32283 ssh2 Feb 9 07:13:13.990695 sshd[2080]: Received disconnect from 218.92.0.56 port 32283:11: [preauth] Feb 9 07:13:13.990695 sshd[2080]: Disconnected from authenticating user root 218.92.0.56 port 32283 [preauth] Feb 9 07:13:13.991211 sshd[2080]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 07:13:13.993252 systemd[1]: sshd@75-139.178.91.169:22-218.92.0.56:32283.service: Deactivated successfully. Feb 9 07:13:13.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-218.92.0.56:32283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:14.086560 kernel: audit: type=1131 audit(1707462793.992:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.91.169:22-218.92.0.56:32283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:14.150575 systemd[1]: Started sshd@76-139.178.91.169:22-218.92.0.56:36288.service. Feb 9 07:13:14.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-218.92.0.56:36288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:14.241423 kernel: audit: type=1130 audit(1707462794.149:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-218.92.0.56:36288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:15.274498 sshd[2084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 07:13:15.273000 audit[2084]: USER_AUTH pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:15.366554 kernel: audit: type=1100 audit(1707462795.273:416): pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:17.710456 sshd[2084]: Failed password for root from 218.92.0.56 port 36288 ssh2 Feb 9 07:13:19.874000 audit[2084]: USER_AUTH pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:19.968403 kernel: audit: type=1100 audit(1707462799.874:417): pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:21.528634 sshd[2084]: Failed password for root from 218.92.0.56 port 36288 ssh2 Feb 9 07:13:22.268000 audit[2084]: USER_AUTH pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:22.362553 kernel: audit: type=1100 audit(1707462802.268:418): pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 07:13:23.666661 sshd[2084]: Failed password for root from 218.92.0.56 port 36288 ssh2 Feb 9 07:13:24.650833 sshd[2084]: Received disconnect from 218.92.0.56 port 36288:11: [preauth] Feb 9 07:13:24.650833 sshd[2084]: Disconnected from authenticating user root 218.92.0.56 port 36288 [preauth] Feb 9 07:13:24.651432 sshd[2084]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 07:13:24.653437 systemd[1]: sshd@76-139.178.91.169:22-218.92.0.56:36288.service: Deactivated successfully. Feb 9 07:13:24.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-218.92.0.56:36288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:13:24.746560 kernel: audit: type=1131 audit(1707462804.652:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.91.169:22-218.92.0.56:36288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:14:19.652243 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:14:19.651Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1315} Feb 9 07:14:19.671758 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:14:19.671Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1315,"took":"19.184919ms"} Feb 9 07:15:26.726972 systemd[1]: Started sshd@77-139.178.91.169:22-218.92.0.53:15596.service. Feb 9 07:15:26.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-218.92.0.53:15596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:26.819370 kernel: audit: type=1130 audit(1707462926.726:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-218.92.0.53:15596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:26.884289 sshd[2088]: Unable to negotiate with 218.92.0.53 port 15596: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 07:15:26.886162 systemd[1]: sshd@77-139.178.91.169:22-218.92.0.53:15596.service: Deactivated successfully. Feb 9 07:15:26.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-218.92.0.53:15596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:26.985571 kernel: audit: type=1131 audit(1707462926.885:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.91.169:22-218.92.0.53:15596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:39.617926 systemd[1]: Started sshd@78-139.178.91.169:22-218.92.0.25:27569.service. Feb 9 07:15:39.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-218.92.0.25:27569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:39.710398 kernel: audit: type=1130 audit(1707462939.616:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-218.92.0.25:27569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:40.581245 sshd[2092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 07:15:40.580000 audit[2092]: USER_AUTH pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:40.673556 kernel: audit: type=1100 audit(1707462940.580:423): pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:42.254764 sshd[2092]: Failed password for root from 218.92.0.25 port 27569 ssh2 Feb 9 07:15:42.942000 audit[2092]: USER_AUTH pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:43.036544 kernel: audit: type=1100 audit(1707462942.942:424): pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:44.556772 sshd[2092]: Failed password for root from 218.92.0.25 port 27569 ssh2 Feb 9 07:15:45.307000 audit[2092]: USER_AUTH pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:45.399552 kernel: audit: type=1100 audit(1707462945.307:425): pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:47.667068 sshd[2092]: Failed password for root from 218.92.0.25 port 27569 ssh2 Feb 9 07:15:49.888822 sshd[2092]: Received disconnect from 218.92.0.25 port 27569:11: [preauth] Feb 9 07:15:49.888822 sshd[2092]: Disconnected from authenticating user root 218.92.0.25 port 27569 [preauth] Feb 9 07:15:49.889347 sshd[2092]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 07:15:49.891415 systemd[1]: sshd@78-139.178.91.169:22-218.92.0.25:27569.service: Deactivated successfully. Feb 9 07:15:49.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-218.92.0.25:27569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:49.984565 kernel: audit: type=1131 audit(1707462949.891:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.91.169:22-218.92.0.25:27569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:50.043469 systemd[1]: Started sshd@79-139.178.91.169:22-218.92.0.25:31434.service. Feb 9 07:15:50.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-218.92.0.25:31434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:50.136469 kernel: audit: type=1130 audit(1707462950.043:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-218.92.0.25:31434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:51.035516 sshd[2096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 07:15:51.035000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:51.127421 kernel: audit: type=1100 audit(1707462951.035:428): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:53.219789 sshd[2096]: Failed password for root from 218.92.0.25 port 31434 ssh2 Feb 9 07:15:53.402000 audit[2096]: ANOM_LOGIN_FAILURES pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:53.403076 sshd[2096]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 07:15:53.402000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:53.558707 kernel: audit: type=2100 audit(1707462953.402:429): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:15:53.558742 kernel: audit: type=1100 audit(1707462953.402:430): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:54.860470 sshd[2096]: Failed password for root from 218.92.0.25 port 31434 ssh2 Feb 9 07:15:55.770000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:55.862531 kernel: audit: type=1100 audit(1707462955.770:431): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:15:58.171149 sshd[2096]: Failed password for root from 218.92.0.25 port 31434 ssh2 Feb 9 07:16:00.359386 sshd[2096]: Received disconnect from 218.92.0.25 port 31434:11: [preauth] Feb 9 07:16:00.359386 sshd[2096]: Disconnected from authenticating user root 218.92.0.25 port 31434 [preauth] Feb 9 07:16:00.359892 sshd[2096]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 07:16:00.361919 systemd[1]: sshd@79-139.178.91.169:22-218.92.0.25:31434.service: Deactivated successfully. Feb 9 07:16:00.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-218.92.0.25:31434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:16:00.455427 kernel: audit: type=1131 audit(1707462960.361:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.91.169:22-218.92.0.25:31434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:16:01.530399 systemd[1]: Started sshd@80-139.178.91.169:22-218.92.0.25:42205.service. Feb 9 07:16:01.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-218.92.0.25:42205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:16:01.623421 kernel: audit: type=1130 audit(1707462961.529:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-218.92.0.25:42205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:16:02.565313 sshd[2101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 07:16:02.564000 audit[2101]: USER_AUTH pid=2101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:16:02.657370 kernel: audit: type=1100 audit(1707462962.564:434): pid=2101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:16:04.258778 sshd[2101]: Failed password for root from 218.92.0.25 port 42205 ssh2 Feb 9 07:16:04.940000 audit[2101]: USER_AUTH pid=2101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:16:05.033551 kernel: audit: type=1100 audit(1707462964.940:435): pid=2101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:16:06.574892 sshd[2101]: Failed password for root from 218.92.0.25 port 42205 ssh2 Feb 9 07:16:07.318000 audit[2101]: USER_AUTH pid=2101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:16:07.411546 kernel: audit: type=1100 audit(1707462967.318:436): pid=2101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 07:16:09.368470 sshd[2101]: Failed password for root from 218.92.0.25 port 42205 ssh2 Feb 9 07:16:09.694078 sshd[2101]: Received disconnect from 218.92.0.25 port 42205:11: [preauth] Feb 9 07:16:09.694078 sshd[2101]: Disconnected from authenticating user root 218.92.0.25 port 42205 [preauth] Feb 9 07:16:09.694632 sshd[2101]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 07:16:09.696699 systemd[1]: sshd@80-139.178.91.169:22-218.92.0.25:42205.service: Deactivated successfully. Feb 9 07:16:09.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-218.92.0.25:42205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:16:09.789543 kernel: audit: type=1131 audit(1707462969.695:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.91.169:22-218.92.0.25:42205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:57.394320 systemd[1]: Started sshd@81-139.178.91.169:22-85.209.11.27:55276.service. Feb 9 07:18:57.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-85.209.11.27:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:18:57.487566 kernel: audit: type=1130 audit(1707463137.393:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-85.209.11.27:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:19:00.142398 sshd[2109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.27 user=root Feb 9 07:19:00.141000 audit[2109]: USER_AUTH pid=2109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 9 07:19:00.235552 kernel: audit: type=1100 audit(1707463140.141:439): pid=2109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 9 07:19:02.272489 sshd[2109]: Failed password for root from 85.209.11.27 port 55276 ssh2 Feb 9 07:19:02.585325 sshd[2109]: Connection closed by authenticating user root 85.209.11.27 port 55276 [preauth] Feb 9 07:19:02.587889 systemd[1]: sshd@81-139.178.91.169:22-85.209.11.27:55276.service: Deactivated successfully. Feb 9 07:19:02.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-85.209.11.27:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:19:02.681572 kernel: audit: type=1131 audit(1707463142.586:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.91.169:22-85.209.11.27:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:19:19.654706 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:19:19.654Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1874} Feb 9 07:19:19.670212 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:19:19.669Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1874,"took":"14.82685ms"} Feb 9 07:21:38.446770 systemd[1]: Started sshd@82-139.178.91.169:22-180.101.88.197:46233.service. Feb 9 07:21:38.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-180.101.88.197:46233 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:38.539386 kernel: audit: type=1130 audit(1707463298.445:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-180.101.88.197:46233 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:39.444046 sshd[2118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 07:21:39.442000 audit[2118]: USER_AUTH pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:39.537556 kernel: audit: type=1100 audit(1707463299.442:442): pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:41.403271 sshd[2118]: Failed password for root from 180.101.88.197 port 46233 ssh2 Feb 9 07:21:41.804000 audit[2118]: USER_AUTH pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:41.897549 kernel: audit: type=1100 audit(1707463301.804:443): pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:43.705227 sshd[2118]: Failed password for root from 180.101.88.197 port 46233 ssh2 Feb 9 07:21:44.168000 audit[2118]: USER_AUTH pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:44.261547 kernel: audit: type=1100 audit(1707463304.168:444): pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:45.811576 sshd[2118]: Failed password for root from 180.101.88.197 port 46233 ssh2 Feb 9 07:21:46.530981 sshd[2118]: Received disconnect from 180.101.88.197 port 46233:11: [preauth] Feb 9 07:21:46.530981 sshd[2118]: Disconnected from authenticating user root 180.101.88.197 port 46233 [preauth] Feb 9 07:21:46.531715 sshd[2118]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 07:21:46.533722 systemd[1]: sshd@82-139.178.91.169:22-180.101.88.197:46233.service: Deactivated successfully. Feb 9 07:21:46.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-180.101.88.197:46233 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:46.627432 kernel: audit: type=1131 audit(1707463306.532:445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.91.169:22-180.101.88.197:46233 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:46.707190 systemd[1]: Started sshd@83-139.178.91.169:22-180.101.88.197:45658.service. Feb 9 07:21:46.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-180.101.88.197:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:46.800438 kernel: audit: type=1130 audit(1707463306.706:446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-180.101.88.197:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:47.740822 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 07:21:47.740000 audit[2123]: USER_AUTH pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:47.834551 kernel: audit: type=1100 audit(1707463307.740:447): pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:49.464150 sshd[2123]: Failed password for root from 180.101.88.197 port 45658 ssh2 Feb 9 07:21:50.114000 audit[2123]: ANOM_LOGIN_FAILURES pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:50.114751 sshd[2123]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 07:21:50.114000 audit[2123]: USER_AUTH pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:50.270962 kernel: audit: type=2100 audit(1707463310.114:448): pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:50.270995 kernel: audit: type=1100 audit(1707463310.114:449): pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:52.249644 sshd[2123]: Failed password for root from 180.101.88.197 port 45658 ssh2 Feb 9 07:21:52.488000 audit[2123]: USER_AUTH pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:52.581388 kernel: audit: type=1100 audit(1707463312.488:450): pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:54.898763 sshd[2123]: Failed password for root from 180.101.88.197 port 45658 ssh2 Feb 9 07:21:57.092808 sshd[2123]: Received disconnect from 180.101.88.197 port 45658:11: [preauth] Feb 9 07:21:57.092808 sshd[2123]: Disconnected from authenticating user root 180.101.88.197 port 45658 [preauth] Feb 9 07:21:57.093355 sshd[2123]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 07:21:57.095355 systemd[1]: sshd@83-139.178.91.169:22-180.101.88.197:45658.service: Deactivated successfully. Feb 9 07:21:57.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-180.101.88.197:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:57.189435 kernel: audit: type=1131 audit(1707463317.095:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.91.169:22-180.101.88.197:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:57.260804 systemd[1]: Started sshd@84-139.178.91.169:22-180.101.88.197:58765.service. Feb 9 07:21:57.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-180.101.88.197:58765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:57.353369 kernel: audit: type=1130 audit(1707463317.260:452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-180.101.88.197:58765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:21:58.358785 sshd[2129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 07:21:58.358000 audit[2129]: USER_AUTH pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:21:58.452559 kernel: audit: type=1100 audit(1707463318.358:453): pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:22:00.593730 sshd[2129]: Failed password for root from 180.101.88.197 port 58765 ssh2 Feb 9 07:22:02.948000 audit[2129]: USER_AUTH pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:22:03.042423 kernel: audit: type=1100 audit(1707463322.948:454): pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:22:04.733354 sshd[2129]: Failed password for root from 180.101.88.197 port 58765 ssh2 Feb 9 07:22:05.320000 audit[2129]: USER_AUTH pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:22:05.413552 kernel: audit: type=1100 audit(1707463325.320:455): pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 07:22:06.848445 sshd[2129]: Failed password for root from 180.101.88.197 port 58765 ssh2 Feb 9 07:22:07.692332 sshd[2129]: Received disconnect from 180.101.88.197 port 58765:11: [preauth] Feb 9 07:22:07.692332 sshd[2129]: Disconnected from authenticating user root 180.101.88.197 port 58765 [preauth] Feb 9 07:22:07.692982 sshd[2129]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 07:22:07.695014 systemd[1]: sshd@84-139.178.91.169:22-180.101.88.197:58765.service: Deactivated successfully. Feb 9 07:22:07.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-180.101.88.197:58765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:22:07.788438 kernel: audit: type=1131 audit(1707463327.694:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.91.169:22-180.101.88.197:58765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:24:19.656706 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:24:19.656Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2412} Feb 9 07:24:19.672512 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:24:19.672Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2412,"took":"15.191115ms"} Feb 9 07:25:07.691841 update_engine[1154]: I0209 07:25:07.691730 1154 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 07:25:07.691841 update_engine[1154]: I0209 07:25:07.691807 1154 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 07:25:07.692958 update_engine[1154]: I0209 07:25:07.692528 1154 omaha_request_params.cc:62] Current group set to lts Feb 9 07:25:07.692958 update_engine[1154]: I0209 07:25:07.692720 1154 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 07:25:07.692958 update_engine[1154]: I0209 07:25:07.692737 1154 update_attempter.cc:643] Scheduling an action processor start. Feb 9 07:25:07.692958 update_engine[1154]: I0209 07:25:07.692770 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 07:25:07.693349 update_engine[1154]: I0209 07:25:07.692978 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 07:25:07.693349 update_engine[1154]: I0209 07:25:07.692997 1154 omaha_request_action.cc:271] Request: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: Feb 9 07:25:07.693349 update_engine[1154]: I0209 07:25:07.693008 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:25:07.694376 update_engine[1154]: I0209 07:25:07.693394 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:25:07.694376 update_engine[1154]: E0209 07:25:07.693603 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:25:07.694376 update_engine[1154]: I0209 07:25:07.693717 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 07:25:07.694678 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 07:25:17.595544 update_engine[1154]: I0209 07:25:17.595427 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:25:17.596464 update_engine[1154]: I0209 07:25:17.595856 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:25:17.596464 update_engine[1154]: E0209 07:25:17.596045 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:25:17.596464 update_engine[1154]: I0209 07:25:17.596163 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 07:25:27.602598 update_engine[1154]: I0209 07:25:27.602478 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:25:27.603519 update_engine[1154]: I0209 07:25:27.602891 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:25:27.603519 update_engine[1154]: E0209 07:25:27.603098 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:25:27.603519 update_engine[1154]: I0209 07:25:27.603219 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 07:25:37.602684 update_engine[1154]: I0209 07:25:37.602560 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.602978 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:25:37.603616 update_engine[1154]: E0209 07:25:37.603169 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603277 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603292 1154 omaha_request_action.cc:621] Omaha request response: Feb 9 07:25:37.603616 update_engine[1154]: E0209 07:25:37.603438 1154 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603466 1154 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603475 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603483 1154 update_attempter.cc:306] Processing Done. Feb 9 07:25:37.603616 update_engine[1154]: E0209 07:25:37.603509 1154 update_attempter.cc:619] Update failed. Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603519 1154 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603528 1154 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 07:25:37.603616 update_engine[1154]: I0209 07:25:37.603538 1154 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.603689 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.603742 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.603752 1154 omaha_request_action.cc:271] Request: Feb 9 07:25:37.604900 update_engine[1154]: Feb 9 07:25:37.604900 update_engine[1154]: Feb 9 07:25:37.604900 update_engine[1154]: Feb 9 07:25:37.604900 update_engine[1154]: Feb 9 07:25:37.604900 update_engine[1154]: Feb 9 07:25:37.604900 update_engine[1154]: Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.603761 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604035 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 07:25:37.604900 update_engine[1154]: E0209 07:25:37.604177 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604275 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604288 1154 omaha_request_action.cc:621] Omaha request response: Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604298 1154 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604306 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604314 1154 update_attempter.cc:306] Processing Done. Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604321 1154 update_attempter.cc:310] Error event sent. Feb 9 07:25:37.604900 update_engine[1154]: I0209 07:25:37.604343 1154 update_check_scheduler.cc:74] Next update check in 40m9s Feb 9 07:25:37.606545 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 07:25:37.606545 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 07:27:14.935439 systemd[1]: Started sshd@85-139.178.91.169:22-85.209.11.254:7736.service. Feb 9 07:27:14.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-85.209.11.254:7736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:15.028559 kernel: audit: type=1130 audit(1707463634.934:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-85.209.11.254:7736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:17.132966 sshd[2139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 user=root Feb 9 07:27:17.131000 audit[2139]: USER_AUTH pid=2139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 9 07:27:17.226404 kernel: audit: type=1100 audit(1707463637.131:458): pid=2139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 9 07:27:18.825783 sshd[2139]: Failed password for root from 85.209.11.254 port 7736 ssh2 Feb 9 07:27:19.563440 sshd[2139]: Connection closed by authenticating user root 85.209.11.254 port 7736 [preauth] Feb 9 07:27:19.565975 systemd[1]: sshd@85-139.178.91.169:22-85.209.11.254:7736.service: Deactivated successfully. Feb 9 07:27:19.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-85.209.11.254:7736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:27:19.659386 kernel: audit: type=1131 audit(1707463639.565:459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.91.169:22-85.209.11.254:7736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.104999 systemd[1]: Started sshd@86-139.178.91.169:22-218.92.0.52:16526.service. Feb 9 07:29:06.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-218.92.0.52:16526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:06.198581 kernel: audit: type=1130 audit(1707463746.104:460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-218.92.0.52:16526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:29:19.659160 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:29:19.658Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2949} Feb 9 07:29:19.674139 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:29:19.673Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2949,"took":"14.355809ms"} Feb 9 07:30:25.085345 systemd[1]: Started sshd@87-139.178.91.169:22-218.92.0.29:34853.service. Feb 9 07:30:25.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-218.92.0.29:34853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:25.178413 kernel: audit: type=1130 audit(1707463825.085:461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-218.92.0.29:34853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:26.556562 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 07:30:26.556000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:26.649410 kernel: audit: type=1100 audit(1707463826.556:462): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:28.530821 sshd[2149]: Failed password for root from 218.92.0.29 port 34853 ssh2 Feb 9 07:30:28.933000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:29.026583 kernel: audit: type=1100 audit(1707463828.933:463): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:31.515263 sshd[2149]: Failed password for root from 218.92.0.29 port 34853 ssh2 Feb 9 07:30:33.526000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:33.619427 kernel: audit: type=1100 audit(1707463833.526:464): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:35.792922 sshd[2149]: Failed password for root from 218.92.0.29 port 34853 ssh2 Feb 9 07:30:38.121828 sshd[2149]: Received disconnect from 218.92.0.29 port 34853:11: [preauth] Feb 9 07:30:38.121828 sshd[2149]: Disconnected from authenticating user root 218.92.0.29 port 34853 [preauth] Feb 9 07:30:38.122397 sshd[2149]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 07:30:38.124304 systemd[1]: sshd@87-139.178.91.169:22-218.92.0.29:34853.service: Deactivated successfully. Feb 9 07:30:38.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-218.92.0.29:34853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:38.217410 kernel: audit: type=1131 audit(1707463838.123:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.91.169:22-218.92.0.29:34853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:38.319460 systemd[1]: Started sshd@88-139.178.91.169:22-218.92.0.29:13965.service. Feb 9 07:30:38.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-218.92.0.29:13965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:38.412370 kernel: audit: type=1130 audit(1707463838.318:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-218.92.0.29:13965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:39.479628 sshd[2155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 07:30:39.478000 audit[2155]: USER_AUTH pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:39.572551 kernel: audit: type=1100 audit(1707463839.478:467): pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:41.905273 sshd[2155]: Failed password for root from 218.92.0.29 port 13965 ssh2 Feb 9 07:30:44.093000 audit[2155]: ANOM_LOGIN_FAILURES pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:44.094536 sshd[2155]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 07:30:44.093000 audit[2155]: USER_AUTH pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:44.248741 kernel: audit: type=2100 audit(1707463844.093:468): pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:44.248779 kernel: audit: type=1100 audit(1707463844.093:469): pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:46.204345 sshd[2155]: Failed password for root from 218.92.0.29 port 13965 ssh2 Feb 9 07:30:46.486000 audit[2155]: USER_AUTH pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:46.580430 kernel: audit: type=1100 audit(1707463846.486:470): pid=2155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:48.537614 sshd[2155]: Failed password for root from 218.92.0.29 port 13965 ssh2 Feb 9 07:30:48.882058 sshd[2155]: Received disconnect from 218.92.0.29 port 13965:11: [preauth] Feb 9 07:30:48.882058 sshd[2155]: Disconnected from authenticating user root 218.92.0.29 port 13965 [preauth] Feb 9 07:30:48.882492 sshd[2155]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 07:30:48.884474 systemd[1]: sshd@88-139.178.91.169:22-218.92.0.29:13965.service: Deactivated successfully. Feb 9 07:30:48.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-218.92.0.29:13965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:48.977455 kernel: audit: type=1131 audit(1707463848.883:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.91.169:22-218.92.0.29:13965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:56.062145 systemd[1]: Started sshd@89-139.178.91.169:22-218.92.0.29:56628.service. Feb 9 07:30:56.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-218.92.0.29:56628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:56.155566 kernel: audit: type=1130 audit(1707463856.060:472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-218.92.0.29:56628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:30:57.037964 sshd[2159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 07:30:57.036000 audit[2159]: USER_AUTH pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:57.130419 kernel: audit: type=1100 audit(1707463857.036:473): pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:58.932207 sshd[2159]: Failed password for root from 218.92.0.29 port 56628 ssh2 Feb 9 07:30:59.401000 audit[2159]: USER_AUTH pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:30:59.493549 kernel: audit: type=1100 audit(1707463859.401:474): pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:31:01.570613 sshd[2159]: Failed password for root from 218.92.0.29 port 56628 ssh2 Feb 9 07:31:01.765000 audit[2159]: USER_AUTH pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:31:01.857435 kernel: audit: type=1100 audit(1707463861.765:475): pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 07:31:04.211513 sshd[2159]: Failed password for root from 218.92.0.29 port 56628 ssh2 Feb 9 07:31:06.110358 sshd[2147]: Timeout before authentication for 218.92.0.52 port 16526 Feb 9 07:31:06.111802 systemd[1]: sshd@86-139.178.91.169:22-218.92.0.52:16526.service: Deactivated successfully. Feb 9 07:31:06.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-218.92.0.52:16526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:06.205585 kernel: audit: type=1131 audit(1707463866.111:476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.91.169:22-218.92.0.52:16526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:06.347436 sshd[2159]: Received disconnect from 218.92.0.29 port 56628:11: [preauth] Feb 9 07:31:06.347436 sshd[2159]: Disconnected from authenticating user root 218.92.0.29 port 56628 [preauth] Feb 9 07:31:06.347998 sshd[2159]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 07:31:06.350013 systemd[1]: sshd@89-139.178.91.169:22-218.92.0.29:56628.service: Deactivated successfully. Feb 9 07:31:06.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-218.92.0.29:56628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:06.443567 kernel: audit: type=1131 audit(1707463866.350:477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.91.169:22-218.92.0.29:56628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:17.900319 systemd[1]: Started sshd@90-139.178.91.169:22-218.92.0.113:33509.service. Feb 9 07:31:17.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-218.92.0.113:33509 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:17.993455 kernel: audit: type=1130 audit(1707463877.899:478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-218.92.0.113:33509 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:18.797685 sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:31:18.796000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:18.889543 kernel: audit: type=1100 audit(1707463878.796:479): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:21.243662 sshd[2165]: Failed password for root from 218.92.0.113 port 33509 ssh2 Feb 9 07:31:23.367000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:23.461555 kernel: audit: type=1100 audit(1707463883.367:480): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:25.502555 sshd[2165]: Failed password for root from 218.92.0.113 port 33509 ssh2 Feb 9 07:31:25.719000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:25.813553 kernel: audit: type=1100 audit(1707463885.719:481): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:28.462751 sshd[2165]: Failed password for root from 218.92.0.113 port 33509 ssh2 Feb 9 07:31:30.291704 sshd[2165]: Received disconnect from 218.92.0.113 port 33509:11: [preauth] Feb 9 07:31:30.291704 sshd[2165]: Disconnected from authenticating user root 218.92.0.113 port 33509 [preauth] Feb 9 07:31:30.292220 sshd[2165]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:31:30.294249 systemd[1]: sshd@90-139.178.91.169:22-218.92.0.113:33509.service: Deactivated successfully. Feb 9 07:31:30.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-218.92.0.113:33509 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:30.387563 kernel: audit: type=1131 audit(1707463890.293:482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.91.169:22-218.92.0.113:33509 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:30.452975 systemd[1]: Started sshd@91-139.178.91.169:22-218.92.0.113:57794.service. Feb 9 07:31:30.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-218.92.0.113:57794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:30.545561 kernel: audit: type=1130 audit(1707463890.451:483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-218.92.0.113:57794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:31.430265 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:31:31.429000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:31.522408 kernel: audit: type=1100 audit(1707463891.429:484): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:33.329040 sshd[2169]: Failed password for root from 218.92.0.113 port 57794 ssh2 Feb 9 07:31:33.793000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:33.887555 kernel: audit: type=1100 audit(1707463893.793:485): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:35.301632 sshd[2169]: Failed password for root from 218.92.0.113 port 57794 ssh2 Feb 9 07:31:36.158000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:36.251439 kernel: audit: type=1100 audit(1707463896.158:486): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:38.745894 sshd[2169]: Failed password for root from 218.92.0.113 port 57794 ssh2 Feb 9 07:31:40.742606 sshd[2169]: Received disconnect from 218.92.0.113 port 57794:11: [preauth] Feb 9 07:31:40.742606 sshd[2169]: Disconnected from authenticating user root 218.92.0.113 port 57794 [preauth] Feb 9 07:31:40.743175 sshd[2169]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:31:40.745165 systemd[1]: sshd@91-139.178.91.169:22-218.92.0.113:57794.service: Deactivated successfully. Feb 9 07:31:40.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-218.92.0.113:57794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:40.838561 kernel: audit: type=1131 audit(1707463900.745:487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.91.169:22-218.92.0.113:57794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:40.891037 systemd[1]: Started sshd@92-139.178.91.169:22-218.92.0.113:19160.service. Feb 9 07:31:40.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-218.92.0.113:19160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:40.983563 kernel: audit: type=1130 audit(1707463900.890:488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-218.92.0.113:19160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:41.871266 sshd[2173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:31:41.871000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:41.963555 kernel: audit: type=1100 audit(1707463901.871:489): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:44.140605 sshd[2173]: Failed password for root from 218.92.0.113 port 19160 ssh2 Feb 9 07:31:46.455000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:46.547420 kernel: audit: type=1100 audit(1707463906.455:490): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:48.745847 sshd[2173]: Failed password for root from 218.92.0.113 port 19160 ssh2 Feb 9 07:31:51.040000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:51.134549 kernel: audit: type=1100 audit(1707463911.040:491): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 9 07:31:52.682850 sshd[2173]: Failed password for root from 218.92.0.113 port 19160 ssh2 Feb 9 07:31:53.405722 sshd[2173]: Received disconnect from 218.92.0.113 port 19160:11: [preauth] Feb 9 07:31:53.405722 sshd[2173]: Disconnected from authenticating user root 218.92.0.113 port 19160 [preauth] Feb 9 07:31:53.406270 sshd[2173]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 9 07:31:53.408320 systemd[1]: sshd@92-139.178.91.169:22-218.92.0.113:19160.service: Deactivated successfully. Feb 9 07:31:53.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-218.92.0.113:19160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:31:53.501563 kernel: audit: type=1131 audit(1707463913.408:492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.91.169:22-218.92.0.113:19160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:18.954043 systemd[1]: Started sshd@93-139.178.91.169:22-202.165.16.209:30406.service. Feb 9 07:34:18.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-202.165.16.209:30406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:19.046435 kernel: audit: type=1130 audit(1707464058.952:493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-202.165.16.209:30406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:19.659996 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:34:19.659Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":3612} Feb 9 07:34:19.675862 etcd-wrapper[1395]: {"level":"info","ts":"2024-02-09T07:34:19.675Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":3612,"took":"15.17287ms"} Feb 9 07:34:21.292608 sshd[2183]: Invalid user user from 202.165.16.209 port 30406 Feb 9 07:34:21.298636 sshd[2183]: pam_faillock(sshd:auth): User unknown Feb 9 07:34:21.299869 sshd[2183]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:34:21.299965 sshd[2183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.16.209 Feb 9 07:34:21.300873 sshd[2183]: pam_faillock(sshd:auth): User unknown Feb 9 07:34:21.300000 audit[2183]: USER_AUTH pid=2183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=202.165.16.209 addr=202.165.16.209 terminal=ssh res=failed' Feb 9 07:34:21.393425 kernel: audit: type=1100 audit(1707464061.300:494): pid=2183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=202.165.16.209 addr=202.165.16.209 terminal=ssh res=failed' Feb 9 07:34:23.204487 sshd[2183]: Failed password for invalid user user from 202.165.16.209 port 30406 ssh2 Feb 9 07:34:25.354960 sshd[2183]: Connection closed by invalid user user 202.165.16.209 port 30406 [preauth] Feb 9 07:34:25.357416 systemd[1]: sshd@93-139.178.91.169:22-202.165.16.209:30406.service: Deactivated successfully. Feb 9 07:34:25.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-202.165.16.209:30406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:25.450565 kernel: audit: type=1131 audit(1707464065.357:495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.91.169:22-202.165.16.209:30406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:25.733469 systemd[1]: Started sshd@94-139.178.91.169:22-141.148.226.227:44176.service. Feb 9 07:34:25.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-141.148.226.227:44176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:25.826370 kernel: audit: type=1130 audit(1707464065.733:496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-141.148.226.227:44176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:27.039899 sshd[2188]: Invalid user user from 141.148.226.227 port 44176 Feb 9 07:34:27.045989 sshd[2188]: pam_faillock(sshd:auth): User unknown Feb 9 07:34:27.047157 sshd[2188]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:34:27.047248 sshd[2188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.148.226.227 Feb 9 07:34:27.048173 sshd[2188]: pam_faillock(sshd:auth): User unknown Feb 9 07:34:27.048000 audit[2188]: USER_AUTH pid=2188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=141.148.226.227 addr=141.148.226.227 terminal=ssh res=failed' Feb 9 07:34:27.141565 kernel: audit: type=1100 audit(1707464067.048:497): pid=2188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=141.148.226.227 addr=141.148.226.227 terminal=ssh res=failed' Feb 9 07:34:28.775780 sshd[2188]: Failed password for invalid user user from 141.148.226.227 port 44176 ssh2 Feb 9 07:34:29.129406 sshd[2190]: pam_faillock(sshd:auth): User unknown Feb 9 07:34:29.134457 sshd[2188]: Postponed keyboard-interactive for invalid user user from 141.148.226.227 port 44176 ssh2 [preauth] Feb 9 07:34:29.425151 sshd[2190]: pam_unix(sshd:auth): check pass; user unknown Feb 9 07:34:29.426313 sshd[2190]: pam_faillock(sshd:auth): User unknown Feb 9 07:34:29.426000 audit[2190]: USER_AUTH pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=141.148.226.227 addr=141.148.226.227 terminal=ssh res=failed' Feb 9 07:34:29.519581 kernel: audit: type=1100 audit(1707464069.426:498): pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=141.148.226.227 addr=141.148.226.227 terminal=ssh res=failed' Feb 9 07:34:31.094315 sshd[2188]: PAM: Permission denied for illegal user user from 141.148.226.227 Feb 9 07:34:31.095135 sshd[2188]: Failed keyboard-interactive/pam for invalid user user from 141.148.226.227 port 44176 ssh2 Feb 9 07:34:31.523032 sshd[2188]: Connection closed by invalid user user 141.148.226.227 port 44176 [preauth] Feb 9 07:34:31.525671 systemd[1]: sshd@94-139.178.91.169:22-141.148.226.227:44176.service: Deactivated successfully. Feb 9 07:34:31.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-141.148.226.227:44176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 07:34:31.620568 kernel: audit: type=1131 audit(1707464071.525:499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.91.169:22-141.148.226.227:44176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'