Feb 9 12:25:48.549764 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 12:25:48.549777 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:25:48.549783 kernel: BIOS-provided physical RAM map: Feb 9 12:25:48.549787 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 12:25:48.549791 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 12:25:48.549794 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 12:25:48.549799 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 12:25:48.549803 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 12:25:48.549806 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000082589fff] usable Feb 9 12:25:48.549810 kernel: BIOS-e820: [mem 0x000000008258a000-0x000000008258afff] ACPI NVS Feb 9 12:25:48.549814 kernel: BIOS-e820: [mem 0x000000008258b000-0x000000008258bfff] reserved Feb 9 12:25:48.549818 kernel: BIOS-e820: [mem 0x000000008258c000-0x000000008afccfff] usable Feb 9 12:25:48.549822 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 12:25:48.549826 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 12:25:48.549830 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 12:25:48.549835 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 12:25:48.549839 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 12:25:48.549843 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 12:25:48.549847 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 12:25:48.549851 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 12:25:48.549855 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 12:25:48.549859 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 12:25:48.549863 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 12:25:48.549867 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 12:25:48.549871 kernel: NX (Execute Disable) protection: active Feb 9 12:25:48.549875 kernel: SMBIOS 3.2.1 present. Feb 9 12:25:48.549880 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 12:25:48.549884 kernel: tsc: Detected 3400.000 MHz processor Feb 9 12:25:48.549888 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 12:25:48.549892 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 12:25:48.549897 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 12:25:48.549901 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 12:25:48.549905 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 12:25:48.549909 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 12:25:48.549914 kernel: Using GB pages for direct mapping Feb 9 12:25:48.549918 kernel: ACPI: Early table checksum verification disabled Feb 9 12:25:48.549923 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 12:25:48.549927 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 12:25:48.549931 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 12:25:48.549935 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 12:25:48.549941 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 12:25:48.549946 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 12:25:48.549951 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 12:25:48.549956 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 12:25:48.549960 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 12:25:48.549965 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 12:25:48.549969 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 12:25:48.549974 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 12:25:48.549978 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 12:25:48.549982 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:25:48.549988 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 12:25:48.549992 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 12:25:48.549997 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:25:48.550001 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:25:48.550006 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 12:25:48.550010 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 12:25:48.550015 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:25:48.550019 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:25:48.550025 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 12:25:48.550029 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 12:25:48.550034 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 12:25:48.550038 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 12:25:48.550043 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 12:25:48.550047 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 12:25:48.550052 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 12:25:48.550056 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 12:25:48.550061 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 12:25:48.550066 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 12:25:48.550070 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 12:25:48.550075 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 12:25:48.550079 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 12:25:48.550084 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 12:25:48.550088 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 12:25:48.550093 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 12:25:48.550097 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 12:25:48.550102 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 12:25:48.550107 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 12:25:48.550111 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 12:25:48.550116 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 12:25:48.550120 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 12:25:48.550124 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 12:25:48.550129 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 12:25:48.550133 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 12:25:48.550138 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 12:25:48.550143 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 12:25:48.550148 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 12:25:48.550152 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 12:25:48.550156 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 12:25:48.550161 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 12:25:48.550165 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 12:25:48.550170 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 12:25:48.550174 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 12:25:48.550179 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 12:25:48.550184 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 12:25:48.550188 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 12:25:48.550193 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 12:25:48.550197 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 12:25:48.550202 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 12:25:48.550206 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 12:25:48.550211 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 12:25:48.550215 kernel: No NUMA configuration found Feb 9 12:25:48.550220 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 12:25:48.550225 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 9 12:25:48.550230 kernel: Zone ranges: Feb 9 12:25:48.550234 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 12:25:48.550239 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 12:25:48.550243 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 12:25:48.550247 kernel: Movable zone start for each node Feb 9 12:25:48.550252 kernel: Early memory node ranges Feb 9 12:25:48.550256 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 12:25:48.550261 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 12:25:48.550265 kernel: node 0: [mem 0x0000000040400000-0x0000000082589fff] Feb 9 12:25:48.550271 kernel: node 0: [mem 0x000000008258c000-0x000000008afccfff] Feb 9 12:25:48.550275 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 12:25:48.550279 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 12:25:48.550284 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 12:25:48.550288 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 12:25:48.550293 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 12:25:48.550301 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 12:25:48.550306 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 12:25:48.550311 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 12:25:48.550316 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 12:25:48.550321 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 12:25:48.550326 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 12:25:48.550331 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 12:25:48.550336 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 12:25:48.550341 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 12:25:48.550345 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 12:25:48.550350 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 12:25:48.550356 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 12:25:48.550362 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 12:25:48.550384 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 12:25:48.550388 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 12:25:48.550393 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 12:25:48.550398 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 12:25:48.550417 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 12:25:48.550422 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 12:25:48.550427 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 12:25:48.550432 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 12:25:48.550437 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 12:25:48.550442 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 12:25:48.550447 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 12:25:48.550452 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 12:25:48.550456 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 12:25:48.550461 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 12:25:48.550466 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 12:25:48.550471 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 12:25:48.550477 kernel: TSC deadline timer available Feb 9 12:25:48.550481 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 12:25:48.550486 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 12:25:48.550491 kernel: Booting paravirtualized kernel on bare hardware Feb 9 12:25:48.550496 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 12:25:48.550501 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 12:25:48.550506 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 12:25:48.550510 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 12:25:48.550515 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 12:25:48.550521 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 12:25:48.550525 kernel: Policy zone: Normal Feb 9 12:25:48.550531 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:25:48.550536 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 12:25:48.550541 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 12:25:48.550545 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 12:25:48.550550 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 12:25:48.550555 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 12:25:48.550561 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 12:25:48.550566 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 12:25:48.550571 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 12:25:48.550576 kernel: rcu: Hierarchical RCU implementation. Feb 9 12:25:48.550581 kernel: rcu: RCU event tracing is enabled. Feb 9 12:25:48.550586 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 12:25:48.550591 kernel: Rude variant of Tasks RCU enabled. Feb 9 12:25:48.550596 kernel: Tracing variant of Tasks RCU enabled. Feb 9 12:25:48.550600 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 12:25:48.550606 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 12:25:48.550611 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 12:25:48.550616 kernel: random: crng init done Feb 9 12:25:48.550620 kernel: Console: colour dummy device 80x25 Feb 9 12:25:48.550625 kernel: printk: console [tty0] enabled Feb 9 12:25:48.550630 kernel: printk: console [ttyS1] enabled Feb 9 12:25:48.550635 kernel: ACPI: Core revision 20210730 Feb 9 12:25:48.550640 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 12:25:48.550645 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 12:25:48.550650 kernel: DMAR: Host address width 39 Feb 9 12:25:48.550655 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 12:25:48.550660 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 12:25:48.550665 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 12:25:48.550670 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 12:25:48.550675 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 12:25:48.550679 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 12:25:48.550684 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 12:25:48.550689 kernel: x2apic enabled Feb 9 12:25:48.550695 kernel: Switched APIC routing to cluster x2apic. Feb 9 12:25:48.550700 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 12:25:48.550705 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 12:25:48.550710 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 12:25:48.550714 kernel: process: using mwait in idle threads Feb 9 12:25:48.550719 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 12:25:48.550724 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 12:25:48.550728 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 12:25:48.550733 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 12:25:48.550739 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 12:25:48.550744 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 12:25:48.550748 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 12:25:48.550753 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 12:25:48.550758 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 12:25:48.550762 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 12:25:48.550767 kernel: TAA: Mitigation: TSX disabled Feb 9 12:25:48.550772 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 12:25:48.550777 kernel: SRBDS: Mitigation: Microcode Feb 9 12:25:48.550781 kernel: GDS: Vulnerable: No microcode Feb 9 12:25:48.550786 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 12:25:48.550792 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 12:25:48.550796 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 12:25:48.550801 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 12:25:48.550806 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 12:25:48.550811 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 12:25:48.550815 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 12:25:48.550820 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 12:25:48.550825 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 12:25:48.550830 kernel: Freeing SMP alternatives memory: 32K Feb 9 12:25:48.550834 kernel: pid_max: default: 32768 minimum: 301 Feb 9 12:25:48.550839 kernel: LSM: Security Framework initializing Feb 9 12:25:48.550844 kernel: SELinux: Initializing. Feb 9 12:25:48.550849 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 12:25:48.550854 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 12:25:48.550859 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 12:25:48.550864 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 12:25:48.550869 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 12:25:48.550873 kernel: ... version: 4 Feb 9 12:25:48.550878 kernel: ... bit width: 48 Feb 9 12:25:48.550883 kernel: ... generic registers: 4 Feb 9 12:25:48.550888 kernel: ... value mask: 0000ffffffffffff Feb 9 12:25:48.550893 kernel: ... max period: 00007fffffffffff Feb 9 12:25:48.550898 kernel: ... fixed-purpose events: 3 Feb 9 12:25:48.550903 kernel: ... event mask: 000000070000000f Feb 9 12:25:48.550908 kernel: signal: max sigframe size: 2032 Feb 9 12:25:48.550913 kernel: rcu: Hierarchical SRCU implementation. Feb 9 12:25:48.550917 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 12:25:48.550922 kernel: smp: Bringing up secondary CPUs ... Feb 9 12:25:48.550927 kernel: x86: Booting SMP configuration: Feb 9 12:25:48.550932 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 12:25:48.550937 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 12:25:48.550943 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 12:25:48.550947 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 12:25:48.550952 kernel: smpboot: Max logical packages: 1 Feb 9 12:25:48.550957 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 12:25:48.550962 kernel: devtmpfs: initialized Feb 9 12:25:48.550967 kernel: x86/mm: Memory block size: 128MB Feb 9 12:25:48.550971 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8258a000-0x8258afff] (4096 bytes) Feb 9 12:25:48.550976 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 12:25:48.550982 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 12:25:48.550987 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 12:25:48.550992 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 12:25:48.550996 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 12:25:48.551001 kernel: audit: initializing netlink subsys (disabled) Feb 9 12:25:48.551006 kernel: audit: type=2000 audit(1707481543.040:1): state=initialized audit_enabled=0 res=1 Feb 9 12:25:48.551011 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 12:25:48.551016 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 12:25:48.551020 kernel: cpuidle: using governor menu Feb 9 12:25:48.551026 kernel: ACPI: bus type PCI registered Feb 9 12:25:48.551031 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 12:25:48.551036 kernel: dca service started, version 1.12.1 Feb 9 12:25:48.551040 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 12:25:48.551045 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 12:25:48.551050 kernel: PCI: Using configuration type 1 for base access Feb 9 12:25:48.551055 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 12:25:48.551059 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 12:25:48.551064 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 12:25:48.551070 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 12:25:48.551075 kernel: ACPI: Added _OSI(Module Device) Feb 9 12:25:48.551080 kernel: ACPI: Added _OSI(Processor Device) Feb 9 12:25:48.551084 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 12:25:48.551089 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 12:25:48.551094 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 12:25:48.551099 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 12:25:48.551104 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 12:25:48.551108 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 12:25:48.551114 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:25:48.551119 kernel: ACPI: SSDT 0xFFFF9E1540213E00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 12:25:48.551124 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 12:25:48.551129 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:25:48.551133 kernel: ACPI: SSDT 0xFFFF9E1541AE3400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 12:25:48.551138 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:25:48.551143 kernel: ACPI: SSDT 0xFFFF9E1541A5D800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 12:25:48.551148 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:25:48.551152 kernel: ACPI: SSDT 0xFFFF9E1541A5C000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 12:25:48.551157 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:25:48.551163 kernel: ACPI: SSDT 0xFFFF9E154014F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 12:25:48.551167 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:25:48.551172 kernel: ACPI: SSDT 0xFFFF9E1541AE3C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 12:25:48.551177 kernel: ACPI: Interpreter enabled Feb 9 12:25:48.551182 kernel: ACPI: PM: (supports S0 S5) Feb 9 12:25:48.551187 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 12:25:48.551192 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 12:25:48.551196 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 12:25:48.551201 kernel: HEST: Table parsing has been initialized. Feb 9 12:25:48.551207 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 12:25:48.551211 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 12:25:48.551216 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 12:25:48.551221 kernel: ACPI: PM: Power Resource [USBC] Feb 9 12:25:48.551226 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 12:25:48.551231 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 12:25:48.551235 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 12:25:48.551240 kernel: ACPI: PM: Power Resource [WRST] Feb 9 12:25:48.551245 kernel: ACPI: PM: Power Resource [FN00] Feb 9 12:25:48.551250 kernel: ACPI: PM: Power Resource [FN01] Feb 9 12:25:48.551255 kernel: ACPI: PM: Power Resource [FN02] Feb 9 12:25:48.551260 kernel: ACPI: PM: Power Resource [FN03] Feb 9 12:25:48.551265 kernel: ACPI: PM: Power Resource [FN04] Feb 9 12:25:48.551269 kernel: ACPI: PM: Power Resource [PIN] Feb 9 12:25:48.551274 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 12:25:48.551336 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 12:25:48.551402 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 12:25:48.551461 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 12:25:48.551468 kernel: PCI host bridge to bus 0000:00 Feb 9 12:25:48.551512 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 12:25:48.551549 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 12:25:48.551585 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 12:25:48.551621 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 12:25:48.551656 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 12:25:48.551693 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 12:25:48.551742 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 12:25:48.551790 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 12:25:48.551834 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.551879 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 12:25:48.551921 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 12:25:48.551969 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 12:25:48.552011 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 12:25:48.552058 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 12:25:48.552099 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 12:25:48.552142 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 12:25:48.552186 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 12:25:48.552230 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 12:25:48.552270 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 12:25:48.552316 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 12:25:48.552356 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:25:48.552438 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 12:25:48.552480 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:25:48.552524 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 12:25:48.552568 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 12:25:48.552608 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 12:25:48.552652 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 12:25:48.552693 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 12:25:48.552732 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 12:25:48.552778 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 12:25:48.552821 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 12:25:48.552862 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 12:25:48.552905 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 12:25:48.552946 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 12:25:48.552986 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 12:25:48.553027 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 12:25:48.553066 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 12:25:48.553112 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 12:25:48.553155 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 12:25:48.553194 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 12:25:48.553239 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 12:25:48.553280 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.553326 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 12:25:48.553387 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.553450 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 12:25:48.553492 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.553537 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 12:25:48.553579 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.553625 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 12:25:48.553670 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.553714 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 12:25:48.553756 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:25:48.553801 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 12:25:48.553848 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 12:25:48.553889 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 12:25:48.553929 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 12:25:48.553974 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 12:25:48.554016 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 12:25:48.554063 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 12:25:48.554106 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 12:25:48.554150 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 12:25:48.554192 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 12:25:48.554234 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 12:25:48.554276 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 12:25:48.554322 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 12:25:48.554367 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 12:25:48.554452 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 12:25:48.554495 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 12:25:48.554537 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 12:25:48.554579 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 12:25:48.554621 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 12:25:48.554663 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 12:25:48.554704 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:25:48.554745 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 12:25:48.554795 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 12:25:48.554838 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 12:25:48.554880 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 12:25:48.554922 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 12:25:48.554965 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.555006 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 12:25:48.555047 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 12:25:48.555087 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 12:25:48.555136 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 12:25:48.555179 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 12:25:48.555255 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 12:25:48.555318 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 12:25:48.555364 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 12:25:48.555408 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 12:25:48.555468 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 12:25:48.555512 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 12:25:48.555554 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 12:25:48.555601 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 12:25:48.555645 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 12:25:48.555688 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 12:25:48.555731 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 12:25:48.555773 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 12:25:48.555813 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 12:25:48.555857 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 12:25:48.555902 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 12:25:48.555950 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 12:25:48.555996 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 12:25:48.556041 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 12:25:48.556086 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 12:25:48.556130 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 12:25:48.556177 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 12:25:48.556221 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 12:25:48.556263 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 12:25:48.556305 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 12:25:48.556349 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 12:25:48.556356 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 12:25:48.556364 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 12:25:48.556369 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 12:25:48.556376 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 12:25:48.556406 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 12:25:48.556411 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 12:25:48.556416 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 12:25:48.556422 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 12:25:48.556427 kernel: iommu: Default domain type: Translated Feb 9 12:25:48.556432 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 12:25:48.556496 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 12:25:48.556543 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 12:25:48.556586 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 12:25:48.556594 kernel: vgaarb: loaded Feb 9 12:25:48.556599 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 12:25:48.556605 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 12:25:48.556610 kernel: PTP clock support registered Feb 9 12:25:48.556615 kernel: PCI: Using ACPI for IRQ routing Feb 9 12:25:48.556620 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 12:25:48.556625 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 12:25:48.556631 kernel: e820: reserve RAM buffer [mem 0x8258a000-0x83ffffff] Feb 9 12:25:48.556636 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 12:25:48.556641 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 12:25:48.556646 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 12:25:48.556651 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 12:25:48.556656 kernel: clocksource: Switched to clocksource tsc-early Feb 9 12:25:48.556661 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 12:25:48.556667 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 12:25:48.556672 kernel: pnp: PnP ACPI init Feb 9 12:25:48.556717 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 12:25:48.556759 kernel: pnp 00:02: [dma 0 disabled] Feb 9 12:25:48.556799 kernel: pnp 00:03: [dma 0 disabled] Feb 9 12:25:48.556839 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 12:25:48.556877 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 12:25:48.556917 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 12:25:48.556958 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 12:25:48.556996 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 12:25:48.557033 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 12:25:48.557071 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 12:25:48.557107 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 12:25:48.557144 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 12:25:48.557181 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 12:25:48.557219 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 12:25:48.557261 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 12:25:48.557298 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 12:25:48.557335 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 12:25:48.557374 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 12:25:48.557452 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 12:25:48.557489 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 12:25:48.557528 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 12:25:48.557567 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 12:25:48.557575 kernel: pnp: PnP ACPI: found 10 devices Feb 9 12:25:48.557580 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 12:25:48.557586 kernel: NET: Registered PF_INET protocol family Feb 9 12:25:48.557591 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 12:25:48.557596 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 12:25:48.557601 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 12:25:48.557608 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 12:25:48.557613 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 12:25:48.557618 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 12:25:48.557623 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 12:25:48.557629 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 12:25:48.557634 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 12:25:48.557639 kernel: NET: Registered PF_XDP protocol family Feb 9 12:25:48.557680 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 12:25:48.557724 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 12:25:48.557764 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 12:25:48.557808 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 12:25:48.557850 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 12:25:48.557893 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 12:25:48.557934 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 12:25:48.557976 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 12:25:48.558017 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 12:25:48.558060 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:25:48.558102 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 12:25:48.558142 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 12:25:48.558183 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 12:25:48.558224 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 12:25:48.558268 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 12:25:48.558309 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 12:25:48.558350 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 12:25:48.558418 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 12:25:48.558481 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 12:25:48.558524 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 12:25:48.558566 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 12:25:48.558608 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 12:25:48.558649 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 12:25:48.558693 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 12:25:48.558730 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 12:25:48.558767 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 12:25:48.558803 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 12:25:48.558838 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 12:25:48.558874 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 12:25:48.558909 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 12:25:48.558952 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 12:25:48.558992 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:25:48.559033 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 12:25:48.559073 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 12:25:48.559114 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 12:25:48.559153 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 12:25:48.559196 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 12:25:48.559237 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 12:25:48.559277 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 12:25:48.559317 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 12:25:48.559325 kernel: PCI: CLS 64 bytes, default 64 Feb 9 12:25:48.559330 kernel: DMAR: No ATSR found Feb 9 12:25:48.559336 kernel: DMAR: No SATC found Feb 9 12:25:48.559342 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 12:25:48.559407 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 12:25:48.559471 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 12:25:48.559513 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 12:25:48.559553 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 12:25:48.559595 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 12:25:48.559637 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 12:25:48.559678 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 12:25:48.559718 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 12:25:48.559759 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 12:25:48.559802 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 12:25:48.559843 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 12:25:48.559884 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 12:25:48.559924 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 12:25:48.559965 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 12:25:48.560006 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 12:25:48.560048 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 12:25:48.560088 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 12:25:48.560130 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 12:25:48.560171 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 12:25:48.560212 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 12:25:48.560253 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 12:25:48.560296 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 12:25:48.560339 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 12:25:48.560410 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 12:25:48.560472 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 12:25:48.560518 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 12:25:48.560562 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 12:25:48.560570 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 12:25:48.560575 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 12:25:48.560581 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 12:25:48.560586 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 12:25:48.560591 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 12:25:48.560597 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 12:25:48.560603 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 12:25:48.560647 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 12:25:48.560655 kernel: Initialise system trusted keyrings Feb 9 12:25:48.560660 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 12:25:48.560665 kernel: Key type asymmetric registered Feb 9 12:25:48.560670 kernel: Asymmetric key parser 'x509' registered Feb 9 12:25:48.560675 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 12:25:48.560680 kernel: io scheduler mq-deadline registered Feb 9 12:25:48.560687 kernel: io scheduler kyber registered Feb 9 12:25:48.560692 kernel: io scheduler bfq registered Feb 9 12:25:48.560733 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 12:25:48.560775 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 12:25:48.560817 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 12:25:48.560858 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 12:25:48.560899 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 12:25:48.560940 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 12:25:48.560987 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 12:25:48.560994 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 12:25:48.561000 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 12:25:48.561005 kernel: pstore: Registered erst as persistent store backend Feb 9 12:25:48.561010 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 12:25:48.561016 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 12:25:48.561021 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 12:25:48.561026 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 12:25:48.561032 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 12:25:48.561076 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 12:25:48.561084 kernel: i8042: PNP: No PS/2 controller found. Feb 9 12:25:48.561120 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 12:25:48.561158 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 12:25:48.561196 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T12:25:47 UTC (1707481547) Feb 9 12:25:48.561234 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 12:25:48.561241 kernel: fail to initialize ptp_kvm Feb 9 12:25:48.561247 kernel: intel_pstate: Intel P-state driver initializing Feb 9 12:25:48.561253 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 12:25:48.561258 kernel: intel_pstate: HWP enabled Feb 9 12:25:48.561263 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 12:25:48.561268 kernel: vesafb: scrolling: redraw Feb 9 12:25:48.561274 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 12:25:48.561279 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000006005ab3e, using 768k, total 768k Feb 9 12:25:48.561284 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 12:25:48.561289 kernel: fb0: VESA VGA frame buffer device Feb 9 12:25:48.561295 kernel: NET: Registered PF_INET6 protocol family Feb 9 12:25:48.561300 kernel: Segment Routing with IPv6 Feb 9 12:25:48.561305 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 12:25:48.561310 kernel: NET: Registered PF_PACKET protocol family Feb 9 12:25:48.561316 kernel: Key type dns_resolver registered Feb 9 12:25:48.561321 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 12:25:48.561326 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 12:25:48.561331 kernel: IPI shorthand broadcast: enabled Feb 9 12:25:48.561336 kernel: sched_clock: Marking stable (1679082328, 1339682878)->(4438320438, -1419555232) Feb 9 12:25:48.561342 kernel: registered taskstats version 1 Feb 9 12:25:48.561347 kernel: Loading compiled-in X.509 certificates Feb 9 12:25:48.561352 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 12:25:48.561357 kernel: Key type .fscrypt registered Feb 9 12:25:48.561386 kernel: Key type fscrypt-provisioning registered Feb 9 12:25:48.561391 kernel: pstore: Using crash dump compression: deflate Feb 9 12:25:48.561397 kernel: ima: Allocated hash algorithm: sha1 Feb 9 12:25:48.561402 kernel: ima: No architecture policies found Feb 9 12:25:48.561407 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 12:25:48.561413 kernel: Write protecting the kernel read-only data: 28672k Feb 9 12:25:48.561419 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 12:25:48.561444 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 12:25:48.561449 kernel: Run /init as init process Feb 9 12:25:48.561454 kernel: with arguments: Feb 9 12:25:48.561460 kernel: /init Feb 9 12:25:48.561465 kernel: with environment: Feb 9 12:25:48.561470 kernel: HOME=/ Feb 9 12:25:48.561475 kernel: TERM=linux Feb 9 12:25:48.561481 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 12:25:48.561487 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 12:25:48.561493 systemd[1]: Detected architecture x86-64. Feb 9 12:25:48.561499 systemd[1]: Running in initrd. Feb 9 12:25:48.561504 systemd[1]: No hostname configured, using default hostname. Feb 9 12:25:48.561509 systemd[1]: Hostname set to . Feb 9 12:25:48.561514 systemd[1]: Initializing machine ID from random generator. Feb 9 12:25:48.561521 systemd[1]: Queued start job for default target initrd.target. Feb 9 12:25:48.561526 systemd[1]: Started systemd-ask-password-console.path. Feb 9 12:25:48.561531 systemd[1]: Reached target cryptsetup.target. Feb 9 12:25:48.561537 systemd[1]: Reached target paths.target. Feb 9 12:25:48.561542 systemd[1]: Reached target slices.target. Feb 9 12:25:48.561547 systemd[1]: Reached target swap.target. Feb 9 12:25:48.561552 systemd[1]: Reached target timers.target. Feb 9 12:25:48.561557 systemd[1]: Listening on iscsid.socket. Feb 9 12:25:48.561564 systemd[1]: Listening on iscsiuio.socket. Feb 9 12:25:48.561569 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 12:25:48.561575 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 12:25:48.561580 systemd[1]: Listening on systemd-journald.socket. Feb 9 12:25:48.561585 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Feb 9 12:25:48.561591 systemd[1]: Listening on systemd-networkd.socket. Feb 9 12:25:48.561596 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Feb 9 12:25:48.561601 kernel: clocksource: Switched to clocksource tsc Feb 9 12:25:48.561607 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 12:25:48.561613 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 12:25:48.561618 systemd[1]: Reached target sockets.target. Feb 9 12:25:48.561624 systemd[1]: Starting kmod-static-nodes.service... Feb 9 12:25:48.561629 systemd[1]: Finished network-cleanup.service. Feb 9 12:25:48.561634 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 12:25:48.561640 systemd[1]: Starting systemd-journald.service... Feb 9 12:25:48.561645 systemd[1]: Starting systemd-modules-load.service... Feb 9 12:25:48.561653 systemd-journald[266]: Journal started Feb 9 12:25:48.561678 systemd-journald[266]: Runtime Journal (/run/log/journal/acdbc3bad8314a158ff9e52e04810c86) is 8.0M, max 640.1M, 632.1M free. Feb 9 12:25:48.564214 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 12:25:48.585445 kernel: audit: type=1334 audit(1707481548.569:2): prog-id=6 op=LOAD Feb 9 12:25:48.585456 systemd[1]: Starting systemd-resolved.service... Feb 9 12:25:48.569000 audit: BPF prog-id=6 op=LOAD Feb 9 12:25:48.637413 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 12:25:48.637443 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 12:25:48.670411 kernel: Bridge firewalling registered Feb 9 12:25:48.670444 systemd[1]: Started systemd-journald.service. Feb 9 12:25:48.684723 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 12:25:48.744465 kernel: audit: type=1130 audit(1707481548.691:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.744477 kernel: SCSI subsystem initialized Feb 9 12:25:48.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.690521 systemd-resolved[270]: Positive Trust Anchors: Feb 9 12:25:48.861450 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 12:25:48.861465 kernel: audit: type=1130 audit(1707481548.765:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.861474 kernel: device-mapper: uevent: version 1.0.3 Feb 9 12:25:48.861481 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 12:25:48.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.690527 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 12:25:48.918521 kernel: audit: type=1130 audit(1707481548.874:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.690546 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 12:25:48.991609 kernel: audit: type=1130 audit(1707481548.925:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.692102 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 9 12:25:48.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.692598 systemd[1]: Started systemd-resolved.service. Feb 9 12:25:49.100829 kernel: audit: type=1130 audit(1707481548.999:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.100848 kernel: audit: type=1130 audit(1707481549.053:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:48.766617 systemd[1]: Finished kmod-static-nodes.service. Feb 9 12:25:48.869872 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 12:25:48.875671 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 12:25:48.926643 systemd[1]: Finished systemd-modules-load.service. Feb 9 12:25:49.000715 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 12:25:49.054644 systemd[1]: Reached target nss-lookup.target. Feb 9 12:25:49.109967 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 12:25:49.116949 systemd[1]: Starting systemd-sysctl.service... Feb 9 12:25:49.130975 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 12:25:49.131742 systemd[1]: Finished systemd-sysctl.service. Feb 9 12:25:49.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.133789 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 12:25:49.180568 kernel: audit: type=1130 audit(1707481549.130:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.195691 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 12:25:49.263463 kernel: audit: type=1130 audit(1707481549.194:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.254956 systemd[1]: Starting dracut-cmdline.service... Feb 9 12:25:49.278490 dracut-cmdline[292]: dracut-dracut-053 Feb 9 12:25:49.278490 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 12:25:49.278490 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:25:49.345451 kernel: Loading iSCSI transport class v2.0-870. Feb 9 12:25:49.345463 kernel: iscsi: registered transport (tcp) Feb 9 12:25:49.394684 kernel: iscsi: registered transport (qla4xxx) Feb 9 12:25:49.394704 kernel: QLogic iSCSI HBA Driver Feb 9 12:25:49.410263 systemd[1]: Finished dracut-cmdline.service. Feb 9 12:25:49.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:49.419094 systemd[1]: Starting dracut-pre-udev.service... Feb 9 12:25:49.474364 kernel: raid6: avx2x4 gen() 48641 MB/s Feb 9 12:25:49.509363 kernel: raid6: avx2x4 xor() 20963 MB/s Feb 9 12:25:49.544364 kernel: raid6: avx2x2 gen() 54940 MB/s Feb 9 12:25:49.579363 kernel: raid6: avx2x2 xor() 32845 MB/s Feb 9 12:25:49.614363 kernel: raid6: avx2x1 gen() 46246 MB/s Feb 9 12:25:49.649364 kernel: raid6: avx2x1 xor() 28524 MB/s Feb 9 12:25:49.683363 kernel: raid6: sse2x4 gen() 21805 MB/s Feb 9 12:25:49.717363 kernel: raid6: sse2x4 xor() 11997 MB/s Feb 9 12:25:49.751363 kernel: raid6: sse2x2 gen() 22130 MB/s Feb 9 12:25:49.785363 kernel: raid6: sse2x2 xor() 13701 MB/s Feb 9 12:25:49.819363 kernel: raid6: sse2x1 gen() 18697 MB/s Feb 9 12:25:49.871351 kernel: raid6: sse2x1 xor() 9134 MB/s Feb 9 12:25:49.871388 kernel: raid6: using algorithm avx2x2 gen() 54940 MB/s Feb 9 12:25:49.871401 kernel: raid6: .... xor() 32845 MB/s, rmw enabled Feb 9 12:25:49.889604 kernel: raid6: using avx2x2 recovery algorithm Feb 9 12:25:49.936366 kernel: xor: automatically using best checksumming function avx Feb 9 12:25:50.014368 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 12:25:50.019031 systemd[1]: Finished dracut-pre-udev.service. Feb 9 12:25:50.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:50.026000 audit: BPF prog-id=7 op=LOAD Feb 9 12:25:50.026000 audit: BPF prog-id=8 op=LOAD Feb 9 12:25:50.028313 systemd[1]: Starting systemd-udevd.service... Feb 9 12:25:50.036454 systemd-udevd[473]: Using default interface naming scheme 'v252'. Feb 9 12:25:50.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:50.042615 systemd[1]: Started systemd-udevd.service. Feb 9 12:25:50.080480 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Feb 9 12:25:50.057000 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 12:25:50.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:50.081618 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 12:25:50.099630 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 12:25:50.148390 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 12:25:50.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:50.177371 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 12:25:50.179368 kernel: libata version 3.00 loaded. Feb 9 12:25:50.179390 kernel: ACPI: bus type USB registered Feb 9 12:25:50.214076 kernel: usbcore: registered new interface driver usbfs Feb 9 12:25:50.214126 kernel: usbcore: registered new interface driver hub Feb 9 12:25:50.249518 kernel: usbcore: registered new device driver usb Feb 9 12:25:50.253392 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 12:25:50.274407 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 12:25:50.274426 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 12:25:50.315073 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 12:25:50.315144 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 12:25:50.349330 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 12:25:50.349345 kernel: scsi host0: ahci Feb 9 12:25:50.386404 kernel: scsi host1: ahci Feb 9 12:25:50.386478 kernel: AES CTR mode by8 optimization enabled Feb 9 12:25:50.386487 kernel: scsi host2: ahci Feb 9 12:25:50.386500 kernel: pps pps0: new PPS source ptp0 Feb 9 12:25:50.386556 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 12:25:50.386611 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 12:25:50.386662 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b6 Feb 9 12:25:50.386711 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 12:25:50.386761 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 12:25:50.450822 kernel: pps pps1: new PPS source ptp1 Feb 9 12:25:50.450893 kernel: scsi host3: ahci Feb 9 12:25:50.450908 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 12:25:50.481414 kernel: scsi host4: ahci Feb 9 12:25:50.497801 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 12:25:50.510261 kernel: scsi host5: ahci Feb 9 12:25:50.510286 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b7 Feb 9 12:25:50.533421 kernel: scsi host6: ahci Feb 9 12:25:50.543676 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 12:25:50.543748 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 9 12:25:50.557841 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 12:25:50.648434 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 9 12:25:50.648451 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 9 12:25:50.663595 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 9 12:25:50.678646 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 9 12:25:50.693752 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 9 12:25:50.708802 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 9 12:25:50.757049 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Feb 9 12:25:50.757122 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 12:25:51.034365 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 12:25:51.034446 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 12:25:51.048392 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 12:25:51.062401 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 12:25:51.062495 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 12:25:51.094396 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 12:25:51.108424 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 12:25:51.123364 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 12:25:51.137419 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 12:25:51.151407 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 12:25:51.166365 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 12:25:51.212589 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 12:25:51.212607 kernel: ata2.00: Features: NCQ-prio Feb 9 12:25:51.212615 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 12:25:51.240016 kernel: ata1.00: Features: NCQ-prio Feb 9 12:25:51.257364 kernel: ata2.00: configured for UDMA/133 Feb 9 12:25:51.257378 kernel: ata1.00: configured for UDMA/133 Feb 9 12:25:51.270395 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 12:25:51.286410 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 12:25:51.286481 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 12:25:51.320377 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Feb 9 12:25:51.352584 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 12:25:51.370371 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 12:25:51.370468 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 12:25:51.400920 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 12:25:51.435559 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 12:25:51.435666 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 12:25:51.435718 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 12:25:51.452370 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 12:25:51.482092 kernel: hub 1-0:1.0: USB hub found Feb 9 12:25:51.482213 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 12:25:51.482269 kernel: hub 1-0:1.0: 16 ports detected Feb 9 12:25:51.523291 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:51.523307 kernel: hub 2-0:1.0: USB hub found Feb 9 12:25:51.523385 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:25:51.549464 kernel: hub 2-0:1.0: 10 ports detected Feb 9 12:25:51.549561 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 12:25:51.549628 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 12:25:51.549693 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 12:25:51.549766 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 12:25:51.549851 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 12:25:51.549916 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 12:25:51.549973 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:25:51.549980 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:25:51.549987 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 12:25:51.595365 kernel: usb: port power management may be unreliable Feb 9 12:25:51.595381 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 12:25:51.595451 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 12:25:51.595507 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 12:25:51.595562 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 12:25:51.595618 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:51.639432 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 12:25:51.653395 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 12:25:51.694109 kernel: port_module: 9 callbacks suppressed Feb 9 12:25:51.694124 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 9 12:25:51.771630 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 12:25:51.771656 kernel: GPT:9289727 != 937703087 Feb 9 12:25:51.862710 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 12:25:51.862726 kernel: GPT:9289727 != 937703087 Feb 9 12:25:51.875660 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 12:25:51.890363 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:25:51.904824 kernel: hub 1-14:1.0: USB hub found Feb 9 12:25:51.905392 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:51.913411 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 12:25:51.932228 kernel: hub 1-14:1.0: 4 ports detected Feb 9 12:25:51.932304 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 12:25:52.003442 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 12:25:52.037604 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (637) Feb 9 12:25:52.028199 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 12:25:52.047632 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 12:25:52.071562 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 12:25:52.097767 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 12:25:52.144060 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 12:25:52.144163 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:52.118135 systemd[1]: Starting disk-uuid.service... Feb 9 12:25:52.174437 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:25:52.174450 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:52.174503 disk-uuid[688]: Primary Header is updated. Feb 9 12:25:52.174503 disk-uuid[688]: Secondary Entries is updated. Feb 9 12:25:52.174503 disk-uuid[688]: Secondary Header is updated. Feb 9 12:25:52.227436 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:25:52.227446 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:52.227453 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 9 12:25:52.227517 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:25:52.245395 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 12:25:52.262432 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 9 12:25:52.409421 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 12:25:52.441961 kernel: usbcore: registered new interface driver usbhid Feb 9 12:25:52.441979 kernel: usbhid: USB HID core driver Feb 9 12:25:52.476545 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 12:25:52.594945 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 12:25:52.595073 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 12:25:52.595082 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 12:25:53.225987 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:25:53.246373 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 12:25:53.246525 disk-uuid[689]: The operation has completed successfully. Feb 9 12:25:53.287649 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 12:25:53.384993 kernel: audit: type=1130 audit(1707481553.293:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.385008 kernel: audit: type=1131 audit(1707481553.293:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.287692 systemd[1]: Finished disk-uuid.service. Feb 9 12:25:53.415460 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 12:25:53.295055 systemd[1]: Starting verity-setup.service... Feb 9 12:25:53.445120 systemd[1]: Found device dev-mapper-usr.device. Feb 9 12:25:53.454376 systemd[1]: Mounting sysusr-usr.mount... Feb 9 12:25:53.460637 systemd[1]: Finished verity-setup.service. Feb 9 12:25:53.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.527366 kernel: audit: type=1130 audit(1707481553.478:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.581365 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 12:25:53.581469 systemd[1]: Mounted sysusr-usr.mount. Feb 9 12:25:53.588644 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 12:25:53.589043 systemd[1]: Starting ignition-setup.service... Feb 9 12:25:53.694113 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:25:53.694130 kernel: BTRFS info (device sda6): using free space tree Feb 9 12:25:53.694137 kernel: BTRFS info (device sda6): has skinny extents Feb 9 12:25:53.694144 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 12:25:53.622070 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 12:25:53.703826 systemd[1]: Finished ignition-setup.service. Feb 9 12:25:53.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.722711 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 12:25:53.829363 kernel: audit: type=1130 audit(1707481553.721:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.829380 kernel: audit: type=1130 audit(1707481553.778:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.780038 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 12:25:53.836000 audit: BPF prog-id=9 op=LOAD Feb 9 12:25:53.838384 systemd[1]: Starting systemd-networkd.service... Feb 9 12:25:53.875534 kernel: audit: type=1334 audit(1707481553.836:24): prog-id=9 op=LOAD Feb 9 12:25:53.874336 systemd-networkd[881]: lo: Link UP Feb 9 12:25:53.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.936374 kernel: audit: type=1130 audit(1707481553.882:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.874339 systemd-networkd[881]: lo: Gained carrier Feb 9 12:25:53.902087 ignition[869]: Ignition 2.14.0 Feb 9 12:25:53.874625 systemd-networkd[881]: Enumeration completed Feb 9 12:25:53.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.902091 ignition[869]: Stage: fetch-offline Feb 9 12:25:54.107151 kernel: audit: type=1130 audit(1707481553.970:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:54.107167 kernel: audit: type=1130 audit(1707481554.031:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:54.107175 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 12:25:54.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.874662 systemd[1]: Started systemd-networkd.service. Feb 9 12:25:54.132490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 9 12:25:53.902117 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:25:53.875288 systemd-networkd[881]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:25:54.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.902131 ignition[869]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:25:53.883561 systemd[1]: Reached target network.target. Feb 9 12:25:53.904885 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:25:54.182501 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 12:25:54.182501 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 12:25:54.182501 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 12:25:54.182501 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 12:25:54.182501 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 12:25:54.182501 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 12:25:54.182501 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 12:25:54.335583 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 12:25:54.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.915293 unknown[869]: fetched base config from "system" Feb 9 12:25:53.904946 ignition[869]: parsed url from cmdline: "" Feb 9 12:25:53.915297 unknown[869]: fetched user config from "system" Feb 9 12:25:54.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:25:53.904948 ignition[869]: no config URL provided Feb 9 12:25:53.944996 systemd[1]: Starting iscsiuio.service... Feb 9 12:25:53.904951 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 12:25:53.958768 systemd[1]: Started iscsiuio.service. Feb 9 12:25:53.904962 ignition[869]: parsing config with SHA512: 498ff184f143776181c6f7344b0d08129377724ec0c38531e60a7b35b83ca62f7eceeed06094ad9ad0fa90be616f9f123c740eee3111d71dcb58fba8e8465a63 Feb 9 12:25:53.971751 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 12:25:53.915494 ignition[869]: fetch-offline: fetch-offline passed Feb 9 12:25:54.032632 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 12:25:53.915496 ignition[869]: POST message to Packet Timeline Feb 9 12:25:54.033087 systemd[1]: Starting ignition-kargs.service... Feb 9 12:25:53.915501 ignition[869]: POST Status error: resource requires networking Feb 9 12:25:54.108323 systemd-networkd[881]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:25:53.915530 ignition[869]: Ignition finished successfully Feb 9 12:25:54.120971 systemd[1]: Starting iscsid.service... Feb 9 12:25:54.111453 ignition[889]: Ignition 2.14.0 Feb 9 12:25:54.132612 systemd[1]: Started iscsid.service. Feb 9 12:25:54.111456 ignition[889]: Stage: kargs Feb 9 12:25:54.152090 systemd[1]: Starting dracut-initqueue.service... Feb 9 12:25:54.111513 ignition[889]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:25:54.175644 systemd[1]: Finished dracut-initqueue.service. Feb 9 12:25:54.111522 ignition[889]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:25:54.197545 systemd[1]: Reached target remote-fs-pre.target. Feb 9 12:25:54.112806 ignition[889]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:25:54.241573 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 12:25:54.114073 ignition[889]: kargs: kargs passed Feb 9 12:25:54.277128 systemd[1]: Reached target remote-fs.target. Feb 9 12:25:54.114076 ignition[889]: POST message to Packet Timeline Feb 9 12:25:54.293025 systemd[1]: Starting dracut-pre-mount.service... Feb 9 12:25:54.114089 ignition[889]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:25:54.324944 systemd-networkd[881]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:25:54.116515 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60978->[::1]:53: read: connection refused Feb 9 12:25:54.353729 systemd[1]: Finished dracut-pre-mount.service. Feb 9 12:25:54.316883 ignition[889]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 12:25:54.353966 systemd-networkd[881]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:25:54.317380 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60037->[::1]:53: read: connection refused Feb 9 12:25:54.383034 systemd-networkd[881]: enp1s0f1np1: Link UP Feb 9 12:25:54.383231 systemd-networkd[881]: enp1s0f1np1: Gained carrier Feb 9 12:25:54.393874 systemd-networkd[881]: enp1s0f0np0: Link UP Feb 9 12:25:54.394228 systemd-networkd[881]: eno2: Link UP Feb 9 12:25:54.394586 systemd-networkd[881]: eno1: Link UP Feb 9 12:25:54.718119 ignition[889]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 12:25:54.719523 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50481->[::1]:53: read: connection refused Feb 9 12:25:55.186185 systemd-networkd[881]: enp1s0f0np0: Gained carrier Feb 9 12:25:55.194619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 9 12:25:55.221724 systemd-networkd[881]: enp1s0f0np0: DHCPv4 address 139.178.89.23/31, gateway 139.178.89.22 acquired from 145.40.83.140 Feb 9 12:25:55.354868 systemd-networkd[881]: enp1s0f1np1: Gained IPv6LL Feb 9 12:25:55.519968 ignition[889]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 12:25:55.521140 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43636->[::1]:53: read: connection refused Feb 9 12:25:56.506964 systemd-networkd[881]: enp1s0f0np0: Gained IPv6LL Feb 9 12:25:57.122521 ignition[889]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 12:25:57.123794 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51714->[::1]:53: read: connection refused Feb 9 12:26:00.327424 ignition[889]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 12:26:00.372186 ignition[889]: GET result: OK Feb 9 12:26:00.604912 ignition[889]: Ignition finished successfully Feb 9 12:26:00.606842 systemd[1]: Finished ignition-kargs.service. Feb 9 12:26:00.696173 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 12:26:00.696190 kernel: audit: type=1130 audit(1707481560.618:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:00.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:00.627837 ignition[916]: Ignition 2.14.0 Feb 9 12:26:00.620799 systemd[1]: Starting ignition-disks.service... Feb 9 12:26:00.627840 ignition[916]: Stage: disks Feb 9 12:26:00.627897 ignition[916]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:26:00.627906 ignition[916]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:26:00.629216 ignition[916]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:26:00.630463 ignition[916]: disks: disks passed Feb 9 12:26:00.630466 ignition[916]: POST message to Packet Timeline Feb 9 12:26:00.630476 ignition[916]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:26:00.653994 ignition[916]: GET result: OK Feb 9 12:26:00.855474 ignition[916]: Ignition finished successfully Feb 9 12:26:00.858613 systemd[1]: Finished ignition-disks.service. Feb 9 12:26:00.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:00.870881 systemd[1]: Reached target initrd-root-device.target. Feb 9 12:26:00.951633 kernel: audit: type=1130 audit(1707481560.869:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:00.936599 systemd[1]: Reached target local-fs-pre.target. Feb 9 12:26:00.936633 systemd[1]: Reached target local-fs.target. Feb 9 12:26:00.960616 systemd[1]: Reached target sysinit.target. Feb 9 12:26:00.974574 systemd[1]: Reached target basic.target. Feb 9 12:26:00.989226 systemd[1]: Starting systemd-fsck-root.service... Feb 9 12:26:01.007601 systemd-fsck[931]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 12:26:01.026320 systemd[1]: Finished systemd-fsck-root.service. Feb 9 12:26:01.119491 kernel: audit: type=1130 audit(1707481561.034:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.119507 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 12:26:01.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.035974 systemd[1]: Mounting sysroot.mount... Feb 9 12:26:01.126993 systemd[1]: Mounted sysroot.mount. Feb 9 12:26:01.142639 systemd[1]: Reached target initrd-root-fs.target. Feb 9 12:26:01.158171 systemd[1]: Mounting sysroot-usr.mount... Feb 9 12:26:01.173433 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 12:26:01.190051 systemd[1]: Starting flatcar-static-network.service... Feb 9 12:26:01.207601 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 12:26:01.207690 systemd[1]: Reached target ignition-diskful.target. Feb 9 12:26:01.227583 systemd[1]: Mounted sysroot-usr.mount. Feb 9 12:26:01.250744 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 12:26:01.398627 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (942) Feb 9 12:26:01.398645 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:26:01.398656 kernel: BTRFS info (device sda6): using free space tree Feb 9 12:26:01.398668 kernel: BTRFS info (device sda6): has skinny extents Feb 9 12:26:01.398676 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 12:26:01.398739 coreos-metadata[938]: Feb 09 12:26:01.304 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:26:01.398739 coreos-metadata[938]: Feb 09 12:26:01.338 INFO Fetch successful Feb 9 12:26:01.398739 coreos-metadata[938]: Feb 09 12:26:01.359 INFO wrote hostname ci-3510.3.2-a-2ee450373d to /sysroot/etc/hostname Feb 9 12:26:01.648132 kernel: audit: type=1130 audit(1707481561.406:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.648144 kernel: audit: type=1130 audit(1707481561.469:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.648152 kernel: audit: type=1130 audit(1707481561.534:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.648159 kernel: audit: type=1131 audit(1707481561.534:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.648231 coreos-metadata[939]: Feb 09 12:26:01.304 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:26:01.648231 coreos-metadata[939]: Feb 09 12:26:01.344 INFO Fetch successful Feb 9 12:26:01.261720 systemd[1]: Starting initrd-setup-root.service... Feb 9 12:26:01.307578 systemd[1]: Finished initrd-setup-root.service. Feb 9 12:26:01.707454 initrd-setup-root[949]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 12:26:01.408699 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 12:26:01.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.753755 initrd-setup-root[957]: cut: /sysroot/etc/group: No such file or directory Feb 9 12:26:01.801566 kernel: audit: type=1130 audit(1707481561.724:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.470677 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 12:26:01.812616 initrd-setup-root[965]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 12:26:01.823566 ignition[1013]: INFO : Ignition 2.14.0 Feb 9 12:26:01.823566 ignition[1013]: INFO : Stage: mount Feb 9 12:26:01.823566 ignition[1013]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:26:01.823566 ignition[1013]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:26:01.823566 ignition[1013]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:26:01.823566 ignition[1013]: INFO : mount: mount passed Feb 9 12:26:01.823566 ignition[1013]: INFO : POST message to Packet Timeline Feb 9 12:26:01.823566 ignition[1013]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:26:01.823566 ignition[1013]: INFO : GET result: OK Feb 9 12:26:01.470715 systemd[1]: Finished flatcar-static-network.service. Feb 9 12:26:01.923647 initrd-setup-root[973]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 12:26:01.535645 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 12:26:01.656961 systemd[1]: Starting ignition-mount.service... Feb 9 12:26:01.684928 systemd[1]: Starting sysroot-boot.service... Feb 9 12:26:01.699860 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 12:26:01.699899 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 12:26:01.707580 systemd[1]: Finished sysroot-boot.service. Feb 9 12:26:02.050409 kernel: audit: type=1130 audit(1707481561.983:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:01.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.050458 ignition[1013]: INFO : Ignition finished successfully Feb 9 12:26:01.975152 systemd[1]: Finished ignition-mount.service. Feb 9 12:26:02.004653 systemd[1]: Starting ignition-files.service... Feb 9 12:26:02.111496 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1031) Feb 9 12:26:02.111507 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:26:02.059246 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 12:26:02.163464 kernel: BTRFS info (device sda6): using free space tree Feb 9 12:26:02.163475 kernel: BTRFS info (device sda6): has skinny extents Feb 9 12:26:02.163482 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 12:26:02.195500 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 12:26:02.212530 ignition[1050]: INFO : Ignition 2.14.0 Feb 9 12:26:02.212530 ignition[1050]: INFO : Stage: files Feb 9 12:26:02.212530 ignition[1050]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:26:02.212530 ignition[1050]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:26:02.212530 ignition[1050]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:26:02.293676 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1052) Feb 9 12:26:02.216860 unknown[1050]: wrote ssh authorized keys file for user: core Feb 9 12:26:02.302618 ignition[1050]: DEBUG : files: compiled without relabeling support, skipping Feb 9 12:26:02.302618 ignition[1050]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 12:26:02.302618 ignition[1050]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1948403047" Feb 9 12:26:02.302618 ignition[1050]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1948403047": device or resource busy Feb 9 12:26:02.302618 ignition[1050]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1948403047", trying btrfs: device or resource busy Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1948403047" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1948403047" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem1948403047" Feb 9 12:26:02.302618 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem1948403047" Feb 9 12:26:02.636620 kernel: audit: type=1130 audit(1707481562.490:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.474067 systemd[1]: Finished ignition-files.service. Feb 9 12:26:02.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.652030 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(c): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(c): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(d): [started] setting preset to enabled for "etcd-member.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(d): [finished] setting preset to enabled for "etcd-member.service" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 12:26:02.652030 ignition[1050]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 12:26:02.652030 ignition[1050]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 12:26:02.652030 ignition[1050]: INFO : files: files passed Feb 9 12:26:02.652030 ignition[1050]: INFO : POST message to Packet Timeline Feb 9 12:26:02.652030 ignition[1050]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:26:02.652030 ignition[1050]: INFO : GET result: OK Feb 9 12:26:02.652030 ignition[1050]: INFO : Ignition finished successfully Feb 9 12:26:02.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.497068 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 12:26:03.093841 initrd-setup-root-after-ignition[1081]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 12:26:02.558632 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 12:26:02.558937 systemd[1]: Starting ignition-quench.service... Feb 9 12:26:02.598650 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 12:26:03.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.622833 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 12:26:02.622928 systemd[1]: Finished ignition-quench.service. Feb 9 12:26:03.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.644878 systemd[1]: Reached target ignition-complete.target. Feb 9 12:26:03.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.662530 systemd[1]: Starting initrd-parse-etc.service... Feb 9 12:26:02.704503 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 12:26:02.704589 systemd[1]: Finished initrd-parse-etc.service. Feb 9 12:26:02.716689 systemd[1]: Reached target initrd-fs.target. Feb 9 12:26:02.735665 systemd[1]: Reached target initrd.target. Feb 9 12:26:03.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.746907 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 12:26:03.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.749103 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 12:26:03.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.789760 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 12:26:03.346470 ignition[1096]: INFO : Ignition 2.14.0 Feb 9 12:26:03.346470 ignition[1096]: INFO : Stage: umount Feb 9 12:26:03.346470 ignition[1096]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:26:03.346470 ignition[1096]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:26:03.346470 ignition[1096]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:26:03.346470 ignition[1096]: INFO : umount: umount passed Feb 9 12:26:03.346470 ignition[1096]: INFO : POST message to Packet Timeline Feb 9 12:26:03.346470 ignition[1096]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:26:03.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.819051 systemd[1]: Starting initrd-cleanup.service... Feb 9 12:26:03.498701 iscsid[900]: iscsid shutting down. Feb 9 12:26:03.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.512895 ignition[1096]: INFO : GET result: OK Feb 9 12:26:03.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.851447 systemd[1]: Stopped target nss-lookup.target. Feb 9 12:26:02.869957 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 12:26:03.558709 ignition[1096]: INFO : Ignition finished successfully Feb 9 12:26:02.891007 systemd[1]: Stopped target timers.target. Feb 9 12:26:02.910943 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 12:26:03.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.911305 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 12:26:03.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:02.933265 systemd[1]: Stopped target initrd.target. Feb 9 12:26:03.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.627000 audit: BPF prog-id=6 op=UNLOAD Feb 9 12:26:02.955065 systemd[1]: Stopped target basic.target. Feb 9 12:26:02.977955 systemd[1]: Stopped target ignition-complete.target. Feb 9 12:26:03.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.001956 systemd[1]: Stopped target ignition-diskful.target. Feb 9 12:26:03.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.017054 systemd[1]: Stopped target initrd-root-device.target. Feb 9 12:26:03.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.034966 systemd[1]: Stopped target remote-fs.target. Feb 9 12:26:03.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.052941 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 12:26:03.067973 systemd[1]: Stopped target sysinit.target. Feb 9 12:26:03.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.084077 systemd[1]: Stopped target local-fs.target. Feb 9 12:26:03.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.101960 systemd[1]: Stopped target local-fs-pre.target. Feb 9 12:26:03.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.124949 systemd[1]: Stopped target swap.target. Feb 9 12:26:03.149947 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 12:26:03.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.150308 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 12:26:03.165175 systemd[1]: Stopped target cryptsetup.target. Feb 9 12:26:03.180764 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 12:26:03.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.181111 systemd[1]: Stopped dracut-initqueue.service. Feb 9 12:26:03.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.198107 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 12:26:03.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.198483 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 12:26:03.213107 systemd[1]: Stopped target paths.target. Feb 9 12:26:03.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.227777 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 12:26:03.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.231716 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 12:26:03.243900 systemd[1]: Stopped target slices.target. Feb 9 12:26:03.259057 systemd[1]: Stopped target sockets.target. Feb 9 12:26:03.273958 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 12:26:03.274338 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 12:26:03.291059 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 12:26:03.291418 systemd[1]: Stopped ignition-files.service. Feb 9 12:26:03.306001 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 12:26:03.306355 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 12:26:03.327111 systemd[1]: Stopping ignition-mount.service... Feb 9 12:26:03.339671 systemd[1]: Stopping iscsid.service... Feb 9 12:26:03.353558 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 12:26:03.353652 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 12:26:03.362277 systemd[1]: Stopping sysroot-boot.service... Feb 9 12:26:03.374632 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 12:26:04.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:03.374787 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 12:26:03.392934 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 12:26:03.393144 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 12:26:03.432895 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 12:26:03.433283 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 12:26:03.433330 systemd[1]: Stopped iscsid.service. Feb 9 12:26:03.439822 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 12:26:03.439862 systemd[1]: Stopped sysroot-boot.service. Feb 9 12:26:03.453992 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 12:26:03.454060 systemd[1]: Closed iscsid.socket. Feb 9 12:26:03.474656 systemd[1]: Stopping iscsiuio.service... Feb 9 12:26:03.491879 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 12:26:03.492017 systemd[1]: Stopped iscsiuio.service. Feb 9 12:26:03.506306 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 12:26:03.506553 systemd[1]: Finished initrd-cleanup.service. Feb 9 12:26:03.522802 systemd[1]: Stopped target network.target. Feb 9 12:26:03.535730 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 12:26:03.535827 systemd[1]: Closed iscsiuio.socket. Feb 9 12:26:03.550933 systemd[1]: Stopping systemd-networkd.service... Feb 9 12:26:03.560527 systemd-networkd[881]: enp1s0f1np1: DHCPv6 lease lost Feb 9 12:26:03.565817 systemd[1]: Stopping systemd-resolved.service... Feb 9 12:26:04.144377 systemd-journald[266]: Received SIGTERM from PID 1 (n/a). Feb 9 12:26:03.573522 systemd-networkd[881]: enp1s0f0np0: DHCPv6 lease lost Feb 9 12:26:03.582196 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 12:26:04.143000 audit: BPF prog-id=9 op=UNLOAD Feb 9 12:26:03.582451 systemd[1]: Stopped systemd-resolved.service. Feb 9 12:26:03.597294 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 12:26:03.597558 systemd[1]: Stopped systemd-networkd.service. Feb 9 12:26:03.613172 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 12:26:03.613397 systemd[1]: Stopped ignition-mount.service. Feb 9 12:26:03.629027 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 12:26:03.629110 systemd[1]: Closed systemd-networkd.socket. Feb 9 12:26:03.644654 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 12:26:03.644801 systemd[1]: Stopped ignition-disks.service. Feb 9 12:26:03.659831 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 12:26:03.659972 systemd[1]: Stopped ignition-kargs.service. Feb 9 12:26:03.675852 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 12:26:03.676001 systemd[1]: Stopped ignition-setup.service. Feb 9 12:26:03.691850 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 12:26:03.691993 systemd[1]: Stopped initrd-setup-root.service. Feb 9 12:26:03.709630 systemd[1]: Stopping network-cleanup.service... Feb 9 12:26:03.721566 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 12:26:03.721806 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 12:26:03.737926 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 12:26:03.738078 systemd[1]: Stopped systemd-sysctl.service. Feb 9 12:26:03.753064 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 12:26:03.753204 systemd[1]: Stopped systemd-modules-load.service. Feb 9 12:26:03.769081 systemd[1]: Stopping systemd-udevd.service... Feb 9 12:26:03.786894 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 12:26:03.788322 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 12:26:03.788671 systemd[1]: Stopped systemd-udevd.service. Feb 9 12:26:03.800188 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 12:26:03.800326 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 12:26:03.813756 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 12:26:03.813861 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 12:26:03.829546 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 12:26:03.829674 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 12:26:03.844743 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 12:26:03.844868 systemd[1]: Stopped dracut-cmdline.service. Feb 9 12:26:03.861837 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 12:26:03.862020 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 12:26:03.879492 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 12:26:03.895389 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 12:26:03.895417 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 12:26:03.909618 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 12:26:03.909674 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 12:26:04.048139 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 12:26:04.048400 systemd[1]: Stopped network-cleanup.service. Feb 9 12:26:04.061853 systemd[1]: Reached target initrd-switch-root.target. Feb 9 12:26:04.081268 systemd[1]: Starting initrd-switch-root.service... Feb 9 12:26:04.102815 systemd[1]: Switching root. Feb 9 12:26:04.145385 systemd-journald[266]: Journal stopped Feb 9 12:26:08.102170 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 12:26:08.102185 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 12:26:08.102193 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 12:26:08.102199 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 12:26:08.102204 kernel: SELinux: policy capability open_perms=1 Feb 9 12:26:08.102209 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 12:26:08.102215 kernel: SELinux: policy capability always_check_network=0 Feb 9 12:26:08.102220 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 12:26:08.102226 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 12:26:08.102232 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 12:26:08.102238 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 12:26:08.102244 systemd[1]: Successfully loaded SELinux policy in 300.904ms. Feb 9 12:26:08.102251 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.857ms. Feb 9 12:26:08.102257 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 12:26:08.102265 systemd[1]: Detected architecture x86-64. Feb 9 12:26:08.102271 systemd[1]: Detected first boot. Feb 9 12:26:08.102277 systemd[1]: Hostname set to . Feb 9 12:26:08.102283 systemd[1]: Initializing machine ID from random generator. Feb 9 12:26:08.102289 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 12:26:08.102295 systemd[1]: Populated /etc with preset unit settings. Feb 9 12:26:08.102301 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:26:08.102308 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:26:08.102315 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:26:08.102321 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 9 12:26:08.102327 kernel: audit: type=1334 audit(1707481566.435:92): prog-id=12 op=LOAD Feb 9 12:26:08.102333 kernel: audit: type=1334 audit(1707481566.435:93): prog-id=3 op=UNLOAD Feb 9 12:26:08.102338 kernel: audit: type=1334 audit(1707481566.498:94): prog-id=13 op=LOAD Feb 9 12:26:08.102344 kernel: audit: type=1334 audit(1707481566.519:95): prog-id=14 op=LOAD Feb 9 12:26:08.102350 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 12:26:08.102357 kernel: audit: type=1334 audit(1707481566.519:96): prog-id=4 op=UNLOAD Feb 9 12:26:08.102366 kernel: audit: type=1334 audit(1707481566.519:97): prog-id=5 op=UNLOAD Feb 9 12:26:08.102373 systemd[1]: Stopped initrd-switch-root.service. Feb 9 12:26:08.102379 kernel: audit: type=1131 audit(1707481566.520:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.102385 kernel: audit: type=1334 audit(1707481566.667:99): prog-id=12 op=UNLOAD Feb 9 12:26:08.102390 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 12:26:08.102398 kernel: audit: type=1130 audit(1707481566.681:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.102405 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 12:26:08.102411 kernel: audit: type=1131 audit(1707481566.681:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.102417 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 12:26:08.102423 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 12:26:08.102431 systemd[1]: Created slice system-getty.slice. Feb 9 12:26:08.102437 systemd[1]: Created slice system-modprobe.slice. Feb 9 12:26:08.102444 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 12:26:08.102451 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 12:26:08.102458 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 12:26:08.102464 systemd[1]: Created slice user.slice. Feb 9 12:26:08.102470 systemd[1]: Started systemd-ask-password-console.path. Feb 9 12:26:08.102476 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 12:26:08.102482 systemd[1]: Set up automount boot.automount. Feb 9 12:26:08.102488 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 12:26:08.102495 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 12:26:08.102501 systemd[1]: Stopped target initrd-fs.target. Feb 9 12:26:08.102508 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 12:26:08.102514 systemd[1]: Reached target integritysetup.target. Feb 9 12:26:08.102520 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 12:26:08.102527 systemd[1]: Reached target remote-fs.target. Feb 9 12:26:08.102533 systemd[1]: Reached target slices.target. Feb 9 12:26:08.102539 systemd[1]: Reached target swap.target. Feb 9 12:26:08.102545 systemd[1]: Reached target torcx.target. Feb 9 12:26:08.102551 systemd[1]: Reached target veritysetup.target. Feb 9 12:26:08.102558 systemd[1]: Listening on systemd-coredump.socket. Feb 9 12:26:08.102564 systemd[1]: Listening on systemd-initctl.socket. Feb 9 12:26:08.102571 systemd[1]: Listening on systemd-networkd.socket. Feb 9 12:26:08.102578 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 12:26:08.102585 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 12:26:08.102591 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 12:26:08.102599 systemd[1]: Mounting dev-hugepages.mount... Feb 9 12:26:08.102605 systemd[1]: Mounting dev-mqueue.mount... Feb 9 12:26:08.102611 systemd[1]: Mounting media.mount... Feb 9 12:26:08.102618 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 12:26:08.102624 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 12:26:08.102631 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 12:26:08.102637 systemd[1]: Mounting tmp.mount... Feb 9 12:26:08.102644 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 12:26:08.102651 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 12:26:08.102657 systemd[1]: Starting kmod-static-nodes.service... Feb 9 12:26:08.102664 systemd[1]: Starting modprobe@configfs.service... Feb 9 12:26:08.102670 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 12:26:08.102676 systemd[1]: Starting modprobe@drm.service... Feb 9 12:26:08.102683 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 12:26:08.102689 systemd[1]: Starting modprobe@fuse.service... Feb 9 12:26:08.102695 kernel: fuse: init (API version 7.34) Feb 9 12:26:08.102702 systemd[1]: Starting modprobe@loop.service... Feb 9 12:26:08.102709 kernel: loop: module loaded Feb 9 12:26:08.102715 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 12:26:08.102721 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 12:26:08.102728 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 12:26:08.102734 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 12:26:08.102740 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 12:26:08.102746 systemd[1]: Stopped systemd-journald.service. Feb 9 12:26:08.102753 systemd[1]: Starting systemd-journald.service... Feb 9 12:26:08.102760 systemd[1]: Starting systemd-modules-load.service... Feb 9 12:26:08.102769 systemd-journald[1246]: Journal started Feb 9 12:26:08.102793 systemd-journald[1246]: Runtime Journal (/run/log/journal/a736f4aa8eb54772b3181cdbd8f32576) is 8.0M, max 640.1M, 632.1M free. Feb 9 12:26:04.566000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 12:26:04.830000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 12:26:04.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 12:26:04.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 12:26:04.833000 audit: BPF prog-id=10 op=LOAD Feb 9 12:26:04.833000 audit: BPF prog-id=10 op=UNLOAD Feb 9 12:26:04.833000 audit: BPF prog-id=11 op=LOAD Feb 9 12:26:04.833000 audit: BPF prog-id=11 op=UNLOAD Feb 9 12:26:04.902000 audit[1136]: AVC avc: denied { associate } for pid=1136 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 12:26:04.902000 audit[1136]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1119 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:04.902000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 12:26:04.926000 audit[1136]: AVC avc: denied { associate } for pid=1136 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 12:26:04.926000 audit[1136]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1119 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:04.926000 audit: CWD cwd="/" Feb 9 12:26:04.926000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:04.926000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:04.926000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 12:26:06.435000 audit: BPF prog-id=12 op=LOAD Feb 9 12:26:06.435000 audit: BPF prog-id=3 op=UNLOAD Feb 9 12:26:06.498000 audit: BPF prog-id=13 op=LOAD Feb 9 12:26:06.519000 audit: BPF prog-id=14 op=LOAD Feb 9 12:26:06.519000 audit: BPF prog-id=4 op=UNLOAD Feb 9 12:26:06.519000 audit: BPF prog-id=5 op=UNLOAD Feb 9 12:26:06.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:06.667000 audit: BPF prog-id=12 op=UNLOAD Feb 9 12:26:06.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:06.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.073000 audit: BPF prog-id=15 op=LOAD Feb 9 12:26:08.074000 audit: BPF prog-id=16 op=LOAD Feb 9 12:26:08.074000 audit: BPF prog-id=17 op=LOAD Feb 9 12:26:08.074000 audit: BPF prog-id=13 op=UNLOAD Feb 9 12:26:08.074000 audit: BPF prog-id=14 op=UNLOAD Feb 9 12:26:08.098000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 12:26:08.098000 audit[1246]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcf79670c0 a2=4000 a3=7ffcf796715c items=0 ppid=1 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:08.098000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 12:26:06.434770 systemd[1]: Queued start job for default target multi-user.target. Feb 9 12:26:04.901710 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:26:06.521561 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 12:26:04.902244 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 12:26:04.902261 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 12:26:04.902286 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 12:26:04.902294 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 12:26:04.902318 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 12:26:04.902328 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 12:26:04.902485 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 12:26:04.902517 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 12:26:04.902528 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 12:26:04.903068 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 12:26:04.903097 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 12:26:04.903112 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 12:26:04.903124 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 12:26:04.903137 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 12:26:04.903148 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 12:26:06.098961 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:26:06.099102 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:26:06.099154 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:26:06.099244 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:26:06.099273 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 12:26:06.099307 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-09T12:26:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 12:26:08.133542 systemd[1]: Starting systemd-network-generator.service... Feb 9 12:26:08.156567 systemd[1]: Starting systemd-remount-fs.service... Feb 9 12:26:08.177416 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 12:26:08.210036 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 12:26:08.210057 systemd[1]: Stopped verity-setup.service. Feb 9 12:26:08.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.244408 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 12:26:08.259556 systemd[1]: Started systemd-journald.service. Feb 9 12:26:08.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.266896 systemd[1]: Mounted dev-hugepages.mount. Feb 9 12:26:08.274618 systemd[1]: Mounted dev-mqueue.mount. Feb 9 12:26:08.281605 systemd[1]: Mounted media.mount. Feb 9 12:26:08.288633 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 12:26:08.297606 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 12:26:08.306608 systemd[1]: Mounted tmp.mount. Feb 9 12:26:08.313699 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 12:26:08.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.321708 systemd[1]: Finished kmod-static-nodes.service. Feb 9 12:26:08.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.329735 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 12:26:08.329853 systemd[1]: Finished modprobe@configfs.service. Feb 9 12:26:08.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.338852 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 12:26:08.339016 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 12:26:08.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.347925 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 12:26:08.348123 systemd[1]: Finished modprobe@drm.service. Feb 9 12:26:08.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.357236 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 12:26:08.357567 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 12:26:08.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.366244 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 12:26:08.366566 systemd[1]: Finished modprobe@fuse.service. Feb 9 12:26:08.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.375187 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 12:26:08.375525 systemd[1]: Finished modprobe@loop.service. Feb 9 12:26:08.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.384195 systemd[1]: Finished systemd-modules-load.service. Feb 9 12:26:08.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.393254 systemd[1]: Finished systemd-network-generator.service. Feb 9 12:26:08.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.402132 systemd[1]: Finished systemd-remount-fs.service. Feb 9 12:26:08.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.411140 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 12:26:08.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.420608 systemd[1]: Reached target network-pre.target. Feb 9 12:26:08.431309 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 12:26:08.440042 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 12:26:08.447568 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 12:26:08.448570 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 12:26:08.456996 systemd[1]: Starting systemd-journal-flush.service... Feb 9 12:26:08.460831 systemd-journald[1246]: Time spent on flushing to /var/log/journal/a736f4aa8eb54772b3181cdbd8f32576 is 14.507ms for 1550 entries. Feb 9 12:26:08.460831 systemd-journald[1246]: System Journal (/var/log/journal/a736f4aa8eb54772b3181cdbd8f32576) is 8.0M, max 195.6M, 187.6M free. Feb 9 12:26:08.494348 systemd-journald[1246]: Received client request to flush runtime journal. Feb 9 12:26:08.472428 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 12:26:08.473007 systemd[1]: Starting systemd-random-seed.service... Feb 9 12:26:08.484468 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 12:26:08.484963 systemd[1]: Starting systemd-sysctl.service... Feb 9 12:26:08.492046 systemd[1]: Starting systemd-sysusers.service... Feb 9 12:26:08.498978 systemd[1]: Starting systemd-udev-settle.service... Feb 9 12:26:08.507525 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 12:26:08.515541 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 12:26:08.523561 systemd[1]: Finished systemd-journal-flush.service. Feb 9 12:26:08.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.531578 systemd[1]: Finished systemd-random-seed.service. Feb 9 12:26:08.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.539554 systemd[1]: Finished systemd-sysctl.service. Feb 9 12:26:08.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.547561 systemd[1]: Finished systemd-sysusers.service. Feb 9 12:26:08.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.556455 systemd[1]: Reached target first-boot-complete.target. Feb 9 12:26:08.564732 udevadm[1262]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 12:26:08.750895 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 12:26:08.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.759000 audit: BPF prog-id=18 op=LOAD Feb 9 12:26:08.759000 audit: BPF prog-id=19 op=LOAD Feb 9 12:26:08.759000 audit: BPF prog-id=7 op=UNLOAD Feb 9 12:26:08.759000 audit: BPF prog-id=8 op=UNLOAD Feb 9 12:26:08.761631 systemd[1]: Starting systemd-udevd.service... Feb 9 12:26:08.772857 systemd-udevd[1263]: Using default interface naming scheme 'v252'. Feb 9 12:26:08.793049 systemd[1]: Started systemd-udevd.service. Feb 9 12:26:08.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:08.803699 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 12:26:08.803000 audit: BPF prog-id=20 op=LOAD Feb 9 12:26:08.804908 systemd[1]: Starting systemd-networkd.service... Feb 9 12:26:08.823000 audit: BPF prog-id=21 op=LOAD Feb 9 12:26:08.837816 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 12:26:08.837876 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 12:26:08.837891 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1327) Feb 9 12:26:08.836000 audit: BPF prog-id=22 op=LOAD Feb 9 12:26:08.858114 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 12:26:08.873000 audit: BPF prog-id=23 op=LOAD Feb 9 12:26:08.875369 kernel: IPMI message handler: version 39.2 Feb 9 12:26:08.875474 systemd[1]: Starting systemd-userdbd.service... Feb 9 12:26:08.889367 kernel: ACPI: button: Power Button [PWRF] Feb 9 12:26:08.903367 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 12:26:08.921683 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 12:26:08.861000 audit[1338]: AVC avc: denied { confidentiality } for pid=1338 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 12:26:08.942371 kernel: ipmi device interface Feb 9 12:26:08.943366 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 12:26:08.943510 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 12:26:08.943623 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 12:26:08.861000 audit[1338]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9ec6887010 a1=4d8bc a2=7f9ec853fbc5 a3=5 items=42 ppid=1263 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:08.861000 audit: CWD cwd="/" Feb 9 12:26:08.861000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=1 name=(null) inode=14258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=2 name=(null) inode=14258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=3 name=(null) inode=14259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=4 name=(null) inode=14258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=5 name=(null) inode=14260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=6 name=(null) inode=14258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=7 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=8 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=9 name=(null) inode=14262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=10 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=11 name=(null) inode=14263 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=12 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=13 name=(null) inode=14264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=14 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=15 name=(null) inode=14265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=16 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=17 name=(null) inode=14266 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=18 name=(null) inode=14258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=19 name=(null) inode=14267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=20 name=(null) inode=14267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=21 name=(null) inode=14268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=22 name=(null) inode=14267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=23 name=(null) inode=14269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=24 name=(null) inode=14267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=25 name=(null) inode=14270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=26 name=(null) inode=14267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=27 name=(null) inode=14271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=28 name=(null) inode=14267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=29 name=(null) inode=14272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=30 name=(null) inode=14258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=31 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=32 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=33 name=(null) inode=14274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=34 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=35 name=(null) inode=14275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=36 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=37 name=(null) inode=14276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=38 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=39 name=(null) inode=14277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=40 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PATH item=41 name=(null) inode=14278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:26:08.861000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 12:26:08.949370 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 12:26:08.949502 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 12:26:08.953371 kernel: ipmi_si: IPMI System Interface driver Feb 9 12:26:08.953415 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 12:26:08.953535 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 12:26:08.953555 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 12:26:08.953571 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 12:26:08.953674 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 12:26:08.954874 systemd[1]: Started systemd-userdbd.service. Feb 9 12:26:09.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.151405 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 12:26:09.151436 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 12:26:09.184999 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 12:26:09.185026 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 12:26:09.231372 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 12:26:09.231533 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 12:26:09.295863 kernel: intel_rapl_common: Found RAPL domain package Feb 9 12:26:09.295921 kernel: intel_rapl_common: Found RAPL domain core Feb 9 12:26:09.295933 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 12:26:09.300179 systemd-networkd[1316]: bond0: netdev ready Feb 9 12:26:09.302315 systemd-networkd[1316]: lo: Link UP Feb 9 12:26:09.302318 systemd-networkd[1316]: lo: Gained carrier Feb 9 12:26:09.302801 systemd-networkd[1316]: Enumeration completed Feb 9 12:26:09.302862 systemd[1]: Started systemd-networkd.service. Feb 9 12:26:09.303092 systemd-networkd[1316]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 12:26:09.311369 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 12:26:09.316540 systemd-networkd[1316]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:79.network. Feb 9 12:26:09.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.353114 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 12:26:09.415423 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 12:26:09.578445 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 12:26:09.596422 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 12:26:09.599684 systemd[1]: Finished systemd-udev-settle.service. Feb 9 12:26:09.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.608145 systemd[1]: Starting lvm2-activation-early.service... Feb 9 12:26:09.622632 lvm[1371]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 12:26:09.652873 systemd[1]: Finished lvm2-activation-early.service. Feb 9 12:26:09.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.661480 systemd[1]: Reached target cryptsetup.target. Feb 9 12:26:09.669992 systemd[1]: Starting lvm2-activation.service... Feb 9 12:26:09.672065 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 12:26:09.718841 systemd[1]: Finished lvm2-activation.service. Feb 9 12:26:09.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.727499 systemd[1]: Reached target local-fs-pre.target. Feb 9 12:26:09.735448 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 12:26:09.735462 systemd[1]: Reached target local-fs.target. Feb 9 12:26:09.743453 systemd[1]: Reached target machines.target. Feb 9 12:26:09.752073 systemd[1]: Starting ldconfig.service... Feb 9 12:26:09.759091 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 12:26:09.759113 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:26:09.759649 systemd[1]: Starting systemd-boot-update.service... Feb 9 12:26:09.767952 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 12:26:09.777930 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 12:26:09.778015 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 12:26:09.778061 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 12:26:09.778652 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 12:26:09.778824 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1374 (bootctl) Feb 9 12:26:09.779412 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 12:26:09.795781 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 12:26:09.796061 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 12:26:09.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.798757 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 12:26:09.799322 systemd-tmpfiles[1378]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 12:26:09.802934 systemd-tmpfiles[1378]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 12:26:09.810711 systemd-tmpfiles[1378]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 12:26:09.850106 systemd-fsck[1382]: fsck.fat 4.2 (2021-01-31) Feb 9 12:26:09.850106 systemd-fsck[1382]: /dev/sda1: 789 files, 115332/258078 clusters Feb 9 12:26:09.850951 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 12:26:09.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.862179 systemd[1]: Mounting boot.mount... Feb 9 12:26:09.873483 systemd[1]: Mounted boot.mount. Feb 9 12:26:09.892366 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 12:26:09.896675 systemd[1]: Finished systemd-boot-update.service. Feb 9 12:26:09.915365 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 12:26:09.916518 systemd-networkd[1316]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 12:26:09.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.940706 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 12:26:09.951364 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:26:09.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:09.961126 systemd[1]: Starting audit-rules.service... Feb 9 12:26:09.969057 systemd[1]: Starting clean-ca-certificates.service... Feb 9 12:26:09.977973 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 12:26:09.977000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 12:26:09.977000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc67b6310 a2=420 a3=0 items=0 ppid=1386 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:09.977000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 12:26:09.979479 augenrules[1403]: No rules Feb 9 12:26:09.987458 systemd[1]: Starting systemd-resolved.service... Feb 9 12:26:09.995582 systemd[1]: Starting systemd-timesyncd.service... Feb 9 12:26:10.003867 systemd[1]: Starting systemd-update-utmp.service... Feb 9 12:26:10.011639 systemd[1]: Finished audit-rules.service. Feb 9 12:26:10.018512 systemd[1]: Finished clean-ca-certificates.service. Feb 9 12:26:10.026301 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 12:26:10.036784 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 12:26:10.037611 systemd[1]: Finished systemd-update-utmp.service. Feb 9 12:26:10.055908 ldconfig[1373]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 12:26:10.058410 systemd[1]: Finished ldconfig.service. Feb 9 12:26:10.065511 systemd-resolved[1408]: Positive Trust Anchors: Feb 9 12:26:10.065517 systemd-resolved[1408]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 12:26:10.065536 systemd-resolved[1408]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 12:26:10.069615 systemd-resolved[1408]: Using system hostname 'ci-3510.3.2-a-2ee450373d'. Feb 9 12:26:10.075511 systemd[1]: Started systemd-timesyncd.service. Feb 9 12:26:10.080434 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:26:10.080459 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 12:26:10.112525 systemd[1]: Reached target time-set.target. Feb 9 12:26:10.119402 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 12:26:10.119431 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 12:26:10.121063 systemd-networkd[1316]: bond0: Link UP Feb 9 12:26:10.121258 systemd-networkd[1316]: enp1s0f1np1: Link UP Feb 9 12:26:10.121386 systemd-networkd[1316]: enp1s0f1np1: Gained carrier Feb 9 12:26:10.122328 systemd-networkd[1316]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 12:26:10.155067 systemd[1]: Starting systemd-update-done.service... Feb 9 12:26:10.161364 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 12:26:10.161384 kernel: bond0: active interface up! Feb 9 12:26:10.184502 systemd[1]: Started systemd-resolved.service. Feb 9 12:26:10.201609 systemd[1]: Finished systemd-update-done.service. Feb 9 12:26:10.210377 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:26:10.217482 systemd[1]: Reached target network.target. Feb 9 12:26:10.225445 systemd[1]: Reached target nss-lookup.target. Feb 9 12:26:10.233440 systemd[1]: Reached target sysinit.target. Feb 9 12:26:10.241485 systemd[1]: Started motdgen.path. Feb 9 12:26:10.248467 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 12:26:10.258514 systemd[1]: Started logrotate.timer. Feb 9 12:26:10.263237 systemd-networkd[1316]: enp1s0f0np0: Link UP Feb 9 12:26:10.263406 systemd-networkd[1316]: bond0: Gained carrier Feb 9 12:26:10.263494 systemd-networkd[1316]: enp1s0f0np0: Gained carrier Feb 9 12:26:10.263544 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.265444 systemd[1]: Started mdadm.timer. Feb 9 12:26:10.280458 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 12:26:10.287405 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:26:10.287428 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 9 12:26:10.289504 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.321456 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 12:26:10.321474 systemd[1]: Reached target paths.target. Feb 9 12:26:10.324371 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 12:26:10.324422 systemd-networkd[1316]: enp1s0f1np1: Link DOWN Feb 9 12:26:10.324425 systemd-networkd[1316]: enp1s0f1np1: Lost carrier Feb 9 12:26:10.331438 systemd[1]: Reached target timers.target. Feb 9 12:26:10.337512 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.337670 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.338585 systemd[1]: Listening on dbus.socket. Feb 9 12:26:10.345972 systemd[1]: Starting docker.socket... Feb 9 12:26:10.353751 systemd[1]: Listening on sshd.socket. Feb 9 12:26:10.360493 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:26:10.360896 systemd[1]: Listening on docker.socket. Feb 9 12:26:10.367488 systemd[1]: Reached target sockets.target. Feb 9 12:26:10.375452 systemd[1]: Reached target basic.target. Feb 9 12:26:10.382459 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 12:26:10.382474 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 12:26:10.382970 systemd[1]: Starting containerd.service... Feb 9 12:26:10.389875 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 12:26:10.398895 systemd[1]: Starting coreos-metadata.service... Feb 9 12:26:10.405917 systemd[1]: Starting dbus.service... Feb 9 12:26:10.411900 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 12:26:10.415948 jq[1424]: false Feb 9 12:26:10.417280 coreos-metadata[1417]: Feb 09 12:26:10.417 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:26:10.418953 systemd[1]: Starting extend-filesystems.service... Feb 9 12:26:10.422289 dbus-daemon[1423]: [system] SELinux support is enabled Feb 9 12:26:10.425463 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 12:26:10.425598 coreos-metadata[1420]: Feb 09 12:26:10.425 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:26:10.426063 systemd[1]: Starting motdgen.service... Feb 9 12:26:10.426285 extend-filesystems[1426]: Found sda Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda1 Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda2 Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda3 Feb 9 12:26:10.446484 extend-filesystems[1426]: Found usr Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda4 Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda6 Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda7 Feb 9 12:26:10.446484 extend-filesystems[1426]: Found sda9 Feb 9 12:26:10.446484 extend-filesystems[1426]: Checking size of /dev/sda9 Feb 9 12:26:10.446484 extend-filesystems[1426]: Resized partition /dev/sda9 Feb 9 12:26:10.620402 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 12:26:10.620422 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 12:26:10.620520 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 9 12:26:10.620541 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 9 12:26:10.620552 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 12:26:10.433150 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 12:26:10.620655 extend-filesystems[1441]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 12:26:10.463151 systemd[1]: Starting sshd-keygen.service... Feb 9 12:26:10.631406 dbus-daemon[1423]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 12:26:10.482789 systemd[1]: Starting systemd-logind.service... Feb 9 12:26:10.636707 sshd_keygen[1450]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 12:26:10.518444 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:26:10.636786 update_engine[1453]: I0209 12:26:10.585304 1453 main.cc:92] Flatcar Update Engine starting Feb 9 12:26:10.636786 update_engine[1453]: I0209 12:26:10.588799 1453 update_check_scheduler.cc:74] Next update check in 5m5s Feb 9 12:26:10.519376 systemd[1]: Starting tcsd.service... Feb 9 12:26:10.636979 jq[1454]: true Feb 9 12:26:10.524521 systemd-networkd[1316]: enp1s0f1np1: Link UP Feb 9 12:26:10.524690 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.637146 jq[1463]: true Feb 9 12:26:10.524748 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.524780 systemd-networkd[1316]: enp1s0f1np1: Gained carrier Feb 9 12:26:10.537623 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 12:26:10.538259 systemd[1]: Starting update-engine.service... Feb 9 12:26:10.538501 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.538537 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.538620 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:10.548759 systemd-logind[1451]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 12:26:10.548769 systemd-logind[1451]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 12:26:10.548778 systemd-logind[1451]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 12:26:10.568469 systemd-logind[1451]: New seat seat0. Feb 9 12:26:10.569230 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 12:26:10.583685 systemd[1]: Started dbus.service. Feb 9 12:26:10.600151 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 12:26:10.600243 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 12:26:10.600405 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 12:26:10.600484 systemd[1]: Finished motdgen.service. Feb 9 12:26:10.606569 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 12:26:10.606648 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 12:26:10.632118 systemd[1]: Finished sshd-keygen.service. Feb 9 12:26:10.640179 env[1464]: time="2024-02-09T12:26:10.640158018Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 12:26:10.643773 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 12:26:10.643866 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 12:26:10.648447 env[1464]: time="2024-02-09T12:26:10.648432269Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 12:26:10.648505 env[1464]: time="2024-02-09T12:26:10.648496843Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649050 env[1464]: time="2024-02-09T12:26:10.649035087Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649071 env[1464]: time="2024-02-09T12:26:10.649050575Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649166 env[1464]: time="2024-02-09T12:26:10.649155881Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649189 env[1464]: time="2024-02-09T12:26:10.649166212Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649189 env[1464]: time="2024-02-09T12:26:10.649173858Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 12:26:10.649189 env[1464]: time="2024-02-09T12:26:10.649179373Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649238 env[1464]: time="2024-02-09T12:26:10.649218608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649349 env[1464]: time="2024-02-09T12:26:10.649341605Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649421 env[1464]: time="2024-02-09T12:26:10.649411684Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:26:10.649442 env[1464]: time="2024-02-09T12:26:10.649421610Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 12:26:10.649462 env[1464]: time="2024-02-09T12:26:10.649447810Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 12:26:10.649462 env[1464]: time="2024-02-09T12:26:10.649455781Z" level=info msg="metadata content store policy set" policy=shared Feb 9 12:26:10.651303 systemd[1]: Started systemd-logind.service. Feb 9 12:26:10.662394 systemd[1]: Started update-engine.service. Feb 9 12:26:10.668565 env[1464]: time="2024-02-09T12:26:10.668550862Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668569550Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668577847Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668598307Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668607426Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668615006Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668621843Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668628818Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668636462Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668643936Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668655289Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.669991 env[1464]: time="2024-02-09T12:26:10.668665144Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 12:26:10.670164 env[1464]: time="2024-02-09T12:26:10.670027728Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 12:26:10.670164 env[1464]: time="2024-02-09T12:26:10.670073396Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 12:26:10.670228 env[1464]: time="2024-02-09T12:26:10.670219772Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 12:26:10.670247 env[1464]: time="2024-02-09T12:26:10.670235359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670247 env[1464]: time="2024-02-09T12:26:10.670243391Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 12:26:10.670278 env[1464]: time="2024-02-09T12:26:10.670269772Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670295 env[1464]: time="2024-02-09T12:26:10.670277385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670295 env[1464]: time="2024-02-09T12:26:10.670284221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670295 env[1464]: time="2024-02-09T12:26:10.670290554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670358 env[1464]: time="2024-02-09T12:26:10.670297291Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670358 env[1464]: time="2024-02-09T12:26:10.670304294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670358 env[1464]: time="2024-02-09T12:26:10.670310703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670358 env[1464]: time="2024-02-09T12:26:10.670316582Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670358 env[1464]: time="2024-02-09T12:26:10.670323493Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 12:26:10.670443 env[1464]: time="2024-02-09T12:26:10.670404276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670443 env[1464]: time="2024-02-09T12:26:10.670414716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670443 env[1464]: time="2024-02-09T12:26:10.670421463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670443 env[1464]: time="2024-02-09T12:26:10.670427547Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 12:26:10.670443 env[1464]: time="2024-02-09T12:26:10.670435298Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 12:26:10.670520 env[1464]: time="2024-02-09T12:26:10.670444733Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 12:26:10.670520 env[1464]: time="2024-02-09T12:26:10.670454644Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 12:26:10.670520 env[1464]: time="2024-02-09T12:26:10.670477747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 12:26:10.670631 env[1464]: time="2024-02-09T12:26:10.670602122Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 12:26:10.672353 env[1464]: time="2024-02-09T12:26:10.670638159Z" level=info msg="Connect containerd service" Feb 9 12:26:10.672353 env[1464]: time="2024-02-09T12:26:10.670660502Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 12:26:10.672705 systemd[1]: Starting issuegen.service... Feb 9 12:26:10.673583 env[1464]: time="2024-02-09T12:26:10.673570142Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 12:26:10.673706 env[1464]: time="2024-02-09T12:26:10.673686434Z" level=info msg="Start subscribing containerd event" Feb 9 12:26:10.673738 env[1464]: time="2024-02-09T12:26:10.673711350Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 12:26:10.673738 env[1464]: time="2024-02-09T12:26:10.673722076Z" level=info msg="Start recovering state" Feb 9 12:26:10.675679 env[1464]: time="2024-02-09T12:26:10.673741047Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 12:26:10.675679 env[1464]: time="2024-02-09T12:26:10.673755175Z" level=info msg="Start event monitor" Feb 9 12:26:10.675679 env[1464]: time="2024-02-09T12:26:10.673762339Z" level=info msg="Start snapshots syncer" Feb 9 12:26:10.675679 env[1464]: time="2024-02-09T12:26:10.673767397Z" level=info msg="Start cni network conf syncer for default" Feb 9 12:26:10.675679 env[1464]: time="2024-02-09T12:26:10.673767923Z" level=info msg="containerd successfully booted in 0.033951s" Feb 9 12:26:10.675679 env[1464]: time="2024-02-09T12:26:10.673778077Z" level=info msg="Start streaming server" Feb 9 12:26:10.676282 bash[1497]: Updated "/home/core/.ssh/authorized_keys" Feb 9 12:26:10.681457 systemd[1]: Started locksmithd.service. Feb 9 12:26:10.689472 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 12:26:10.689553 systemd[1]: Reached target system-config.target. Feb 9 12:26:10.698449 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 12:26:10.698516 systemd[1]: Reached target user-config.target. Feb 9 12:26:10.708901 systemd[1]: Started containerd.service. Feb 9 12:26:10.715604 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 12:26:10.725576 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 12:26:10.725650 systemd[1]: Finished issuegen.service. Feb 9 12:26:10.733161 systemd[1]: Starting systemd-user-sessions.service... Feb 9 12:26:10.737228 locksmithd[1507]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 12:26:10.742586 systemd[1]: Finished systemd-user-sessions.service. Feb 9 12:26:10.752063 systemd[1]: Started getty@tty1.service. Feb 9 12:26:10.759988 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 12:26:10.768551 systemd[1]: Reached target getty.target. Feb 9 12:26:10.959404 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 12:26:10.986089 extend-filesystems[1441]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 12:26:10.986089 extend-filesystems[1441]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 12:26:10.986089 extend-filesystems[1441]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 12:26:11.026477 extend-filesystems[1426]: Resized filesystem in /dev/sda9 Feb 9 12:26:11.026477 extend-filesystems[1426]: Found sdb Feb 9 12:26:10.986581 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 12:26:10.986665 systemd[1]: Finished extend-filesystems.service. Feb 9 12:26:11.546430 systemd-networkd[1316]: bond0: Gained IPv6LL Feb 9 12:26:11.546775 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:11.803576 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:11.803774 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:11.805069 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 12:26:11.815695 systemd[1]: Reached target network-online.target. Feb 9 12:26:12.805416 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 12:26:15.796326 login[1513]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 12:26:15.797835 login[1514]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 12:26:15.805291 systemd-logind[1451]: New session 1 of user core. Feb 9 12:26:15.805964 systemd[1]: Created slice user-500.slice. Feb 9 12:26:15.806535 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 12:26:15.811512 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 12:26:15.812176 systemd[1]: Starting user@500.service... Feb 9 12:26:15.814044 (systemd)[1519]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:15.881874 systemd[1519]: Queued start job for default target default.target. Feb 9 12:26:15.882097 systemd[1519]: Reached target paths.target. Feb 9 12:26:15.882131 systemd[1519]: Reached target sockets.target. Feb 9 12:26:15.882139 systemd[1519]: Reached target timers.target. Feb 9 12:26:15.882145 systemd[1519]: Reached target basic.target. Feb 9 12:26:15.882165 systemd[1519]: Reached target default.target. Feb 9 12:26:15.882178 systemd[1519]: Startup finished in 64ms. Feb 9 12:26:15.882207 systemd[1]: Started user@500.service. Feb 9 12:26:15.882827 systemd[1]: Started session-1.scope. Feb 9 12:26:16.796982 login[1513]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 12:26:16.807703 systemd-logind[1451]: New session 2 of user core. Feb 9 12:26:16.811131 systemd[1]: Started session-2.scope. Feb 9 12:26:18.249410 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 12:26:18.249589 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 12:26:18.258948 coreos-metadata[1420]: Feb 09 12:26:18.258 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): connection error: Connection reset by peer (os error 104) Feb 9 12:26:19.259402 coreos-metadata[1420]: Feb 09 12:26:19.259 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 12:26:19.284102 coreos-metadata[1420]: Feb 09 12:26:19.283 INFO Fetch successful Feb 9 12:26:19.308692 systemd[1]: Finished coreos-metadata.service. Feb 9 12:26:19.309613 systemd[1]: Starting etcd-member.service... Feb 9 12:26:19.310222 systemd[1]: Started packet-phone-home.service. Feb 9 12:26:19.315416 curl[1542]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 12:26:19.315588 curl[1542]: Dload Upload Total Spent Left Speed Feb 9 12:26:19.326590 systemd[1]: Starting docker.service... Feb 9 12:26:19.344990 env[1558]: time="2024-02-09T12:26:19.344944651Z" level=info msg="Starting up" Feb 9 12:26:19.345777 env[1558]: time="2024-02-09T12:26:19.345738052Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 12:26:19.345777 env[1558]: time="2024-02-09T12:26:19.345746936Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 12:26:19.345777 env[1558]: time="2024-02-09T12:26:19.345758138Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 12:26:19.345777 env[1558]: time="2024-02-09T12:26:19.345763952Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 12:26:19.346727 env[1558]: time="2024-02-09T12:26:19.346715799Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 12:26:19.346727 env[1558]: time="2024-02-09T12:26:19.346724063Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 12:26:19.346791 env[1558]: time="2024-02-09T12:26:19.346733462Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 12:26:19.346791 env[1558]: time="2024-02-09T12:26:19.346741929Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 12:26:19.359844 env[1558]: time="2024-02-09T12:26:19.359831997Z" level=info msg="Loading containers: start." Feb 9 12:26:19.501724 curl[1542]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 12:26:19.503388 kernel: Initializing XFRM netlink socket Feb 9 12:26:19.504141 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 12:26:19.562668 env[1558]: time="2024-02-09T12:26:19.562625641Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 12:26:19.563404 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:19.563477 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:19.567132 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:19.567233 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:19.609923 systemd-networkd[1316]: docker0: Link UP Feb 9 12:26:19.610060 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 9 12:26:19.645195 env[1558]: time="2024-02-09T12:26:19.645086101Z" level=info msg="Loading containers: done." Feb 9 12:26:19.665106 env[1558]: time="2024-02-09T12:26:19.664980214Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 12:26:19.665681 env[1558]: time="2024-02-09T12:26:19.665573067Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 12:26:19.665984 env[1558]: time="2024-02-09T12:26:19.665886139Z" level=info msg="Daemon has completed initialization" Feb 9 12:26:19.668930 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1086266972-merged.mount: Deactivated successfully. Feb 9 12:26:19.690865 systemd[1]: Started docker.service. Feb 9 12:26:19.706977 env[1558]: time="2024-02-09T12:26:19.706839777Z" level=info msg="API listen on /run/docker.sock" Feb 9 12:26:19.709046 etcd-wrapper[1546]: Error response from daemon: No such container: etcd-member Feb 9 12:26:19.755857 etcd-wrapper[1681]: Error: No such container: etcd-member Feb 9 12:26:19.802147 etcd-wrapper[1703]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 12:26:19.897215 systemd[1]: Created slice system-sshd.slice. Feb 9 12:26:19.900131 systemd[1]: Started sshd@0-139.178.89.23:22-147.75.109.163:39752.service. Feb 9 12:26:19.997483 sshd[1716]: Accepted publickey for core from 147.75.109.163 port 39752 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:20.000620 sshd[1716]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:20.010559 systemd-logind[1451]: New session 3 of user core. Feb 9 12:26:20.014482 systemd[1]: Started session-3.scope. Feb 9 12:26:20.077885 systemd[1]: Started sshd@1-139.178.89.23:22-147.75.109.163:39754.service. Feb 9 12:26:20.114767 sshd[1722]: Accepted publickey for core from 147.75.109.163 port 39754 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:20.115417 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:20.117648 systemd-logind[1451]: New session 4 of user core. Feb 9 12:26:20.118060 systemd[1]: Started session-4.scope. Feb 9 12:26:20.169501 sshd[1722]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:20.172330 systemd[1]: sshd@1-139.178.89.23:22-147.75.109.163:39754.service: Deactivated successfully. Feb 9 12:26:20.173010 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 12:26:20.173685 systemd-logind[1451]: Session 4 logged out. Waiting for processes to exit. Feb 9 12:26:20.174756 systemd[1]: Started sshd@2-139.178.89.23:22-147.75.109.163:39766.service. Feb 9 12:26:20.175745 systemd-logind[1451]: Removed session 4. Feb 9 12:26:20.230140 sshd[1728]: Accepted publickey for core from 147.75.109.163 port 39766 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:20.233411 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:20.243662 systemd-logind[1451]: New session 5 of user core. Feb 9 12:26:20.246077 systemd[1]: Started session-5.scope. Feb 9 12:26:20.327046 sshd[1728]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:20.332768 systemd[1]: sshd@2-139.178.89.23:22-147.75.109.163:39766.service: Deactivated successfully. Feb 9 12:26:20.334507 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 12:26:20.336195 systemd-logind[1451]: Session 5 logged out. Waiting for processes to exit. Feb 9 12:26:20.338421 systemd-logind[1451]: Removed session 5. Feb 9 12:26:21.206156 etcd-wrapper[1703]: v3.5.0: Pulling from coreos/etcd Feb 9 12:26:21.516278 etcd-wrapper[1703]: 1813d21adc01: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 6e96907ab677: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 444ed0ea8673: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 0fd2df5633f0: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 8cc22b9456bb: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 7ac70aecd290: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 4b376c64dfe4: Pulling fs layer Feb 9 12:26:21.516278 etcd-wrapper[1703]: 0fd2df5633f0: Waiting Feb 9 12:26:21.516278 etcd-wrapper[1703]: 8cc22b9456bb: Waiting Feb 9 12:26:21.517224 etcd-wrapper[1703]: 7ac70aecd290: Waiting Feb 9 12:26:21.866431 etcd-wrapper[1703]: 444ed0ea8673: Verifying Checksum Feb 9 12:26:21.866431 etcd-wrapper[1703]: 444ed0ea8673: Download complete Feb 9 12:26:21.878260 etcd-wrapper[1703]: 6e96907ab677: Verifying Checksum Feb 9 12:26:21.878260 etcd-wrapper[1703]: 6e96907ab677: Download complete Feb 9 12:26:22.153306 etcd-wrapper[1703]: 1813d21adc01: Verifying Checksum Feb 9 12:26:22.153306 etcd-wrapper[1703]: 1813d21adc01: Download complete Feb 9 12:26:22.184045 etcd-wrapper[1703]: 8cc22b9456bb: Verifying Checksum Feb 9 12:26:22.184045 etcd-wrapper[1703]: 8cc22b9456bb: Download complete Feb 9 12:26:22.222376 etcd-wrapper[1703]: 0fd2df5633f0: Download complete Feb 9 12:26:22.468842 etcd-wrapper[1703]: 7ac70aecd290: Verifying Checksum Feb 9 12:26:22.468842 etcd-wrapper[1703]: 7ac70aecd290: Download complete Feb 9 12:26:22.494573 etcd-wrapper[1703]: 4b376c64dfe4: Verifying Checksum Feb 9 12:26:22.494573 etcd-wrapper[1703]: 4b376c64dfe4: Download complete Feb 9 12:26:22.637657 etcd-wrapper[1703]: 1813d21adc01: Pull complete Feb 9 12:26:22.886189 systemd[1]: var-lib-docker-overlay2-dfd3dd525b19be140330c2d9ba79f14aa53023f7a25ffbd735728bdf00bcc742-merged.mount: Deactivated successfully. Feb 9 12:26:23.160169 etcd-wrapper[1703]: 6e96907ab677: Pull complete Feb 9 12:26:23.317633 systemd[1]: var-lib-docker-overlay2-4b172becfe8bdd1160ee46d3a4f6b27b7a155674e0a0e5ca5c8d24199f1c2c10-merged.mount: Deactivated successfully. Feb 9 12:26:23.388649 etcd-wrapper[1703]: 444ed0ea8673: Pull complete Feb 9 12:26:23.591135 etcd-wrapper[1703]: 0fd2df5633f0: Pull complete Feb 9 12:26:23.611604 coreos-metadata[1417]: Feb 09 12:26:23.611 INFO Fetch successful Feb 9 12:26:23.621947 etcd-wrapper[1703]: 8cc22b9456bb: Pull complete Feb 9 12:26:23.642757 systemd[1]: var-lib-docker-overlay2-95810df2257b21531422d7f73c0a6aee50e84e68dceb1f2e07945321202be2eb-merged.mount: Deactivated successfully. Feb 9 12:26:23.664815 etcd-wrapper[1703]: 7ac70aecd290: Pull complete Feb 9 12:26:23.691012 systemd[1]: var-lib-docker-overlay2-81ce938ffac5927f7dd19e2292d692af8b4117536ca48d1fc33f60a697aec111-merged.mount: Deactivated successfully. Feb 9 12:26:23.694202 etcd-wrapper[1703]: 4b376c64dfe4: Pull complete Feb 9 12:26:23.697947 etcd-wrapper[1703]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 12:26:23.699065 etcd-wrapper[1703]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 12:26:23.706520 systemd[1]: var-lib-docker-overlay2-b71ef439c79b0792ef4b53b4dd6dba813a8a57029b635c31843be66a667d256a\x2dinit-merged.mount: Deactivated successfully. Feb 9 12:26:23.801234 env[1464]: time="2024-02-09T12:26:23.801096941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:26:23.801234 env[1464]: time="2024-02-09T12:26:23.801145942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:26:23.801234 env[1464]: time="2024-02-09T12:26:23.801164822Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:26:23.801811 env[1464]: time="2024-02-09T12:26:23.801325874Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/ed53dad35b97e3a520f3c616513371024ce5160008dd77f38424533b88c61115 pid=1901 runtime=io.containerd.runc.v2 Feb 9 12:26:23.827485 systemd[1]: Started docker-ed53dad35b97e3a520f3c616513371024ce5160008dd77f38424533b88c61115.scope. Feb 9 12:26:23.869539 unknown[1417]: wrote ssh authorized keys file for user: core Feb 9 12:26:23.887205 update-ssh-keys[1935]: Updated "/home/core/.ssh/authorized_keys" Feb 9 12:26:23.888022 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 12:26:23.915405 etcd-wrapper[1703]: {"level":"info","ts":1707481583.91494,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 12:26:23.915405 etcd-wrapper[1703]: {"level":"info","ts":1707481583.915098,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"a736f4aa8eb54772b3181cdbd8f32576"} Feb 9 12:26:23.915405 etcd-wrapper[1703]: {"level":"warn","ts":1707481583.915171,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 12:26:23.915405 etcd-wrapper[1703]: {"level":"warn","ts":1707481583.915188,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 12:26:23.915405 etcd-wrapper[1703]: {"level":"warn","ts":1707481583.9152014,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 12:26:23.915405 etcd-wrapper[1703]: {"level":"warn","ts":1707481583.9152124,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 12:26:23.915980 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.915Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.23:2379"]} Feb 9 12:26:23.915980 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.915Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 9 12:26:23.916718 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.916Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 12:26:23.916951 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.916Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"a736f4aa8eb54772b3181cdbd8f32576","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.23:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"a736f4aa8eb54772b3181cdbd8f32576=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 12:26:23.918585 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.918Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"1.13745ms"} Feb 9 12:26:23.923130 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.922Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 9 12:26:23.923130 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.922Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 9 12:26:23.923130 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.922Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 9 12:26:23.923130 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.922Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 12:26:23.923130 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.922Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 9 12:26:23.923589 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.922Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 12:26:23.924911 etcd-wrapper[1703]: {"level":"warn","ts":"2024-02-09T12:26:23.924Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 12:26:23.925853 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.925Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 12:26:23.926338 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.926Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 12:26:23.926777 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.926Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 12:26:23.927573 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.926Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 9 12:26:23.928123 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.927Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 12:26:23.928631 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.928Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 9 12:26:23.931911 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.931Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.23:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 12:26:23.931911 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.931Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 9 12:26:23.931911 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:23.931Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.823Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.823Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.823Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 9 12:26:24.824466 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:a736f4aa8eb54772b3181cdbd8f32576 ClientURLs:[http://10.67.80.23:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.824Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.825Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.825Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 12:26:24.826195 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.825Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 12:26:24.825885 systemd[1]: Started etcd-member.service. Feb 9 12:26:24.826730 systemd[1]: Reached target multi-user.target. Feb 9 12:26:24.827673 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:26:24.827Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 12:26:24.830120 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 12:26:24.834733 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 12:26:24.834811 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 12:26:24.834950 systemd[1]: Startup finished in 1.849s (kernel) + 16.409s (initrd) + 20.593s (userspace) = 38.852s. Feb 9 12:26:30.222743 systemd[1]: Started sshd@3-139.178.89.23:22-201.131.212.19:37398.service. Feb 9 12:26:30.336963 systemd[1]: Started sshd@4-139.178.89.23:22-147.75.109.163:36878.service. Feb 9 12:26:30.379330 sshd[1958]: Accepted publickey for core from 147.75.109.163 port 36878 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:30.380155 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:30.383207 systemd-logind[1451]: New session 6 of user core. Feb 9 12:26:30.383883 systemd[1]: Started session-6.scope. Feb 9 12:26:30.439295 sshd[1958]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:30.440752 systemd[1]: sshd@4-139.178.89.23:22-147.75.109.163:36878.service: Deactivated successfully. Feb 9 12:26:30.441039 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 12:26:30.441284 systemd-logind[1451]: Session 6 logged out. Waiting for processes to exit. Feb 9 12:26:30.441800 systemd[1]: Started sshd@5-139.178.89.23:22-147.75.109.163:36884.service. Feb 9 12:26:30.442181 systemd-logind[1451]: Removed session 6. Feb 9 12:26:30.479471 sshd[1964]: Accepted publickey for core from 147.75.109.163 port 36884 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:30.480552 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:30.484294 systemd-logind[1451]: New session 7 of user core. Feb 9 12:26:30.485246 systemd[1]: Started session-7.scope. Feb 9 12:26:30.539775 sshd[1964]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:30.541341 systemd[1]: sshd@5-139.178.89.23:22-147.75.109.163:36884.service: Deactivated successfully. Feb 9 12:26:30.541689 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 12:26:30.542052 systemd-logind[1451]: Session 7 logged out. Waiting for processes to exit. Feb 9 12:26:30.542561 systemd[1]: Started sshd@6-139.178.89.23:22-147.75.109.163:36892.service. Feb 9 12:26:30.542970 systemd-logind[1451]: Removed session 7. Feb 9 12:26:30.580736 sshd[1970]: Accepted publickey for core from 147.75.109.163 port 36892 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:30.581891 sshd[1970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:30.586167 systemd-logind[1451]: New session 8 of user core. Feb 9 12:26:30.587130 systemd[1]: Started session-8.scope. Feb 9 12:26:30.656817 sshd[1970]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:30.663350 systemd[1]: sshd@6-139.178.89.23:22-147.75.109.163:36892.service: Deactivated successfully. Feb 9 12:26:30.664923 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 12:26:30.666518 systemd-logind[1451]: Session 8 logged out. Waiting for processes to exit. Feb 9 12:26:30.669178 systemd[1]: Started sshd@7-139.178.89.23:22-147.75.109.163:36908.service. Feb 9 12:26:30.671623 systemd-logind[1451]: Removed session 8. Feb 9 12:26:30.745221 sshd[1976]: Accepted publickey for core from 147.75.109.163 port 36908 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:30.748336 sshd[1976]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:30.758693 systemd-logind[1451]: New session 9 of user core. Feb 9 12:26:30.761122 systemd[1]: Started session-9.scope. Feb 9 12:26:30.857269 sudo[1979]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 12:26:30.857877 sudo[1979]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:26:30.883801 dbus-daemon[1423]: \xd0M\u0018\x9d4V: received setenforce notice (enforcing=1598354336) Feb 9 12:26:30.888133 sudo[1979]: pam_unix(sudo:session): session closed for user root Feb 9 12:26:30.889739 sshd[1976]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:30.891218 systemd[1]: sshd@7-139.178.89.23:22-147.75.109.163:36908.service: Deactivated successfully. Feb 9 12:26:30.891588 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 12:26:30.892028 systemd-logind[1451]: Session 9 logged out. Waiting for processes to exit. Feb 9 12:26:30.892492 systemd[1]: Started sshd@8-139.178.89.23:22-147.75.109.163:36922.service. Feb 9 12:26:30.892904 sshd[1955]: Invalid user mnouri from 201.131.212.19 port 37398 Feb 9 12:26:30.892977 systemd-logind[1451]: Removed session 9. Feb 9 12:26:30.894089 sshd[1955]: pam_faillock(sshd:auth): User unknown Feb 9 12:26:30.894258 sshd[1955]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:26:30.894274 sshd[1955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:26:30.894447 sshd[1955]: pam_faillock(sshd:auth): User unknown Feb 9 12:26:30.930471 sshd[1983]: Accepted publickey for core from 147.75.109.163 port 36922 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:30.931609 sshd[1983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:30.935721 systemd-logind[1451]: New session 10 of user core. Feb 9 12:26:30.936617 systemd[1]: Started session-10.scope. Feb 9 12:26:31.003421 sudo[1987]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 12:26:31.004297 sudo[1987]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:26:31.011665 sudo[1987]: pam_unix(sudo:session): session closed for user root Feb 9 12:26:31.024119 sudo[1986]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 12:26:31.024710 sudo[1986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:26:31.048860 systemd[1]: Stopping audit-rules.service... Feb 9 12:26:31.050000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 12:26:31.051982 auditctl[1990]: No rules Feb 9 12:26:31.052878 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 12:26:31.053328 systemd[1]: Stopped audit-rules.service. Feb 9 12:26:31.057295 systemd[1]: Starting audit-rules.service... Feb 9 12:26:31.057639 kernel: kauditd_printk_skb: 105 callbacks suppressed Feb 9 12:26:31.057768 kernel: audit: type=1305 audit(1707481591.050:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 12:26:31.069353 augenrules[2007]: No rules Feb 9 12:26:31.069655 systemd[1]: Finished audit-rules.service. Feb 9 12:26:31.070046 sudo[1986]: pam_unix(sudo:session): session closed for user root Feb 9 12:26:31.070831 sshd[1983]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:31.072164 systemd[1]: sshd@8-139.178.89.23:22-147.75.109.163:36922.service: Deactivated successfully. Feb 9 12:26:31.072481 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 12:26:31.050000 audit[1990]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff78ebf120 a2=420 a3=0 items=0 ppid=1 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:31.073069 systemd-logind[1451]: Session 10 logged out. Waiting for processes to exit. Feb 9 12:26:31.073582 systemd[1]: Started sshd@9-139.178.89.23:22-147.75.109.163:36924.service. Feb 9 12:26:31.074144 systemd-logind[1451]: Removed session 10. Feb 9 12:26:31.104193 kernel: audit: type=1300 audit(1707481591.050:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff78ebf120 a2=420 a3=0 items=0 ppid=1 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:31.104254 kernel: audit: type=1327 audit(1707481591.050:158): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 12:26:31.050000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 12:26:31.113801 kernel: audit: type=1131 audit(1707481591.052:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.136227 kernel: audit: type=1130 audit(1707481591.068:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.145558 sshd[2013]: Accepted publickey for core from 147.75.109.163 port 36924 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:31.146692 sshd[2013]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:31.149022 systemd-logind[1451]: New session 11 of user core. Feb 9 12:26:31.149616 systemd[1]: Started session-11.scope. Feb 9 12:26:31.158720 kernel: audit: type=1106 audit(1707481591.068:161): pid=1986 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.068000 audit[1986]: USER_END pid=1986 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.184823 kernel: audit: type=1104 audit(1707481591.068:162): pid=1986 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.068000 audit[1986]: CRED_DISP pid=1986 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.195631 sshd[2013]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:31.197086 systemd[1]: sshd@9-139.178.89.23:22-147.75.109.163:36924.service: Deactivated successfully. Feb 9 12:26:31.197402 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 12:26:31.197755 systemd-logind[1451]: Session 11 logged out. Waiting for processes to exit. Feb 9 12:26:31.198315 systemd[1]: Started sshd@10-139.178.89.23:22-147.75.109.163:36936.service. Feb 9 12:26:31.198788 systemd-logind[1451]: Removed session 11. Feb 9 12:26:31.208435 kernel: audit: type=1106 audit(1707481591.070:163): pid=1983 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.070000 audit[1983]: USER_END pid=1983 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.240759 kernel: audit: type=1104 audit(1707481591.070:164): pid=1983 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.070000 audit[1983]: CRED_DISP pid=1983 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.266816 kernel: audit: type=1131 audit(1707481591.070:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.23:22-147.75.109.163:36922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.23:22-147.75.109.163:36922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.272502 sshd[2021]: Accepted publickey for core from 147.75.109.163 port 36936 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:26:31.273369 sshd[2021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:26:31.275602 systemd-logind[1451]: New session 12 of user core. Feb 9 12:26:31.276132 systemd[1]: Started session-12.scope. Feb 9 12:26:31.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.23:22-147.75.109.163:36924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.144000 audit[2013]: USER_ACCT pid=2013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.145000 audit[2013]: CRED_ACQ pid=2013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.145000 audit[2013]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd32802fe0 a2=3 a3=0 items=0 ppid=1 pid=2013 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:31.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:26:31.151000 audit[2013]: USER_START pid=2013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.151000 audit[2015]: CRED_ACQ pid=2015 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.194000 audit[2013]: USER_END pid=2013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.195000 audit[2013]: CRED_DISP pid=2013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.23:22-147.75.109.163:36924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.23:22-147.75.109.163:36936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.271000 audit[2021]: USER_ACCT pid=2021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.271000 audit[2021]: CRED_ACQ pid=2021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.271000 audit[2021]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bc7df90 a2=3 a3=0 items=0 ppid=1 pid=2021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:26:31.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:26:31.277000 audit[2021]: USER_START pid=2021 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.278000 audit[2023]: CRED_ACQ pid=2023 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.613672 sshd[2021]: pam_unix(sshd:session): session closed for user core Feb 9 12:26:31.612000 audit[2021]: USER_END pid=2021 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.613000 audit[2021]: CRED_DISP pid=2021 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:26:31.615101 systemd[1]: sshd@10-139.178.89.23:22-147.75.109.163:36936.service: Deactivated successfully. Feb 9 12:26:31.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.23:22-147.75.109.163:36936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:31.615513 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 12:26:31.615879 systemd-logind[1451]: Session 12 logged out. Waiting for processes to exit. Feb 9 12:26:31.616313 systemd-logind[1451]: Removed session 12. Feb 9 12:26:33.222513 sshd[1955]: Failed password for invalid user mnouri from 201.131.212.19 port 37398 ssh2 Feb 9 12:26:34.273926 sshd[1955]: Received disconnect from 201.131.212.19 port 37398:11: Bye Bye [preauth] Feb 9 12:26:34.273926 sshd[1955]: Disconnected from invalid user mnouri 201.131.212.19 port 37398 [preauth] Feb 9 12:26:34.276451 systemd[1]: sshd@3-139.178.89.23:22-201.131.212.19:37398.service: Deactivated successfully. Feb 9 12:26:34.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@3-139.178.89.23:22-201.131.212.19:37398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:48.730162 systemd[1]: Started sshd@11-139.178.89.23:22-180.107.140.47:58602.service. Feb 9 12:26:48.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.23:22-180.107.140.47:58602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:48.735754 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 12:26:48.735804 kernel: audit: type=1130 audit(1707481608.728:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.23:22-180.107.140.47:58602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:26:50.210026 systemd-timesyncd[1409]: Contacted time server [2600:3c00::f03c:93ff:fe5b:29d1]:123 (2.flatcar.pool.ntp.org). Feb 9 12:26:50.210171 systemd-timesyncd[1409]: Initial clock synchronization to Fri 2024-02-09 12:26:50.208128 UTC. Feb 9 12:26:56.001252 update_engine[1453]: I0209 12:26:56.001137 1453 update_attempter.cc:509] Updating boot flags... Feb 9 12:27:35.628028 systemd[1]: Started sshd@12-139.178.89.23:22-201.131.212.19:45534.service. Feb 9 12:27:35.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.23:22-201.131.212.19:45534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:35.704368 kernel: audit: type=1130 audit(1707481655.626:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.23:22-201.131.212.19:45534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:36.324626 sshd[2060]: Invalid user meha from 201.131.212.19 port 45534 Feb 9 12:27:36.330594 sshd[2060]: pam_faillock(sshd:auth): User unknown Feb 9 12:27:36.331645 sshd[2060]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:27:36.331732 sshd[2060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:27:36.332708 sshd[2060]: pam_faillock(sshd:auth): User unknown Feb 9 12:27:36.331000 audit[2060]: USER_AUTH pid=2060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="meha" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:27:36.413568 kernel: audit: type=1100 audit(1707481656.331:187): pid=2060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="meha" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:27:38.721158 sshd[2060]: Failed password for invalid user meha from 201.131.212.19 port 45534 ssh2 Feb 9 12:27:39.489667 sshd[2060]: Received disconnect from 201.131.212.19 port 45534:11: Bye Bye [preauth] Feb 9 12:27:39.489667 sshd[2060]: Disconnected from invalid user meha 201.131.212.19 port 45534 [preauth] Feb 9 12:27:39.492172 systemd[1]: sshd@12-139.178.89.23:22-201.131.212.19:45534.service: Deactivated successfully. Feb 9 12:27:39.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.23:22-201.131.212.19:45534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:39.575571 kernel: audit: type=1131 audit(1707481659.491:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.23:22-201.131.212.19:45534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:41.349943 systemd[1]: Started sshd@13-139.178.89.23:22-119.91.207.218:58412.service. Feb 9 12:27:41.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.23:22-119.91.207.218:58412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:41.436430 kernel: audit: type=1130 audit(1707481661.348:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.23:22-119.91.207.218:58412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:43.057242 sshd[2064]: Invalid user serrano from 119.91.207.218 port 58412 Feb 9 12:27:43.063417 sshd[2064]: pam_faillock(sshd:auth): User unknown Feb 9 12:27:43.064499 sshd[2064]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:27:43.064616 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.207.218 Feb 9 12:27:43.065636 sshd[2064]: pam_faillock(sshd:auth): User unknown Feb 9 12:27:43.064000 audit[2064]: USER_AUTH pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="serrano" exe="/usr/sbin/sshd" hostname=119.91.207.218 addr=119.91.207.218 terminal=ssh res=failed' Feb 9 12:27:43.156581 kernel: audit: type=1100 audit(1707481663.064:190): pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="serrano" exe="/usr/sbin/sshd" hostname=119.91.207.218 addr=119.91.207.218 terminal=ssh res=failed' Feb 9 12:27:45.082727 sshd[2064]: Failed password for invalid user serrano from 119.91.207.218 port 58412 ssh2 Feb 9 12:27:45.428901 sshd[2064]: Received disconnect from 119.91.207.218 port 58412:11: Bye Bye [preauth] Feb 9 12:27:45.428901 sshd[2064]: Disconnected from invalid user serrano 119.91.207.218 port 58412 [preauth] Feb 9 12:27:45.431345 systemd[1]: sshd@13-139.178.89.23:22-119.91.207.218:58412.service: Deactivated successfully. Feb 9 12:27:45.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.23:22-119.91.207.218:58412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:45.522443 kernel: audit: type=1131 audit(1707481665.430:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.23:22-119.91.207.218:58412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:58.994992 systemd[1]: Started sshd@14-139.178.89.23:22-180.107.140.47:41922.service. Feb 9 12:27:58.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.23:22-180.107.140.47:41922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:27:59.087556 kernel: audit: type=1130 audit(1707481678.993:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.23:22-180.107.140.47:41922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:26.954507 systemd[1]: Started sshd@15-139.178.89.23:22-43.226.39.20:37526.service. Feb 9 12:28:26.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.23:22-43.226.39.20:37526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:27.045415 kernel: audit: type=1130 audit(1707481706.954:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.23:22-43.226.39.20:37526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:31.287515 systemd[1]: Started sshd@16-139.178.89.23:22-175.178.214.25:43024.service. Feb 9 12:28:31.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.23:22-175.178.214.25:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:31.380575 kernel: audit: type=1130 audit(1707481711.287:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.23:22-175.178.214.25:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:32.951994 sshd[2075]: Invalid user tunis from 175.178.214.25 port 43024 Feb 9 12:28:32.957964 sshd[2075]: pam_faillock(sshd:auth): User unknown Feb 9 12:28:32.959083 sshd[2075]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:28:32.959172 sshd[2075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:28:32.960078 sshd[2075]: pam_faillock(sshd:auth): User unknown Feb 9 12:28:32.959000 audit[2075]: USER_AUTH pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tunis" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:28:33.053566 kernel: audit: type=1100 audit(1707481712.959:195): pid=2075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tunis" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:28:34.701579 sshd[2075]: Failed password for invalid user tunis from 175.178.214.25 port 43024 ssh2 Feb 9 12:28:34.970872 sshd[2075]: Received disconnect from 175.178.214.25 port 43024:11: Bye Bye [preauth] Feb 9 12:28:34.970872 sshd[2075]: Disconnected from invalid user tunis 175.178.214.25 port 43024 [preauth] Feb 9 12:28:34.973209 systemd[1]: sshd@16-139.178.89.23:22-175.178.214.25:43024.service: Deactivated successfully. Feb 9 12:28:34.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.23:22-175.178.214.25:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:35.066551 kernel: audit: type=1131 audit(1707481714.973:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.23:22-175.178.214.25:43024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:41.585986 systemd[1]: Started sshd@17-139.178.89.23:22-201.131.212.19:37316.service. Feb 9 12:28:41.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.23:22-201.131.212.19:37316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:41.678555 kernel: audit: type=1130 audit(1707481721.585:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.23:22-201.131.212.19:37316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:42.282827 sshd[2081]: Invalid user bhaskar from 201.131.212.19 port 37316 Feb 9 12:28:42.288817 sshd[2081]: pam_faillock(sshd:auth): User unknown Feb 9 12:28:42.289868 sshd[2081]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:28:42.289956 sshd[2081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:28:42.290829 sshd[2081]: pam_faillock(sshd:auth): User unknown Feb 9 12:28:42.290000 audit[2081]: USER_AUTH pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bhaskar" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:28:42.384566 kernel: audit: type=1100 audit(1707481722.290:198): pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bhaskar" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:28:44.739707 sshd[2081]: Failed password for invalid user bhaskar from 201.131.212.19 port 37316 ssh2 Feb 9 12:28:45.765723 sshd[2081]: Received disconnect from 201.131.212.19 port 37316:11: Bye Bye [preauth] Feb 9 12:28:45.765723 sshd[2081]: Disconnected from invalid user bhaskar 201.131.212.19 port 37316 [preauth] Feb 9 12:28:45.768130 systemd[1]: sshd@17-139.178.89.23:22-201.131.212.19:37316.service: Deactivated successfully. Feb 9 12:28:45.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.23:22-201.131.212.19:37316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:45.860561 kernel: audit: type=1131 audit(1707481725.768:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.23:22-201.131.212.19:37316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:48.735239 sshd[2043]: Timeout before authentication for 180.107.140.47 port 58602 Feb 9 12:28:48.736678 systemd[1]: sshd@11-139.178.89.23:22-180.107.140.47:58602.service: Deactivated successfully. Feb 9 12:28:48.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.23:22-180.107.140.47:58602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:28:48.830566 kernel: audit: type=1131 audit(1707481728.736:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.23:22-180.107.140.47:58602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:07.945299 systemd[1]: Started sshd@18-139.178.89.23:22-180.107.140.47:53494.service. Feb 9 12:29:07.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.23:22-180.107.140.47:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:08.037563 kernel: audit: type=1130 audit(1707481747.945:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.23:22-180.107.140.47:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:14.494189 systemd[1]: Started sshd@19-139.178.89.23:22-119.91.207.218:45406.service. Feb 9 12:29:14.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.23:22-119.91.207.218:45406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:14.587556 kernel: audit: type=1130 audit(1707481754.492:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.23:22-119.91.207.218:45406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:21.415883 systemd[1]: Started sshd@20-139.178.89.23:22-175.178.214.25:51170.service. Feb 9 12:29:21.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.89.23:22-175.178.214.25:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:21.509564 kernel: audit: type=1130 audit(1707481761.414:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.89.23:22-175.178.214.25:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:22.314010 sshd[2092]: Invalid user meha from 175.178.214.25 port 51170 Feb 9 12:29:22.319945 sshd[2092]: pam_faillock(sshd:auth): User unknown Feb 9 12:29:22.321001 sshd[2092]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:29:22.321088 sshd[2092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:29:22.322010 sshd[2092]: pam_faillock(sshd:auth): User unknown Feb 9 12:29:22.320000 audit[2092]: USER_AUTH pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="meha" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:29:22.416562 kernel: audit: type=1100 audit(1707481762.320:204): pid=2092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="meha" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:29:24.931139 sshd[2092]: Failed password for invalid user meha from 175.178.214.25 port 51170 ssh2 Feb 9 12:29:25.470116 sshd[2092]: Received disconnect from 175.178.214.25 port 51170:11: Bye Bye [preauth] Feb 9 12:29:25.470116 sshd[2092]: Disconnected from invalid user meha 175.178.214.25 port 51170 [preauth] Feb 9 12:29:25.472583 systemd[1]: sshd@20-139.178.89.23:22-175.178.214.25:51170.service: Deactivated successfully. Feb 9 12:29:25.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.89.23:22-175.178.214.25:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:25.566565 kernel: audit: type=1131 audit(1707481765.471:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.89.23:22-175.178.214.25:51170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:45.469686 systemd[1]: Started sshd@21-139.178.89.23:22-201.131.212.19:35354.service. Feb 9 12:29:45.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.89.23:22-201.131.212.19:35354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:45.563492 kernel: audit: type=1130 audit(1707481785.468:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.89.23:22-201.131.212.19:35354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:46.164909 sshd[2096]: Invalid user munback from 201.131.212.19 port 35354 Feb 9 12:29:46.170994 sshd[2096]: pam_faillock(sshd:auth): User unknown Feb 9 12:29:46.171967 sshd[2096]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:29:46.172054 sshd[2096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:29:46.172961 sshd[2096]: pam_faillock(sshd:auth): User unknown Feb 9 12:29:46.171000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="munback" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:29:46.266565 kernel: audit: type=1100 audit(1707481786.171:207): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="munback" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:29:48.742200 sshd[2096]: Failed password for invalid user munback from 201.131.212.19 port 35354 ssh2 Feb 9 12:29:49.439600 sshd[2096]: Received disconnect from 201.131.212.19 port 35354:11: Bye Bye [preauth] Feb 9 12:29:49.439600 sshd[2096]: Disconnected from invalid user munback 201.131.212.19 port 35354 [preauth] Feb 9 12:29:49.442082 systemd[1]: sshd@21-139.178.89.23:22-201.131.212.19:35354.service: Deactivated successfully. Feb 9 12:29:49.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.89.23:22-201.131.212.19:35354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:49.536560 kernel: audit: type=1131 audit(1707481789.441:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.89.23:22-201.131.212.19:35354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:56.187214 systemd[1]: Started sshd@22-139.178.89.23:22-175.178.214.25:59052.service. Feb 9 12:29:56.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.89.23:22-175.178.214.25:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:56.281553 kernel: audit: type=1130 audit(1707481796.185:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.89.23:22-175.178.214.25:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:57.091070 sshd[2100]: Invalid user jxu from 175.178.214.25 port 59052 Feb 9 12:29:57.097226 sshd[2100]: pam_faillock(sshd:auth): User unknown Feb 9 12:29:57.098260 sshd[2100]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:29:57.098347 sshd[2100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:29:57.099238 sshd[2100]: pam_faillock(sshd:auth): User unknown Feb 9 12:29:57.098000 audit[2100]: USER_AUTH pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jxu" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:29:57.193580 kernel: audit: type=1100 audit(1707481797.098:210): pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jxu" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:29:58.999975 sshd[2068]: Timeout before authentication for 180.107.140.47 port 41922 Feb 9 12:29:59.001443 systemd[1]: sshd@14-139.178.89.23:22-180.107.140.47:41922.service: Deactivated successfully. Feb 9 12:29:59.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.23:22-180.107.140.47:41922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:59.095553 kernel: audit: type=1131 audit(1707481799.000:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.23:22-180.107.140.47:41922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:29:59.512806 sshd[2100]: Failed password for invalid user jxu from 175.178.214.25 port 59052 ssh2 Feb 9 12:30:00.847684 sshd[2100]: Received disconnect from 175.178.214.25 port 59052:11: Bye Bye [preauth] Feb 9 12:30:00.847684 sshd[2100]: Disconnected from invalid user jxu 175.178.214.25 port 59052 [preauth] Feb 9 12:30:00.850123 systemd[1]: sshd@22-139.178.89.23:22-175.178.214.25:59052.service: Deactivated successfully. Feb 9 12:30:00.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.89.23:22-175.178.214.25:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:00.944577 kernel: audit: type=1131 audit(1707481800.849:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.89.23:22-175.178.214.25:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:18.322822 systemd[1]: Started sshd@23-139.178.89.23:22-180.107.140.47:36804.service. Feb 9 12:30:18.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.89.23:22-180.107.140.47:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:18.416563 kernel: audit: type=1130 audit(1707481818.321:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.89.23:22-180.107.140.47:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:19.219621 sshd[2105]: Invalid user qc from 180.107.140.47 port 36804 Feb 9 12:30:19.225559 sshd[2105]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:19.226523 sshd[2105]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:30:19.226611 sshd[2105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.107.140.47 Feb 9 12:30:19.227490 sshd[2105]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:19.226000 audit[2105]: USER_AUTH pid=2105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="qc" exe="/usr/sbin/sshd" hostname=180.107.140.47 addr=180.107.140.47 terminal=ssh res=failed' Feb 9 12:30:19.321569 kernel: audit: type=1100 audit(1707481819.226:214): pid=2105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="qc" exe="/usr/sbin/sshd" hostname=180.107.140.47 addr=180.107.140.47 terminal=ssh res=failed' Feb 9 12:30:20.326262 sshd[2105]: Failed password for invalid user qc from 180.107.140.47 port 36804 ssh2 Feb 9 12:30:21.521194 sshd[2105]: Received disconnect from 180.107.140.47 port 36804:11: Bye Bye [preauth] Feb 9 12:30:21.521194 sshd[2105]: Disconnected from invalid user qc 180.107.140.47 port 36804 [preauth] Feb 9 12:30:21.523675 systemd[1]: sshd@23-139.178.89.23:22-180.107.140.47:36804.service: Deactivated successfully. Feb 9 12:30:21.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.89.23:22-180.107.140.47:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:21.617551 kernel: audit: type=1131 audit(1707481821.522:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.89.23:22-180.107.140.47:36804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:26.959801 sshd[2073]: Timeout before authentication for 43.226.39.20 port 37526 Feb 9 12:30:26.961211 systemd[1]: sshd@15-139.178.89.23:22-43.226.39.20:37526.service: Deactivated successfully. Feb 9 12:30:26.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.23:22-43.226.39.20:37526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:27.055408 kernel: audit: type=1131 audit(1707481826.960:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.23:22-43.226.39.20:37526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:27.888498 systemd[1]: Started sshd@24-139.178.89.23:22-175.178.214.25:38706.service. Feb 9 12:30:27.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.23:22-175.178.214.25:38706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:27.982566 kernel: audit: type=1130 audit(1707481827.887:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.23:22-175.178.214.25:38706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:28.815808 sshd[2110]: Invalid user jiaqi from 175.178.214.25 port 38706 Feb 9 12:30:28.821862 sshd[2110]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:28.822847 sshd[2110]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:30:28.822933 sshd[2110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:30:28.823837 sshd[2110]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:28.822000 audit[2110]: USER_AUTH pid=2110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiaqi" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:30:28.917565 kernel: audit: type=1100 audit(1707481828.822:218): pid=2110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiaqi" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:30:30.825895 sshd[2110]: Failed password for invalid user jiaqi from 175.178.214.25 port 38706 ssh2 Feb 9 12:30:30.996860 sshd[2110]: Received disconnect from 175.178.214.25 port 38706:11: Bye Bye [preauth] Feb 9 12:30:30.996860 sshd[2110]: Disconnected from invalid user jiaqi 175.178.214.25 port 38706 [preauth] Feb 9 12:30:30.999307 systemd[1]: sshd@24-139.178.89.23:22-175.178.214.25:38706.service: Deactivated successfully. Feb 9 12:30:30.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.23:22-175.178.214.25:38706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:31.093563 kernel: audit: type=1131 audit(1707481830.998:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.23:22-175.178.214.25:38706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:49.860769 systemd[1]: Started sshd@25-139.178.89.23:22-201.131.212.19:60790.service. Feb 9 12:30:49.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.23:22-201.131.212.19:60790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:49.932631 systemd[1]: Started sshd@26-139.178.89.23:22-119.91.207.218:60630.service. Feb 9 12:30:49.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.23:22-119.91.207.218:60630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:50.045318 kernel: audit: type=1130 audit(1707481849.859:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.23:22-201.131.212.19:60790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:50.045356 kernel: audit: type=1130 audit(1707481849.931:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.23:22-119.91.207.218:60630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:50.572213 sshd[2117]: Invalid user xmjj from 201.131.212.19 port 60790 Feb 9 12:30:50.578117 sshd[2117]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:50.579067 sshd[2117]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:30:50.579155 sshd[2117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:30:50.580055 sshd[2117]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:50.578000 audit[2117]: USER_AUTH pid=2117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmjj" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:30:50.673556 kernel: audit: type=1100 audit(1707481850.578:222): pid=2117 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmjj" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:30:51.934822 sshd[2117]: Failed password for invalid user xmjj from 201.131.212.19 port 60790 ssh2 Feb 9 12:30:52.849270 sshd[2117]: Received disconnect from 201.131.212.19 port 60790:11: Bye Bye [preauth] Feb 9 12:30:52.849270 sshd[2117]: Disconnected from invalid user xmjj 201.131.212.19 port 60790 [preauth] Feb 9 12:30:52.851777 systemd[1]: sshd@25-139.178.89.23:22-201.131.212.19:60790.service: Deactivated successfully. Feb 9 12:30:52.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.23:22-201.131.212.19:60790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:52.946562 kernel: audit: type=1131 audit(1707481852.850:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.23:22-201.131.212.19:60790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:58.431521 systemd[1]: Started sshd@27-139.178.89.23:22-175.178.214.25:46586.service. Feb 9 12:30:58.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.23:22-175.178.214.25:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:58.525568 kernel: audit: type=1130 audit(1707481858.430:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.23:22-175.178.214.25:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:30:59.356115 sshd[2123]: Invalid user dmielgo from 175.178.214.25 port 46586 Feb 9 12:30:59.362106 sshd[2123]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:59.363075 sshd[2123]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:30:59.363160 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:30:59.364039 sshd[2123]: pam_faillock(sshd:auth): User unknown Feb 9 12:30:59.362000 audit[2123]: USER_AUTH pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dmielgo" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:30:59.458563 kernel: audit: type=1100 audit(1707481859.362:225): pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dmielgo" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:31:01.953505 sshd[2123]: Failed password for invalid user dmielgo from 175.178.214.25 port 46586 ssh2 Feb 9 12:31:04.270963 sshd[2123]: Received disconnect from 175.178.214.25 port 46586:11: Bye Bye [preauth] Feb 9 12:31:04.270963 sshd[2123]: Disconnected from invalid user dmielgo 175.178.214.25 port 46586 [preauth] Feb 9 12:31:04.273434 systemd[1]: sshd@27-139.178.89.23:22-175.178.214.25:46586.service: Deactivated successfully. Feb 9 12:31:04.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.23:22-175.178.214.25:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:04.367564 kernel: audit: type=1131 audit(1707481864.272:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.23:22-175.178.214.25:46586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:07.950648 sshd[2088]: Timeout before authentication for 180.107.140.47 port 53494 Feb 9 12:31:07.952131 systemd[1]: sshd@18-139.178.89.23:22-180.107.140.47:53494.service: Deactivated successfully. Feb 9 12:31:07.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.23:22-180.107.140.47:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:08.046564 kernel: audit: type=1131 audit(1707481867.951:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.23:22-180.107.140.47:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:14.499404 sshd[2090]: Timeout before authentication for 119.91.207.218 port 45406 Feb 9 12:31:14.500881 systemd[1]: sshd@19-139.178.89.23:22-119.91.207.218:45406.service: Deactivated successfully. Feb 9 12:31:14.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.23:22-119.91.207.218:45406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:14.594419 kernel: audit: type=1131 audit(1707481874.499:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.23:22-119.91.207.218:45406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:16.083781 update_engine[1453]: I0209 12:31:16.083668 1453 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 12:31:16.083781 update_engine[1453]: I0209 12:31:16.083748 1453 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 12:31:16.084857 update_engine[1453]: I0209 12:31:16.084432 1453 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 12:31:16.085416 update_engine[1453]: I0209 12:31:16.085326 1453 omaha_request_params.cc:62] Current group set to lts Feb 9 12:31:16.085716 update_engine[1453]: I0209 12:31:16.085635 1453 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 12:31:16.085716 update_engine[1453]: I0209 12:31:16.085655 1453 update_attempter.cc:643] Scheduling an action processor start. Feb 9 12:31:16.085716 update_engine[1453]: I0209 12:31:16.085688 1453 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 12:31:16.086183 update_engine[1453]: I0209 12:31:16.085747 1453 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 12:31:16.086183 update_engine[1453]: I0209 12:31:16.085892 1453 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 12:31:16.086183 update_engine[1453]: I0209 12:31:16.085908 1453 omaha_request_action.cc:271] Request: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: Feb 9 12:31:16.086183 update_engine[1453]: I0209 12:31:16.085919 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:31:16.087435 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 12:31:16.089029 update_engine[1453]: I0209 12:31:16.088958 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:31:16.089274 update_engine[1453]: E0209 12:31:16.089180 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:31:16.089406 update_engine[1453]: I0209 12:31:16.089332 1453 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 12:31:25.993513 update_engine[1453]: I0209 12:31:25.993397 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:31:25.994488 update_engine[1453]: I0209 12:31:25.993845 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:31:25.994488 update_engine[1453]: E0209 12:31:25.994041 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:31:25.994488 update_engine[1453]: I0209 12:31:25.994206 1453 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 12:31:28.060729 systemd[1]: Started sshd@28-139.178.89.23:22-124.222.50.131:40166.service. Feb 9 12:31:28.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.89.23:22-124.222.50.131:40166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:28.153394 kernel: audit: type=1130 audit(1707481888.059:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.89.23:22-124.222.50.131:40166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:29.317003 systemd[1]: Started sshd@29-139.178.89.23:22-180.107.140.47:48362.service. Feb 9 12:31:29.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.89.23:22-180.107.140.47:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:29.409415 kernel: audit: type=1130 audit(1707481889.315:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.89.23:22-180.107.140.47:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:29.496054 sshd[2134]: Invalid user narges from 124.222.50.131 port 40166 Feb 9 12:31:29.498285 sshd[2134]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:29.498770 sshd[2134]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:31:29.498806 sshd[2134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.50.131 Feb 9 12:31:29.499216 sshd[2134]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:29.497000 audit[2134]: USER_AUTH pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="narges" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:31:29.593608 kernel: audit: type=1100 audit(1707481889.497:231): pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="narges" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:31:30.082151 systemd[1]: Started sshd@30-139.178.89.23:22-175.178.214.25:54464.service. Feb 9 12:31:30.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.89.23:22-175.178.214.25:54464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:30.175366 kernel: audit: type=1130 audit(1707481890.080:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.89.23:22-175.178.214.25:54464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:31.032390 sshd[2139]: Invalid user limingrui from 175.178.214.25 port 54464 Feb 9 12:31:31.038448 sshd[2139]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:31.039239 sshd[2139]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:31:31.039277 sshd[2139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:31:31.039552 sshd[2139]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:31.038000 audit[2139]: USER_AUTH pid=2139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="limingrui" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:31:31.134281 sshd[2137]: Invalid user mike from 180.107.140.47 port 48362 Feb 9 12:31:31.134426 kernel: audit: type=1100 audit(1707481891.038:233): pid=2139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="limingrui" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:31:31.135308 sshd[2137]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:31.135524 sshd[2137]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:31:31.135538 sshd[2137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.107.140.47 Feb 9 12:31:31.135696 sshd[2137]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:31.134000 audit[2137]: USER_AUTH pid=2137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mike" exe="/usr/sbin/sshd" hostname=180.107.140.47 addr=180.107.140.47 terminal=ssh res=failed' Feb 9 12:31:31.227440 kernel: audit: type=1100 audit(1707481891.134:234): pid=2137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mike" exe="/usr/sbin/sshd" hostname=180.107.140.47 addr=180.107.140.47 terminal=ssh res=failed' Feb 9 12:31:31.541119 sshd[2134]: Failed password for invalid user narges from 124.222.50.131 port 40166 ssh2 Feb 9 12:31:33.021539 sshd[2139]: Failed password for invalid user limingrui from 175.178.214.25 port 54464 ssh2 Feb 9 12:31:33.117772 sshd[2137]: Failed password for invalid user mike from 180.107.140.47 port 48362 ssh2 Feb 9 12:31:33.357535 sshd[2134]: Received disconnect from 124.222.50.131 port 40166:11: Bye Bye [preauth] Feb 9 12:31:33.357535 sshd[2134]: Disconnected from invalid user narges 124.222.50.131 port 40166 [preauth] Feb 9 12:31:33.359988 systemd[1]: sshd@28-139.178.89.23:22-124.222.50.131:40166.service: Deactivated successfully. Feb 9 12:31:33.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.89.23:22-124.222.50.131:40166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:33.454560 kernel: audit: type=1131 audit(1707481893.359:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.89.23:22-124.222.50.131:40166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:34.032438 sshd[2139]: Received disconnect from 175.178.214.25 port 54464:11: Bye Bye [preauth] Feb 9 12:31:34.032438 sshd[2139]: Disconnected from invalid user limingrui 175.178.214.25 port 54464 [preauth] Feb 9 12:31:34.034903 systemd[1]: sshd@30-139.178.89.23:22-175.178.214.25:54464.service: Deactivated successfully. Feb 9 12:31:34.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.89.23:22-175.178.214.25:54464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:34.129561 kernel: audit: type=1131 audit(1707481894.034:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.89.23:22-175.178.214.25:54464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:34.567303 sshd[2137]: Received disconnect from 180.107.140.47 port 48362:11: Bye Bye [preauth] Feb 9 12:31:34.567303 sshd[2137]: Disconnected from invalid user mike 180.107.140.47 port 48362 [preauth] Feb 9 12:31:34.569869 systemd[1]: sshd@29-139.178.89.23:22-180.107.140.47:48362.service: Deactivated successfully. Feb 9 12:31:34.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.89.23:22-180.107.140.47:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:34.663556 kernel: audit: type=1131 audit(1707481894.568:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.89.23:22-180.107.140.47:48362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:35.993576 update_engine[1453]: I0209 12:31:35.993465 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:31:35.994408 update_engine[1453]: I0209 12:31:35.993911 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:31:35.994408 update_engine[1453]: E0209 12:31:35.994108 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:31:35.994408 update_engine[1453]: I0209 12:31:35.994274 1453 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 12:31:45.993778 update_engine[1453]: I0209 12:31:45.993664 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:31:45.994699 update_engine[1453]: I0209 12:31:45.994113 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:31:45.994699 update_engine[1453]: E0209 12:31:45.994318 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:31:45.994699 update_engine[1453]: I0209 12:31:45.994498 1453 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 12:31:45.994699 update_engine[1453]: I0209 12:31:45.994515 1453 omaha_request_action.cc:621] Omaha request response: Feb 9 12:31:45.994699 update_engine[1453]: E0209 12:31:45.994652 1453 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 12:31:45.994699 update_engine[1453]: I0209 12:31:45.994680 1453 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 12:31:45.994699 update_engine[1453]: I0209 12:31:45.994689 1453 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 12:31:45.994699 update_engine[1453]: I0209 12:31:45.994697 1453 update_attempter.cc:306] Processing Done. Feb 9 12:31:45.995780 update_engine[1453]: E0209 12:31:45.994724 1453 update_attempter.cc:619] Update failed. Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994733 1453 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994742 1453 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994752 1453 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994901 1453 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994951 1453 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994961 1453 omaha_request_action.cc:271] Request: Feb 9 12:31:45.995780 update_engine[1453]: Feb 9 12:31:45.995780 update_engine[1453]: Feb 9 12:31:45.995780 update_engine[1453]: Feb 9 12:31:45.995780 update_engine[1453]: Feb 9 12:31:45.995780 update_engine[1453]: Feb 9 12:31:45.995780 update_engine[1453]: Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.994971 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.995278 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 12:31:45.995780 update_engine[1453]: E0209 12:31:45.995457 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.995586 1453 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.995601 1453 omaha_request_action.cc:621] Omaha request response: Feb 9 12:31:45.995780 update_engine[1453]: I0209 12:31:45.995612 1453 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 12:31:45.997809 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 12:31:45.997809 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 12:31:45.998497 update_engine[1453]: I0209 12:31:45.995620 1453 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 12:31:45.998497 update_engine[1453]: I0209 12:31:45.995627 1453 update_attempter.cc:306] Processing Done. Feb 9 12:31:45.998497 update_engine[1453]: I0209 12:31:45.995635 1453 update_attempter.cc:310] Error event sent. Feb 9 12:31:45.998497 update_engine[1453]: I0209 12:31:45.995661 1453 update_check_scheduler.cc:74] Next update check in 41m53s Feb 9 12:31:52.073965 systemd[1]: Started sshd@31-139.178.89.23:22-201.131.212.19:40030.service. Feb 9 12:31:52.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.89.23:22-201.131.212.19:40030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:52.167549 kernel: audit: type=1130 audit(1707481912.072:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.89.23:22-201.131.212.19:40030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:52.766038 sshd[2147]: Invalid user pkj from 201.131.212.19 port 40030 Feb 9 12:31:52.772174 sshd[2147]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:52.773157 sshd[2147]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:31:52.773246 sshd[2147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:31:52.774184 sshd[2147]: pam_faillock(sshd:auth): User unknown Feb 9 12:31:52.773000 audit[2147]: USER_AUTH pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pkj" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:31:52.867425 kernel: audit: type=1100 audit(1707481912.773:239): pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pkj" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:31:54.305015 sshd[2147]: Failed password for invalid user pkj from 201.131.212.19 port 40030 ssh2 Feb 9 12:31:54.616661 sshd[2147]: Received disconnect from 201.131.212.19 port 40030:11: Bye Bye [preauth] Feb 9 12:31:54.616661 sshd[2147]: Disconnected from invalid user pkj 201.131.212.19 port 40030 [preauth] Feb 9 12:31:54.619112 systemd[1]: sshd@31-139.178.89.23:22-201.131.212.19:40030.service: Deactivated successfully. Feb 9 12:31:54.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.89.23:22-201.131.212.19:40030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:31:54.713560 kernel: audit: type=1131 audit(1707481914.618:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.89.23:22-201.131.212.19:40030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:00.073860 systemd[1]: Started sshd@32-139.178.89.23:22-175.178.214.25:34106.service. Feb 9 12:32:00.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.89.23:22-175.178.214.25:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:00.168446 kernel: audit: type=1130 audit(1707481920.072:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.89.23:22-175.178.214.25:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:01.045722 sshd[2151]: Invalid user hoseinvpn from 175.178.214.25 port 34106 Feb 9 12:32:01.051803 sshd[2151]: pam_faillock(sshd:auth): User unknown Feb 9 12:32:01.052779 sshd[2151]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:32:01.052868 sshd[2151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:32:01.053858 sshd[2151]: pam_faillock(sshd:auth): User unknown Feb 9 12:32:01.052000 audit[2151]: USER_AUTH pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hoseinvpn" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:32:01.148465 kernel: audit: type=1100 audit(1707481921.052:242): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hoseinvpn" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:32:02.820448 sshd[2151]: Failed password for invalid user hoseinvpn from 175.178.214.25 port 34106 ssh2 Feb 9 12:32:03.433169 sshd[2151]: Received disconnect from 175.178.214.25 port 34106:11: Bye Bye [preauth] Feb 9 12:32:03.433169 sshd[2151]: Disconnected from invalid user hoseinvpn 175.178.214.25 port 34106 [preauth] Feb 9 12:32:03.435636 systemd[1]: sshd@32-139.178.89.23:22-175.178.214.25:34106.service: Deactivated successfully. Feb 9 12:32:03.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.89.23:22-175.178.214.25:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:03.530570 kernel: audit: type=1131 audit(1707481923.434:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.89.23:22-175.178.214.25:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:22.871196 systemd[1]: Started sshd@33-139.178.89.23:22-119.91.207.218:47626.service. Feb 9 12:32:22.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.89.23:22-119.91.207.218:47626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:22.964557 kernel: audit: type=1130 audit(1707481942.869:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.89.23:22-119.91.207.218:47626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:30.387390 systemd[1]: Started sshd@34-139.178.89.23:22-175.178.214.25:41990.service. Feb 9 12:32:30.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.89.23:22-175.178.214.25:41990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:30.481568 kernel: audit: type=1130 audit(1707481950.386:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.89.23:22-175.178.214.25:41990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:31.327731 sshd[2158]: Invalid user iranoffice from 175.178.214.25 port 41990 Feb 9 12:32:31.333881 sshd[2158]: pam_faillock(sshd:auth): User unknown Feb 9 12:32:31.334854 sshd[2158]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:32:31.334946 sshd[2158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:32:31.335873 sshd[2158]: pam_faillock(sshd:auth): User unknown Feb 9 12:32:31.334000 audit[2158]: USER_AUTH pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iranoffice" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:32:31.430394 kernel: audit: type=1100 audit(1707481951.334:246): pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iranoffice" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:32:33.558517 sshd[2158]: Failed password for invalid user iranoffice from 175.178.214.25 port 41990 ssh2 Feb 9 12:32:34.439139 sshd[2158]: Received disconnect from 175.178.214.25 port 41990:11: Bye Bye [preauth] Feb 9 12:32:34.439139 sshd[2158]: Disconnected from invalid user iranoffice 175.178.214.25 port 41990 [preauth] Feb 9 12:32:34.441589 systemd[1]: sshd@34-139.178.89.23:22-175.178.214.25:41990.service: Deactivated successfully. Feb 9 12:32:34.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.89.23:22-175.178.214.25:41990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:34.536559 kernel: audit: type=1131 audit(1707481954.440:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.89.23:22-175.178.214.25:41990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:38.096235 systemd[1]: Started sshd@35-139.178.89.23:22-180.107.140.47:59914.service. Feb 9 12:32:38.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.89.23:22-180.107.140.47:59914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:38.189415 kernel: audit: type=1130 audit(1707481958.094:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.89.23:22-180.107.140.47:59914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:48.884978 systemd[1]: Started sshd@36-139.178.89.23:22-85.209.11.27:56780.service. Feb 9 12:32:48.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.89.23:22-85.209.11.27:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:48.978440 kernel: audit: type=1130 audit(1707481968.883:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.89.23:22-85.209.11.27:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:49.937507 sshd[2120]: Timeout before authentication for 119.91.207.218 port 60630 Feb 9 12:32:49.938930 systemd[1]: sshd@26-139.178.89.23:22-119.91.207.218:60630.service: Deactivated successfully. Feb 9 12:32:49.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.23:22-119.91.207.218:60630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:50.032438 kernel: audit: type=1131 audit(1707481969.938:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.23:22-119.91.207.218:60630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:51.517929 sshd[2164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.27 user=sshd Feb 9 12:32:51.517000 audit[2164]: USER_AUTH pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sshd" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 9 12:32:51.610561 kernel: audit: type=1100 audit(1707481971.517:251): pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sshd" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 9 12:32:53.484707 sshd[2164]: Failed password for sshd from 85.209.11.27 port 56780 ssh2 Feb 9 12:32:54.721032 systemd[1]: Started sshd@37-139.178.89.23:22-201.131.212.19:46412.service. Feb 9 12:32:54.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.89.23:22-201.131.212.19:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:54.814383 kernel: audit: type=1130 audit(1707481974.719:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.89.23:22-201.131.212.19:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:55.423274 sshd[2169]: Invalid user lqs from 201.131.212.19 port 46412 Feb 9 12:32:55.429385 sshd[2169]: pam_faillock(sshd:auth): User unknown Feb 9 12:32:55.430385 sshd[2169]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:32:55.430473 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:32:55.431446 sshd[2169]: pam_faillock(sshd:auth): User unknown Feb 9 12:32:55.430000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lqs" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:32:55.526550 kernel: audit: type=1100 audit(1707481975.430:253): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lqs" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:32:55.965015 sshd[2164]: Connection closed by authenticating user sshd 85.209.11.27 port 56780 [preauth] Feb 9 12:32:55.967630 systemd[1]: sshd@36-139.178.89.23:22-85.209.11.27:56780.service: Deactivated successfully. Feb 9 12:32:55.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.89.23:22-85.209.11.27:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:56.061459 kernel: audit: type=1131 audit(1707481975.966:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.89.23:22-85.209.11.27:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:57.614135 sshd[2169]: Failed password for invalid user lqs from 201.131.212.19 port 46412 ssh2 Feb 9 12:32:59.639026 systemd[1]: Started sshd@38-139.178.89.23:22-175.178.214.25:49862.service. Feb 9 12:32:59.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.89.23:22-175.178.214.25:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:59.670482 sshd[2169]: Received disconnect from 201.131.212.19 port 46412:11: Bye Bye [preauth] Feb 9 12:32:59.670482 sshd[2169]: Disconnected from invalid user lqs 201.131.212.19 port 46412 [preauth] Feb 9 12:32:59.671121 systemd[1]: sshd@37-139.178.89.23:22-201.131.212.19:46412.service: Deactivated successfully. Feb 9 12:32:59.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.89.23:22-201.131.212.19:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:59.823275 kernel: audit: type=1130 audit(1707481979.637:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.89.23:22-175.178.214.25:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:32:59.823316 kernel: audit: type=1131 audit(1707481979.669:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.89.23:22-201.131.212.19:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:00.561019 sshd[2174]: Invalid user zahrasaghi from 175.178.214.25 port 49862 Feb 9 12:33:00.567218 sshd[2174]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:00.567835 sshd[2174]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:33:00.567852 sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:33:00.568081 sshd[2174]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:00.566000 audit[2174]: USER_AUTH pid=2174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zahrasaghi" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:33:00.661425 kernel: audit: type=1100 audit(1707481980.566:257): pid=2174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zahrasaghi" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:33:02.103255 sshd[2174]: Failed password for invalid user zahrasaghi from 175.178.214.25 port 49862 ssh2 Feb 9 12:33:03.813287 sshd[2174]: Received disconnect from 175.178.214.25 port 49862:11: Bye Bye [preauth] Feb 9 12:33:03.813287 sshd[2174]: Disconnected from invalid user zahrasaghi 175.178.214.25 port 49862 [preauth] Feb 9 12:33:03.815735 systemd[1]: sshd@38-139.178.89.23:22-175.178.214.25:49862.service: Deactivated successfully. Feb 9 12:33:03.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.89.23:22-175.178.214.25:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:03.910580 kernel: audit: type=1131 audit(1707481983.814:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.89.23:22-175.178.214.25:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:05.443050 systemd[1]: Started sshd@39-139.178.89.23:22-114.132.233.43:43976.service. Feb 9 12:33:05.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.89.23:22-114.132.233.43:43976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:05.535544 kernel: audit: type=1130 audit(1707481985.441:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.89.23:22-114.132.233.43:43976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:29.023275 systemd[1]: Started sshd@40-139.178.89.23:22-175.178.214.25:57744.service. Feb 9 12:33:29.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.89.23:22-175.178.214.25:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:29.116367 kernel: audit: type=1130 audit(1707482009.021:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.89.23:22-175.178.214.25:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:29.981836 sshd[2181]: Invalid user huangguoli from 175.178.214.25 port 57744 Feb 9 12:33:29.983317 sshd[2181]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:29.983634 sshd[2181]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:33:29.983657 sshd[2181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:33:29.983874 sshd[2181]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:29.982000 audit[2181]: USER_AUTH pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="huangguoli" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:33:30.078562 kernel: audit: type=1100 audit(1707482009.982:261): pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="huangguoli" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:33:31.835092 sshd[2181]: Failed password for invalid user huangguoli from 175.178.214.25 port 57744 ssh2 Feb 9 12:33:32.161544 sshd[2181]: Received disconnect from 175.178.214.25 port 57744:11: Bye Bye [preauth] Feb 9 12:33:32.161544 sshd[2181]: Disconnected from invalid user huangguoli 175.178.214.25 port 57744 [preauth] Feb 9 12:33:32.164044 systemd[1]: sshd@40-139.178.89.23:22-175.178.214.25:57744.service: Deactivated successfully. Feb 9 12:33:32.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.89.23:22-175.178.214.25:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:32.258535 kernel: audit: type=1131 audit(1707482012.163:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.89.23:22-175.178.214.25:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:42.093117 systemd[1]: Started sshd@41-139.178.89.23:22-180.107.140.47:43250.service. Feb 9 12:33:42.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.89.23:22-180.107.140.47:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:42.186367 kernel: audit: type=1130 audit(1707482022.091:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.89.23:22-180.107.140.47:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:42.987221 sshd[2187]: Invalid user legariarg from 180.107.140.47 port 43250 Feb 9 12:33:42.993147 sshd[2187]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:42.994174 sshd[2187]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:33:42.994262 sshd[2187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.107.140.47 Feb 9 12:33:42.995185 sshd[2187]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:42.994000 audit[2187]: USER_AUTH pid=2187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="legariarg" exe="/usr/sbin/sshd" hostname=180.107.140.47 addr=180.107.140.47 terminal=ssh res=failed' Feb 9 12:33:43.089562 kernel: audit: type=1100 audit(1707482022.994:264): pid=2187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="legariarg" exe="/usr/sbin/sshd" hostname=180.107.140.47 addr=180.107.140.47 terminal=ssh res=failed' Feb 9 12:33:44.630549 sshd[2187]: Failed password for invalid user legariarg from 180.107.140.47 port 43250 ssh2 Feb 9 12:33:45.402256 sshd[2187]: Received disconnect from 180.107.140.47 port 43250:11: Bye Bye [preauth] Feb 9 12:33:45.402256 sshd[2187]: Disconnected from invalid user legariarg 180.107.140.47 port 43250 [preauth] Feb 9 12:33:45.404795 systemd[1]: sshd@41-139.178.89.23:22-180.107.140.47:43250.service: Deactivated successfully. Feb 9 12:33:45.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.89.23:22-180.107.140.47:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:45.499561 kernel: audit: type=1131 audit(1707482025.404:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.89.23:22-180.107.140.47:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:48.885714 sshd[2162]: Connection closed by 180.107.140.47 port 59914 [preauth] Feb 9 12:33:48.887421 systemd[1]: sshd@35-139.178.89.23:22-180.107.140.47:59914.service: Deactivated successfully. Feb 9 12:33:48.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.89.23:22-180.107.140.47:59914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:48.981547 kernel: audit: type=1131 audit(1707482028.887:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.89.23:22-180.107.140.47:59914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:51.817704 systemd[1]: Started sshd@42-139.178.89.23:22-119.91.207.218:34626.service. Feb 9 12:33:51.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.89.23:22-119.91.207.218:34626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:51.910561 kernel: audit: type=1130 audit(1707482031.817:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.89.23:22-119.91.207.218:34626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:53.530479 sshd[2193]: Invalid user lvlreza from 119.91.207.218 port 34626 Feb 9 12:33:53.536665 sshd[2193]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:53.537754 sshd[2193]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:33:53.537845 sshd[2193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.207.218 Feb 9 12:33:53.538739 sshd[2193]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:53.537000 audit[2193]: USER_AUTH pid=2193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lvlreza" exe="/usr/sbin/sshd" hostname=119.91.207.218 addr=119.91.207.218 terminal=ssh res=failed' Feb 9 12:33:53.632434 kernel: audit: type=1100 audit(1707482033.537:268): pid=2193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lvlreza" exe="/usr/sbin/sshd" hostname=119.91.207.218 addr=119.91.207.218 terminal=ssh res=failed' Feb 9 12:33:55.350133 sshd[2193]: Failed password for invalid user lvlreza from 119.91.207.218 port 34626 ssh2 Feb 9 12:33:57.014749 systemd[1]: Started sshd@43-139.178.89.23:22-201.131.212.19:50912.service. Feb 9 12:33:57.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.89.23:22-201.131.212.19:50912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:57.039586 sshd[2193]: Received disconnect from 119.91.207.218 port 34626:11: Bye Bye [preauth] Feb 9 12:33:57.039586 sshd[2193]: Disconnected from invalid user lvlreza 119.91.207.218 port 34626 [preauth] Feb 9 12:33:57.040094 systemd[1]: sshd@42-139.178.89.23:22-119.91.207.218:34626.service: Deactivated successfully. Feb 9 12:33:57.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.89.23:22-119.91.207.218:34626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:57.201289 kernel: audit: type=1130 audit(1707482037.014:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.89.23:22-201.131.212.19:50912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:57.201324 kernel: audit: type=1131 audit(1707482037.038:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.89.23:22-119.91.207.218:34626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:33:57.724170 sshd[2196]: Invalid user iranoffice from 201.131.212.19 port 50912 Feb 9 12:33:57.730194 sshd[2196]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:57.731168 sshd[2196]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:33:57.731257 sshd[2196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:33:57.732158 sshd[2196]: pam_faillock(sshd:auth): User unknown Feb 9 12:33:57.731000 audit[2196]: USER_AUTH pid=2196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iranoffice" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:33:57.826556 kernel: audit: type=1100 audit(1707482037.731:271): pid=2196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iranoffice" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:33:59.759144 sshd[2196]: Failed password for invalid user iranoffice from 201.131.212.19 port 50912 ssh2 Feb 9 12:34:00.838476 sshd[2196]: Received disconnect from 201.131.212.19 port 50912:11: Bye Bye [preauth] Feb 9 12:34:00.838476 sshd[2196]: Disconnected from invalid user iranoffice 201.131.212.19 port 50912 [preauth] Feb 9 12:34:00.840984 systemd[1]: sshd@43-139.178.89.23:22-201.131.212.19:50912.service: Deactivated successfully. Feb 9 12:34:00.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.89.23:22-201.131.212.19:50912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:00.935548 kernel: audit: type=1131 audit(1707482040.841:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.89.23:22-201.131.212.19:50912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:06.170944 systemd[1]: Started sshd@44-139.178.89.23:22-175.178.214.25:37398.service. Feb 9 12:34:06.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.89.23:22-175.178.214.25:37398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:06.264458 kernel: audit: type=1130 audit(1707482046.170:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.89.23:22-175.178.214.25:37398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:07.089938 sshd[2204]: Invalid user execute from 175.178.214.25 port 37398 Feb 9 12:34:07.096074 sshd[2204]: pam_faillock(sshd:auth): User unknown Feb 9 12:34:07.097247 sshd[2204]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:34:07.097337 sshd[2204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:34:07.098277 sshd[2204]: pam_faillock(sshd:auth): User unknown Feb 9 12:34:07.098000 audit[2204]: USER_AUTH pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="execute" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:34:07.192560 kernel: audit: type=1100 audit(1707482047.098:274): pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="execute" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:34:09.165596 sshd[2204]: Failed password for invalid user execute from 175.178.214.25 port 37398 ssh2 Feb 9 12:34:10.522522 systemd[1]: Started sshd@45-139.178.89.23:22-124.222.50.131:60188.service. Feb 9 12:34:10.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.89.23:22-124.222.50.131:60188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:10.615540 kernel: audit: type=1130 audit(1707482050.522:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.89.23:22-124.222.50.131:60188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:11.141344 sshd[2204]: Received disconnect from 175.178.214.25 port 37398:11: Bye Bye [preauth] Feb 9 12:34:11.141344 sshd[2204]: Disconnected from invalid user execute 175.178.214.25 port 37398 [preauth] Feb 9 12:34:11.143826 systemd[1]: sshd@44-139.178.89.23:22-175.178.214.25:37398.service: Deactivated successfully. Feb 9 12:34:11.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.89.23:22-175.178.214.25:37398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:11.237434 kernel: audit: type=1131 audit(1707482051.143:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.89.23:22-175.178.214.25:37398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:11.823740 systemd[1]: Started sshd@46-139.178.89.23:22-2.57.122.87:45688.service. Feb 9 12:34:11.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.89.23:22-2.57.122.87:45688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:11.916558 kernel: audit: type=1130 audit(1707482051.823:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.89.23:22-2.57.122.87:45688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:12.004990 sshd[2211]: kex_exchange_identification: Connection closed by remote host Feb 9 12:34:12.004990 sshd[2211]: Connection closed by 2.57.122.87 port 45688 Feb 9 12:34:12.005579 systemd[1]: sshd@46-139.178.89.23:22-2.57.122.87:45688.service: Deactivated successfully. Feb 9 12:34:12.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.89.23:22-2.57.122.87:45688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:12.098365 kernel: audit: type=1131 audit(1707482052.005:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.89.23:22-2.57.122.87:45688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:12.098433 sshd[2207]: Invalid user zhangq from 124.222.50.131 port 60188 Feb 9 12:34:12.099613 sshd[2207]: pam_faillock(sshd:auth): User unknown Feb 9 12:34:12.099809 sshd[2207]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:34:12.099826 sshd[2207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.50.131 Feb 9 12:34:12.100021 sshd[2207]: pam_faillock(sshd:auth): User unknown Feb 9 12:34:12.099000 audit[2207]: USER_AUTH pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangq" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:34:12.193559 kernel: audit: type=1100 audit(1707482052.099:279): pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangq" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:34:14.187107 sshd[2207]: Failed password for invalid user zhangq from 124.222.50.131 port 60188 ssh2 Feb 9 12:34:14.396499 sshd[2207]: Received disconnect from 124.222.50.131 port 60188:11: Bye Bye [preauth] Feb 9 12:34:14.396499 sshd[2207]: Disconnected from invalid user zhangq 124.222.50.131 port 60188 [preauth] Feb 9 12:34:14.399029 systemd[1]: sshd@45-139.178.89.23:22-124.222.50.131:60188.service: Deactivated successfully. Feb 9 12:34:14.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.89.23:22-124.222.50.131:60188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:14.493566 kernel: audit: type=1131 audit(1707482054.399:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.89.23:22-124.222.50.131:60188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:22.876465 sshd[2156]: Timeout before authentication for 119.91.207.218 port 47626 Feb 9 12:34:22.877866 systemd[1]: sshd@33-139.178.89.23:22-119.91.207.218:47626.service: Deactivated successfully. Feb 9 12:34:22.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.89.23:22-119.91.207.218:47626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:22.971559 kernel: audit: type=1131 audit(1707482062.877:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.89.23:22-119.91.207.218:47626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:36.766516 systemd[1]: Started sshd@47-139.178.89.23:22-175.178.214.25:45282.service. Feb 9 12:34:36.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.89.23:22-175.178.214.25:45282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:36.860440 kernel: audit: type=1130 audit(1707482076.766:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.89.23:22-175.178.214.25:45282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:37.724981 sshd[2218]: Invalid user bhaskar from 175.178.214.25 port 45282 Feb 9 12:34:37.731214 sshd[2218]: pam_faillock(sshd:auth): User unknown Feb 9 12:34:37.732198 sshd[2218]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:34:37.732288 sshd[2218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:34:37.733208 sshd[2218]: pam_faillock(sshd:auth): User unknown Feb 9 12:34:37.733000 audit[2218]: USER_AUTH pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bhaskar" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:34:37.827540 kernel: audit: type=1100 audit(1707482077.733:283): pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bhaskar" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:34:39.584789 sshd[2218]: Failed password for invalid user bhaskar from 175.178.214.25 port 45282 ssh2 Feb 9 12:34:41.204605 sshd[2218]: Received disconnect from 175.178.214.25 port 45282:11: Bye Bye [preauth] Feb 9 12:34:41.204605 sshd[2218]: Disconnected from invalid user bhaskar 175.178.214.25 port 45282 [preauth] Feb 9 12:34:41.207032 systemd[1]: sshd@47-139.178.89.23:22-175.178.214.25:45282.service: Deactivated successfully. Feb 9 12:34:41.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.89.23:22-175.178.214.25:45282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:34:41.301451 kernel: audit: type=1131 audit(1707482081.207:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.89.23:22-175.178.214.25:45282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:01.566499 systemd[1]: Started sshd@48-139.178.89.23:22-201.131.212.19:42824.service. Feb 9 12:35:01.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.89.23:22-201.131.212.19:42824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:01.660563 kernel: audit: type=1130 audit(1707482101.566:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.89.23:22-201.131.212.19:42824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:02.251504 sshd[2222]: Invalid user zhangqin from 201.131.212.19 port 42824 Feb 9 12:35:02.257579 sshd[2222]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:02.258650 sshd[2222]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:35:02.258739 sshd[2222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:35:02.259728 sshd[2222]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:02.259000 audit[2222]: USER_AUTH pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangqin" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:35:02.266761 systemd[1]: Started sshd@49-139.178.89.23:22-124.222.50.131:40442.service. Feb 9 12:35:02.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.89.23:22-124.222.50.131:40442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:02.444542 kernel: audit: type=1100 audit(1707482102.259:286): pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangqin" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:35:02.444573 kernel: audit: type=1130 audit(1707482102.266:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.89.23:22-124.222.50.131:40442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:04.541981 sshd[2222]: Failed password for invalid user zhangqin from 201.131.212.19 port 42824 ssh2 Feb 9 12:35:05.400724 sshd[2222]: Received disconnect from 201.131.212.19 port 42824:11: Bye Bye [preauth] Feb 9 12:35:05.400724 sshd[2222]: Disconnected from invalid user zhangqin 201.131.212.19 port 42824 [preauth] Feb 9 12:35:05.403184 systemd[1]: sshd@48-139.178.89.23:22-201.131.212.19:42824.service: Deactivated successfully. Feb 9 12:35:05.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.89.23:22-201.131.212.19:42824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:05.447901 sshd[2179]: Timeout before authentication for 114.132.233.43 port 43976 Feb 9 12:35:05.448146 systemd[1]: sshd@39-139.178.89.23:22-114.132.233.43:43976.service: Deactivated successfully. Feb 9 12:35:05.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.89.23:22-114.132.233.43:43976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:05.497435 kernel: audit: type=1131 audit(1707482105.403:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.89.23:22-201.131.212.19:42824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:05.497490 kernel: audit: type=1131 audit(1707482105.447:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.89.23:22-114.132.233.43:43976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:08.059829 systemd[1]: Started sshd@50-139.178.89.23:22-175.178.214.25:53162.service. Feb 9 12:35:08.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.89.23:22-175.178.214.25:53162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:08.153575 kernel: audit: type=1130 audit(1707482108.059:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.89.23:22-175.178.214.25:53162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:09.026242 sshd[2229]: Invalid user pkj from 175.178.214.25 port 53162 Feb 9 12:35:09.032184 sshd[2229]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:09.033200 sshd[2229]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:35:09.033286 sshd[2229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:35:09.034226 sshd[2229]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:09.034000 audit[2229]: USER_AUTH pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pkj" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:35:09.128542 kernel: audit: type=1100 audit(1707482109.034:291): pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pkj" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:35:11.613290 sshd[2229]: Failed password for invalid user pkj from 175.178.214.25 port 53162 ssh2 Feb 9 12:35:12.581585 sshd[2229]: Received disconnect from 175.178.214.25 port 53162:11: Bye Bye [preauth] Feb 9 12:35:12.581585 sshd[2229]: Disconnected from invalid user pkj 175.178.214.25 port 53162 [preauth] Feb 9 12:35:12.584047 systemd[1]: sshd@50-139.178.89.23:22-175.178.214.25:53162.service: Deactivated successfully. Feb 9 12:35:12.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.89.23:22-175.178.214.25:53162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:12.678559 kernel: audit: type=1131 audit(1707482112.584:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.89.23:22-175.178.214.25:53162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:21.813791 systemd[1]: Started sshd@51-139.178.89.23:22-119.91.207.218:49854.service. Feb 9 12:35:21.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.89.23:22-119.91.207.218:49854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:21.906396 kernel: audit: type=1130 audit(1707482121.813:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.89.23:22-119.91.207.218:49854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:23.513478 sshd[2233]: Invalid user lzh from 119.91.207.218 port 49854 Feb 9 12:35:23.519486 sshd[2233]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:23.520459 sshd[2233]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:35:23.520540 sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.207.218 Feb 9 12:35:23.521388 sshd[2233]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:23.521000 audit[2233]: USER_AUTH pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lzh" exe="/usr/sbin/sshd" hostname=119.91.207.218 addr=119.91.207.218 terminal=ssh res=failed' Feb 9 12:35:23.614455 kernel: audit: type=1100 audit(1707482123.521:294): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lzh" exe="/usr/sbin/sshd" hostname=119.91.207.218 addr=119.91.207.218 terminal=ssh res=failed' Feb 9 12:35:25.021348 sshd[2233]: Failed password for invalid user lzh from 119.91.207.218 port 49854 ssh2 Feb 9 12:35:25.929077 sshd[2233]: Received disconnect from 119.91.207.218 port 49854:11: Bye Bye [preauth] Feb 9 12:35:25.929077 sshd[2233]: Disconnected from invalid user lzh 119.91.207.218 port 49854 [preauth] Feb 9 12:35:25.931556 systemd[1]: sshd@51-139.178.89.23:22-119.91.207.218:49854.service: Deactivated successfully. Feb 9 12:35:25.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.89.23:22-119.91.207.218:49854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:26.025556 kernel: audit: type=1131 audit(1707482125.931:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.89.23:22-119.91.207.218:49854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:38.379481 systemd[1]: Started sshd@52-139.178.89.23:22-175.178.214.25:32808.service. Feb 9 12:35:38.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.89.23:22-175.178.214.25:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:38.473563 kernel: audit: type=1130 audit(1707482138.379:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.89.23:22-175.178.214.25:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:39.301867 sshd[2237]: Invalid user mnouri from 175.178.214.25 port 32808 Feb 9 12:35:39.307872 sshd[2237]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:39.308871 sshd[2237]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:35:39.308960 sshd[2237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:35:39.309843 sshd[2237]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:39.309000 audit[2237]: USER_AUTH pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mnouri" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:35:39.403562 kernel: audit: type=1100 audit(1707482139.309:297): pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mnouri" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:35:42.009127 sshd[2237]: Failed password for invalid user mnouri from 175.178.214.25 port 32808 ssh2 Feb 9 12:35:42.676062 sshd[2237]: Received disconnect from 175.178.214.25 port 32808:11: Bye Bye [preauth] Feb 9 12:35:42.676062 sshd[2237]: Disconnected from invalid user mnouri 175.178.214.25 port 32808 [preauth] Feb 9 12:35:42.678577 systemd[1]: sshd@52-139.178.89.23:22-175.178.214.25:32808.service: Deactivated successfully. Feb 9 12:35:42.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.89.23:22-175.178.214.25:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:42.772424 kernel: audit: type=1131 audit(1707482142.678:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.89.23:22-175.178.214.25:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:55.429396 systemd[1]: Started sshd@53-139.178.89.23:22-124.222.50.131:48918.service. Feb 9 12:35:55.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.89.23:22-124.222.50.131:48918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:55.522439 kernel: audit: type=1130 audit(1707482155.429:299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.89.23:22-124.222.50.131:48918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:57.043725 sshd[2241]: Invalid user mehri from 124.222.50.131 port 48918 Feb 9 12:35:57.049885 sshd[2241]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:57.051036 sshd[2241]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:35:57.051126 sshd[2241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.50.131 Feb 9 12:35:57.052100 sshd[2241]: pam_faillock(sshd:auth): User unknown Feb 9 12:35:57.051000 audit[2241]: USER_AUTH pid=2241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mehri" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:35:57.146573 kernel: audit: type=1100 audit(1707482157.051:300): pid=2241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mehri" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:35:59.219778 sshd[2241]: Failed password for invalid user mehri from 124.222.50.131 port 48918 ssh2 Feb 9 12:35:59.828729 sshd[2241]: Received disconnect from 124.222.50.131 port 48918:11: Bye Bye [preauth] Feb 9 12:35:59.828729 sshd[2241]: Disconnected from invalid user mehri 124.222.50.131 port 48918 [preauth] Feb 9 12:35:59.831202 systemd[1]: sshd@53-139.178.89.23:22-124.222.50.131:48918.service: Deactivated successfully. Feb 9 12:35:59.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.89.23:22-124.222.50.131:48918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:35:59.925563 kernel: audit: type=1131 audit(1707482159.831:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.89.23:22-124.222.50.131:48918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:07.348568 systemd[1]: Started sshd@54-139.178.89.23:22-201.131.212.19:53890.service. Feb 9 12:36:07.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.89.23:22-201.131.212.19:53890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:07.442562 kernel: audit: type=1130 audit(1707482167.348:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.89.23:22-201.131.212.19:53890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:08.045518 sshd[2245]: Invalid user jiaqi from 201.131.212.19 port 53890 Feb 9 12:36:08.051561 sshd[2245]: pam_faillock(sshd:auth): User unknown Feb 9 12:36:08.052642 sshd[2245]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:36:08.052732 sshd[2245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:36:08.053766 sshd[2245]: pam_faillock(sshd:auth): User unknown Feb 9 12:36:08.053000 audit[2245]: USER_AUTH pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiaqi" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:36:08.146561 kernel: audit: type=1100 audit(1707482168.053:303): pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiaqi" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:36:08.671179 systemd[1]: Started sshd@55-139.178.89.23:22-175.178.214.25:40684.service. Feb 9 12:36:08.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.89.23:22-175.178.214.25:40684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:08.765568 kernel: audit: type=1130 audit(1707482168.670:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.89.23:22-175.178.214.25:40684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:09.611831 sshd[2248]: Invalid user wangjiaqi from 175.178.214.25 port 40684 Feb 9 12:36:09.617917 sshd[2248]: pam_faillock(sshd:auth): User unknown Feb 9 12:36:09.619006 sshd[2248]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:36:09.619095 sshd[2248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:36:09.620175 sshd[2248]: pam_faillock(sshd:auth): User unknown Feb 9 12:36:09.620000 audit[2248]: USER_AUTH pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wangjiaqi" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:36:09.714561 kernel: audit: type=1100 audit(1707482169.620:305): pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wangjiaqi" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:36:10.065851 sshd[2245]: Failed password for invalid user jiaqi from 201.131.212.19 port 53890 ssh2 Feb 9 12:36:11.767862 sshd[2248]: Failed password for invalid user wangjiaqi from 175.178.214.25 port 40684 ssh2 Feb 9 12:36:12.250736 sshd[2245]: Received disconnect from 201.131.212.19 port 53890:11: Bye Bye [preauth] Feb 9 12:36:12.250736 sshd[2245]: Disconnected from invalid user jiaqi 201.131.212.19 port 53890 [preauth] Feb 9 12:36:12.253222 systemd[1]: sshd@54-139.178.89.23:22-201.131.212.19:53890.service: Deactivated successfully. Feb 9 12:36:12.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.89.23:22-201.131.212.19:53890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:12.347429 kernel: audit: type=1131 audit(1707482172.253:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.89.23:22-201.131.212.19:53890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:12.968581 sshd[2248]: Received disconnect from 175.178.214.25 port 40684:11: Bye Bye [preauth] Feb 9 12:36:12.968581 sshd[2248]: Disconnected from invalid user wangjiaqi 175.178.214.25 port 40684 [preauth] Feb 9 12:36:12.971057 systemd[1]: sshd@55-139.178.89.23:22-175.178.214.25:40684.service: Deactivated successfully. Feb 9 12:36:12.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.89.23:22-175.178.214.25:40684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:13.064422 kernel: audit: type=1131 audit(1707482172.971:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.89.23:22-175.178.214.25:40684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:40.949344 systemd[1]: Started sshd@56-139.178.89.23:22-175.178.214.25:48558.service. Feb 9 12:36:40.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.89.23:22-175.178.214.25:48558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:41.043567 kernel: audit: type=1130 audit(1707482200.949:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.89.23:22-175.178.214.25:48558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:41.948246 sshd[2259]: Invalid user ajdar from 175.178.214.25 port 48558 Feb 9 12:36:41.954349 sshd[2259]: pam_faillock(sshd:auth): User unknown Feb 9 12:36:41.955461 sshd[2259]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:36:41.955548 sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:36:41.956456 sshd[2259]: pam_faillock(sshd:auth): User unknown Feb 9 12:36:41.956000 audit[2259]: USER_AUTH pid=2259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ajdar" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:36:42.051568 kernel: audit: type=1100 audit(1707482201.956:309): pid=2259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ajdar" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:36:43.496819 sshd[2259]: Failed password for invalid user ajdar from 175.178.214.25 port 48558 ssh2 Feb 9 12:36:44.311868 sshd[2259]: Received disconnect from 175.178.214.25 port 48558:11: Bye Bye [preauth] Feb 9 12:36:44.311868 sshd[2259]: Disconnected from invalid user ajdar 175.178.214.25 port 48558 [preauth] Feb 9 12:36:44.314334 systemd[1]: sshd@56-139.178.89.23:22-175.178.214.25:48558.service: Deactivated successfully. Feb 9 12:36:44.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.89.23:22-175.178.214.25:48558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:44.408510 kernel: audit: type=1131 audit(1707482204.314:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.89.23:22-175.178.214.25:48558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:46.000680 systemd[1]: Started sshd@57-139.178.89.23:22-124.222.50.131:57420.service. Feb 9 12:36:46.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.89.23:22-124.222.50.131:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:36:46.094565 kernel: audit: type=1130 audit(1707482206.000:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.89.23:22-124.222.50.131:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:02.271576 sshd[2225]: Timeout before authentication for 124.222.50.131 port 40442 Feb 9 12:37:02.272988 systemd[1]: sshd@49-139.178.89.23:22-124.222.50.131:40442.service: Deactivated successfully. Feb 9 12:37:02.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.89.23:22-124.222.50.131:40442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:02.367544 kernel: audit: type=1131 audit(1707482222.273:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.89.23:22-124.222.50.131:40442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:13.810308 systemd[1]: Started sshd@58-139.178.89.23:22-201.131.212.19:52800.service. Feb 9 12:37:13.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.89.23:22-201.131.212.19:52800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:13.903542 kernel: audit: type=1130 audit(1707482233.810:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.89.23:22-201.131.212.19:52800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:14.490663 sshd[2267]: Invalid user tmp from 201.131.212.19 port 52800 Feb 9 12:37:14.496651 sshd[2267]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:14.497742 sshd[2267]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:37:14.497828 sshd[2267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:37:14.498742 sshd[2267]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:14.498000 audit[2267]: USER_AUTH pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tmp" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:37:14.592417 kernel: audit: type=1100 audit(1707482234.498:314): pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tmp" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:37:16.568103 systemd[1]: Started sshd@59-139.178.89.23:22-175.178.214.25:56440.service. Feb 9 12:37:16.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.89.23:22-175.178.214.25:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:16.570582 sshd[2267]: Failed password for invalid user tmp from 201.131.212.19 port 52800 ssh2 Feb 9 12:37:16.662575 kernel: audit: type=1130 audit(1707482236.566:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.89.23:22-175.178.214.25:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:16.759520 sshd[2267]: Received disconnect from 201.131.212.19 port 52800:11: Bye Bye [preauth] Feb 9 12:37:16.759520 sshd[2267]: Disconnected from invalid user tmp 201.131.212.19 port 52800 [preauth] Feb 9 12:37:16.761965 systemd[1]: sshd@58-139.178.89.23:22-201.131.212.19:52800.service: Deactivated successfully. Feb 9 12:37:16.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.89.23:22-201.131.212.19:52800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:16.861365 kernel: audit: type=1131 audit(1707482236.761:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.89.23:22-201.131.212.19:52800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:17.522205 sshd[2270]: Invalid user alidadmandian from 175.178.214.25 port 56440 Feb 9 12:37:17.528235 sshd[2270]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:17.529235 sshd[2270]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:37:17.529324 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:37:17.530245 sshd[2270]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:17.529000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="alidadmandian" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:37:17.629366 kernel: audit: type=1100 audit(1707482237.529:317): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="alidadmandian" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:37:19.014717 sshd[2270]: Failed password for invalid user alidadmandian from 175.178.214.25 port 56440 ssh2 Feb 9 12:37:19.442933 sshd[2270]: Received disconnect from 175.178.214.25 port 56440:11: Bye Bye [preauth] Feb 9 12:37:19.442933 sshd[2270]: Disconnected from invalid user alidadmandian 175.178.214.25 port 56440 [preauth] Feb 9 12:37:19.445407 systemd[1]: sshd@59-139.178.89.23:22-175.178.214.25:56440.service: Deactivated successfully. Feb 9 12:37:19.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.89.23:22-175.178.214.25:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:19.539424 kernel: audit: type=1131 audit(1707482239.444:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.89.23:22-175.178.214.25:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:35.844511 systemd[1]: Started sshd@60-139.178.89.23:22-124.222.50.131:37666.service. Feb 9 12:37:35.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.89.23:22-124.222.50.131:37666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:35.938439 kernel: audit: type=1130 audit(1707482255.843:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.89.23:22-124.222.50.131:37666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:37.479302 sshd[2275]: Invalid user bipl from 124.222.50.131 port 37666 Feb 9 12:37:37.485464 sshd[2275]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:37.486440 sshd[2275]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:37:37.486530 sshd[2275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.50.131 Feb 9 12:37:37.487486 sshd[2275]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:37.486000 audit[2275]: USER_AUTH pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bipl" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:37:37.581579 kernel: audit: type=1100 audit(1707482257.486:320): pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bipl" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:37:39.383768 sshd[2275]: Failed password for invalid user bipl from 124.222.50.131 port 37666 ssh2 Feb 9 12:37:40.819329 sshd[2275]: Received disconnect from 124.222.50.131 port 37666:11: Bye Bye [preauth] Feb 9 12:37:40.819329 sshd[2275]: Disconnected from invalid user bipl 124.222.50.131 port 37666 [preauth] Feb 9 12:37:40.821764 systemd[1]: sshd@60-139.178.89.23:22-124.222.50.131:37666.service: Deactivated successfully. Feb 9 12:37:40.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.89.23:22-124.222.50.131:37666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:40.915420 kernel: audit: type=1131 audit(1707482260.820:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.89.23:22-124.222.50.131:37666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:48.554532 systemd[1]: Started sshd@61-139.178.89.23:22-175.178.214.25:36086.service. Feb 9 12:37:48.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.89.23:22-175.178.214.25:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:48.647367 kernel: audit: type=1130 audit(1707482268.553:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.89.23:22-175.178.214.25:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:49.555997 sshd[2280]: Invalid user tmp from 175.178.214.25 port 36086 Feb 9 12:37:49.562240 sshd[2280]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:49.563241 sshd[2280]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:37:49.563329 sshd[2280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:37:49.564250 sshd[2280]: pam_faillock(sshd:auth): User unknown Feb 9 12:37:49.563000 audit[2280]: USER_AUTH pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tmp" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:37:49.657555 kernel: audit: type=1100 audit(1707482269.563:323): pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tmp" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:37:51.108757 sshd[2280]: Failed password for invalid user tmp from 175.178.214.25 port 36086 ssh2 Feb 9 12:37:51.828733 sshd[2280]: Received disconnect from 175.178.214.25 port 36086:11: Bye Bye [preauth] Feb 9 12:37:51.828733 sshd[2280]: Disconnected from invalid user tmp 175.178.214.25 port 36086 [preauth] Feb 9 12:37:51.831421 systemd[1]: sshd@61-139.178.89.23:22-175.178.214.25:36086.service: Deactivated successfully. Feb 9 12:37:51.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.89.23:22-175.178.214.25:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:37:51.924560 kernel: audit: type=1131 audit(1707482271.830:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.89.23:22-175.178.214.25:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:18.574516 systemd[1]: Started sshd@62-139.178.89.23:22-201.131.212.19:50810.service. Feb 9 12:38:18.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.89.23:22-201.131.212.19:50810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:18.670365 kernel: audit: type=1130 audit(1707482298.573:325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.89.23:22-201.131.212.19:50810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:19.258191 sshd[2286]: Invalid user tintin from 201.131.212.19 port 50810 Feb 9 12:38:19.264351 sshd[2286]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:19.265390 sshd[2286]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:38:19.265479 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:38:19.266336 sshd[2286]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:19.265000 audit[2286]: USER_AUTH pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tintin" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:38:19.360454 kernel: audit: type=1100 audit(1707482299.265:326): pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tintin" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:38:21.594499 sshd[2286]: Failed password for invalid user tintin from 201.131.212.19 port 50810 ssh2 Feb 9 12:38:22.622483 systemd[1]: Started sshd@63-139.178.89.23:22-175.178.214.25:43972.service. Feb 9 12:38:22.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.89.23:22-175.178.214.25:43972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:22.716565 kernel: audit: type=1130 audit(1707482302.621:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.89.23:22-175.178.214.25:43972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:22.862937 sshd[2286]: Received disconnect from 201.131.212.19 port 50810:11: Bye Bye [preauth] Feb 9 12:38:22.862937 sshd[2286]: Disconnected from invalid user tintin 201.131.212.19 port 50810 [preauth] Feb 9 12:38:22.865336 systemd[1]: sshd@62-139.178.89.23:22-201.131.212.19:50810.service: Deactivated successfully. Feb 9 12:38:22.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.89.23:22-201.131.212.19:50810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:22.965453 kernel: audit: type=1131 audit(1707482302.864:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.89.23:22-201.131.212.19:50810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:23.548706 sshd[2289]: Invalid user rahimtpc from 175.178.214.25 port 43972 Feb 9 12:38:23.554887 sshd[2289]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:23.556025 sshd[2289]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:38:23.556112 sshd[2289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:38:23.557154 sshd[2289]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:23.555000 audit[2289]: USER_AUTH pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rahimtpc" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:38:23.651568 kernel: audit: type=1100 audit(1707482303.555:329): pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rahimtpc" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:38:25.101736 sshd[2289]: Failed password for invalid user rahimtpc from 175.178.214.25 port 43972 ssh2 Feb 9 12:38:26.523773 sshd[2289]: Received disconnect from 175.178.214.25 port 43972:11: Bye Bye [preauth] Feb 9 12:38:26.523773 sshd[2289]: Disconnected from invalid user rahimtpc 175.178.214.25 port 43972 [preauth] Feb 9 12:38:26.526209 systemd[1]: sshd@63-139.178.89.23:22-175.178.214.25:43972.service: Deactivated successfully. Feb 9 12:38:26.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.89.23:22-175.178.214.25:43972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:26.620564 kernel: audit: type=1131 audit(1707482306.525:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.89.23:22-175.178.214.25:43972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:27.115825 systemd[1]: Started sshd@64-139.178.89.23:22-124.222.50.131:46148.service. Feb 9 12:38:27.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.89.23:22-124.222.50.131:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:27.209444 kernel: audit: type=1130 audit(1707482307.114:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.89.23:22-124.222.50.131:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:28.738455 sshd[2294]: Invalid user matinsh from 124.222.50.131 port 46148 Feb 9 12:38:28.744455 sshd[2294]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:28.745437 sshd[2294]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:38:28.745524 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.50.131 Feb 9 12:38:28.746394 sshd[2294]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:28.745000 audit[2294]: USER_AUTH pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="matinsh" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:38:28.840562 kernel: audit: type=1100 audit(1707482308.745:332): pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="matinsh" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:38:30.642895 sshd[2294]: Failed password for invalid user matinsh from 124.222.50.131 port 46148 ssh2 Feb 9 12:38:31.082392 sshd[2294]: Received disconnect from 124.222.50.131 port 46148:11: Bye Bye [preauth] Feb 9 12:38:31.082392 sshd[2294]: Disconnected from invalid user matinsh 124.222.50.131 port 46148 [preauth] Feb 9 12:38:31.084762 systemd[1]: sshd@64-139.178.89.23:22-124.222.50.131:46148.service: Deactivated successfully. Feb 9 12:38:31.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.89.23:22-124.222.50.131:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:31.179562 kernel: audit: type=1131 audit(1707482311.083:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.89.23:22-124.222.50.131:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.005959 sshd[2263]: Timeout before authentication for 124.222.50.131 port 57420 Feb 9 12:38:46.007432 systemd[1]: sshd@57-139.178.89.23:22-124.222.50.131:57420.service: Deactivated successfully. Feb 9 12:38:46.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.89.23:22-124.222.50.131:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.101558 kernel: audit: type=1131 audit(1707482326.006:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.89.23:22-124.222.50.131:57420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:53.739403 systemd[1]: Started sshd@65-139.178.89.23:22-175.178.214.25:51848.service. Feb 9 12:38:53.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.89.23:22-175.178.214.25:51848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:53.833445 kernel: audit: type=1130 audit(1707482333.738:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.89.23:22-175.178.214.25:51848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:54.630344 sshd[2299]: Invalid user munback from 175.178.214.25 port 51848 Feb 9 12:38:54.636271 sshd[2299]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:54.637308 sshd[2299]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:38:54.637428 sshd[2299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:38:54.638288 sshd[2299]: pam_faillock(sshd:auth): User unknown Feb 9 12:38:54.637000 audit[2299]: USER_AUTH pid=2299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="munback" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:38:54.732561 kernel: audit: type=1100 audit(1707482334.637:336): pid=2299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="munback" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:38:56.103650 sshd[2299]: Failed password for invalid user munback from 175.178.214.25 port 51848 ssh2 Feb 9 12:38:56.338210 sshd[2299]: Received disconnect from 175.178.214.25 port 51848:11: Bye Bye [preauth] Feb 9 12:38:56.338210 sshd[2299]: Disconnected from invalid user munback 175.178.214.25 port 51848 [preauth] Feb 9 12:38:56.340799 systemd[1]: sshd@65-139.178.89.23:22-175.178.214.25:51848.service: Deactivated successfully. Feb 9 12:38:56.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.89.23:22-175.178.214.25:51848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:56.435573 kernel: audit: type=1131 audit(1707482336.339:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.89.23:22-175.178.214.25:51848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:15.760828 systemd[1]: Started sshd@66-139.178.89.23:22-124.222.50.131:54640.service. Feb 9 12:39:15.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.89.23:22-124.222.50.131:54640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:15.854563 kernel: audit: type=1130 audit(1707482355.759:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.89.23:22-124.222.50.131:54640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:26.452255 systemd[1]: Started sshd@67-139.178.89.23:22-175.178.214.25:59732.service. Feb 9 12:39:26.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.89.23:22-175.178.214.25:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:26.546426 kernel: audit: type=1130 audit(1707482366.450:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.89.23:22-175.178.214.25:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:27.396797 sshd[2306]: Invalid user tintin from 175.178.214.25 port 59732 Feb 9 12:39:27.402877 sshd[2306]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:27.403839 sshd[2306]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:39:27.403928 sshd[2306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:39:27.405005 sshd[2306]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:27.403000 audit[2306]: USER_AUTH pid=2306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tintin" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:39:27.499476 kernel: audit: type=1100 audit(1707482367.403:340): pid=2306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tintin" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:39:29.402092 sshd[2306]: Failed password for invalid user tintin from 175.178.214.25 port 59732 ssh2 Feb 9 12:39:30.999179 sshd[2306]: Received disconnect from 175.178.214.25 port 59732:11: Bye Bye [preauth] Feb 9 12:39:30.999179 sshd[2306]: Disconnected from invalid user tintin 175.178.214.25 port 59732 [preauth] Feb 9 12:39:31.001661 systemd[1]: sshd@67-139.178.89.23:22-175.178.214.25:59732.service: Deactivated successfully. Feb 9 12:39:31.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.89.23:22-175.178.214.25:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:31.095419 kernel: audit: type=1131 audit(1707482371.000:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.89.23:22-175.178.214.25:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:35.873484 systemd[1]: Started sshd@68-139.178.89.23:22-201.131.212.19:41328.service. Feb 9 12:39:35.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.89.23:22-201.131.212.19:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:35.967580 kernel: audit: type=1130 audit(1707482375.872:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.89.23:22-201.131.212.19:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:36.569286 sshd[2311]: Invalid user limingrui from 201.131.212.19 port 41328 Feb 9 12:39:36.575390 sshd[2311]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:36.576343 sshd[2311]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:39:36.576465 sshd[2311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:39:36.577322 sshd[2311]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:36.576000 audit[2311]: USER_AUTH pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="limingrui" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:39:36.671437 kernel: audit: type=1100 audit(1707482376.576:343): pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="limingrui" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:39:38.142941 sshd[2311]: Failed password for invalid user limingrui from 201.131.212.19 port 41328 ssh2 Feb 9 12:39:39.573003 sshd[2311]: Received disconnect from 201.131.212.19 port 41328:11: Bye Bye [preauth] Feb 9 12:39:39.573003 sshd[2311]: Disconnected from invalid user limingrui 201.131.212.19 port 41328 [preauth] Feb 9 12:39:39.575346 systemd[1]: sshd@68-139.178.89.23:22-201.131.212.19:41328.service: Deactivated successfully. Feb 9 12:39:39.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.89.23:22-201.131.212.19:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:39.669561 kernel: audit: type=1131 audit(1707482379.574:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.89.23:22-201.131.212.19:41328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:00.757346 systemd[1]: Started sshd@69-139.178.89.23:22-175.178.214.25:39382.service. Feb 9 12:40:00.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.89.23:22-175.178.214.25:39382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:00.851572 kernel: audit: type=1130 audit(1707482400.756:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.89.23:22-175.178.214.25:39382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:01.673698 sshd[2318]: Invalid user zhangqin from 175.178.214.25 port 39382 Feb 9 12:40:01.679785 sshd[2318]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:01.680748 sshd[2318]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:40:01.680836 sshd[2318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:40:01.681699 sshd[2318]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:01.680000 audit[2318]: USER_AUTH pid=2318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangqin" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:40:01.776574 kernel: audit: type=1100 audit(1707482401.680:346): pid=2318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangqin" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:40:03.465557 systemd[1]: Started sshd@70-139.178.89.23:22-124.222.50.131:34894.service. Feb 9 12:40:03.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.89.23:22-124.222.50.131:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:03.559563 kernel: audit: type=1130 audit(1707482403.464:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.89.23:22-124.222.50.131:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:03.678840 sshd[2318]: Failed password for invalid user zhangqin from 175.178.214.25 port 39382 ssh2 Feb 9 12:40:04.816624 sshd[2318]: Received disconnect from 175.178.214.25 port 39382:11: Bye Bye [preauth] Feb 9 12:40:04.816624 sshd[2318]: Disconnected from invalid user zhangqin 175.178.214.25 port 39382 [preauth] Feb 9 12:40:04.819079 systemd[1]: sshd@69-139.178.89.23:22-175.178.214.25:39382.service: Deactivated successfully. Feb 9 12:40:04.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.89.23:22-175.178.214.25:39382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:04.913561 kernel: audit: type=1131 audit(1707482404.818:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.89.23:22-175.178.214.25:39382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:34.991947 systemd[1]: Started sshd@71-139.178.89.23:22-175.178.214.25:47268.service. Feb 9 12:40:34.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.89.23:22-175.178.214.25:47268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:35.086568 kernel: audit: type=1130 audit(1707482434.990:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.89.23:22-175.178.214.25:47268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:35.935060 sshd[2325]: Invalid user xieql from 175.178.214.25 port 47268 Feb 9 12:40:35.941278 sshd[2325]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:35.942431 sshd[2325]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:40:35.942522 sshd[2325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:40:35.943436 sshd[2325]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:35.942000 audit[2325]: USER_AUTH pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xieql" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:40:36.038564 kernel: audit: type=1100 audit(1707482435.942:350): pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xieql" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:40:37.609052 sshd[2325]: Failed password for invalid user xieql from 175.178.214.25 port 47268 ssh2 Feb 9 12:40:38.109149 sshd[2325]: Received disconnect from 175.178.214.25 port 47268:11: Bye Bye [preauth] Feb 9 12:40:38.109149 sshd[2325]: Disconnected from invalid user xieql 175.178.214.25 port 47268 [preauth] Feb 9 12:40:38.111618 systemd[1]: sshd@71-139.178.89.23:22-175.178.214.25:47268.service: Deactivated successfully. Feb 9 12:40:38.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.89.23:22-175.178.214.25:47268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:38.205435 kernel: audit: type=1131 audit(1707482438.110:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.89.23:22-175.178.214.25:47268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:52.418375 systemd[1]: Started sshd@72-139.178.89.23:22-124.222.50.131:43374.service. Feb 9 12:40:52.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.89.23:22-124.222.50.131:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:52.419166 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 9 12:40:52.512386 kernel: audit: type=1130 audit(1707482452.417:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.89.23:22-124.222.50.131:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:52.516934 systemd-tmpfiles[2330]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 12:40:52.517153 systemd-tmpfiles[2330]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 12:40:52.517840 systemd-tmpfiles[2330]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 12:40:52.527543 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 9 12:40:52.527630 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 9 12:40:52.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:52.528491 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 9 12:40:52.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:52.705672 kernel: audit: type=1130 audit(1707482452.526:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:52.705716 kernel: audit: type=1131 audit(1707482452.526:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:57.021761 systemd[1]: Started sshd@73-139.178.89.23:22-201.131.212.19:48994.service. Feb 9 12:40:57.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.89.23:22-201.131.212.19:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:57.115563 kernel: audit: type=1130 audit(1707482457.020:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.89.23:22-201.131.212.19:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:57.714899 sshd[2333]: Invalid user rahimtpc from 201.131.212.19 port 48994 Feb 9 12:40:57.720989 sshd[2333]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:57.722075 sshd[2333]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:40:57.722162 sshd[2333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:40:57.723132 sshd[2333]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:57.721000 audit[2333]: USER_AUTH pid=2333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rahimtpc" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:40:57.817564 kernel: audit: type=1100 audit(1707482457.721:356): pid=2333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rahimtpc" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:40:59.744876 sshd[2333]: Failed password for invalid user rahimtpc from 201.131.212.19 port 48994 ssh2 Feb 9 12:41:00.681621 sshd[2333]: Received disconnect from 201.131.212.19 port 48994:11: Bye Bye [preauth] Feb 9 12:41:00.681621 sshd[2333]: Disconnected from invalid user rahimtpc 201.131.212.19 port 48994 [preauth] Feb 9 12:41:00.684107 systemd[1]: sshd@73-139.178.89.23:22-201.131.212.19:48994.service: Deactivated successfully. Feb 9 12:41:00.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.89.23:22-201.131.212.19:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:00.778567 kernel: audit: type=1131 audit(1707482460.683:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.89.23:22-201.131.212.19:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:07.229636 systemd[1]: Started sshd@74-139.178.89.23:22-175.178.214.25:55148.service. Feb 9 12:41:07.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.89.23:22-175.178.214.25:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:07.323431 kernel: audit: type=1130 audit(1707482467.228:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.89.23:22-175.178.214.25:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:08.164317 sshd[2337]: Invalid user zeni from 175.178.214.25 port 55148 Feb 9 12:41:08.170343 sshd[2337]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:08.171312 sshd[2337]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:08.171434 sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:41:08.172307 sshd[2337]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:08.171000 audit[2337]: USER_AUTH pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zeni" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:41:08.266564 kernel: audit: type=1100 audit(1707482468.171:359): pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zeni" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:41:10.369820 sshd[2337]: Failed password for invalid user zeni from 175.178.214.25 port 55148 ssh2 Feb 9 12:41:10.619133 sshd[2337]: Received disconnect from 175.178.214.25 port 55148:11: Bye Bye [preauth] Feb 9 12:41:10.619133 sshd[2337]: Disconnected from invalid user zeni 175.178.214.25 port 55148 [preauth] Feb 9 12:41:10.621623 systemd[1]: sshd@74-139.178.89.23:22-175.178.214.25:55148.service: Deactivated successfully. Feb 9 12:41:10.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.89.23:22-175.178.214.25:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:10.715563 kernel: audit: type=1131 audit(1707482470.620:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.89.23:22-175.178.214.25:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:15.765756 sshd[2304]: Timeout before authentication for 124.222.50.131 port 54640 Feb 9 12:41:15.767128 systemd[1]: sshd@66-139.178.89.23:22-124.222.50.131:54640.service: Deactivated successfully. Feb 9 12:41:15.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.89.23:22-124.222.50.131:54640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:15.861427 kernel: audit: type=1131 audit(1707482475.766:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.89.23:22-124.222.50.131:54640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:20.547350 systemd[1]: Started sshd@75-139.178.89.23:22-2.57.122.87:51684.service. Feb 9 12:41:20.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.89.23:22-2.57.122.87:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:20.640553 kernel: audit: type=1130 audit(1707482480.546:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.89.23:22-2.57.122.87:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:21.477764 sshd[2343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 user=root Feb 9 12:41:21.476000 audit[2343]: USER_AUTH pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 12:41:21.569425 kernel: audit: type=1100 audit(1707482481.476:363): pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 12:41:23.459335 sshd[2343]: Failed password for root from 2.57.122.87 port 51684 ssh2 Feb 9 12:41:23.944083 sshd[2343]: Connection closed by authenticating user root 2.57.122.87 port 51684 [preauth] Feb 9 12:41:23.946636 systemd[1]: sshd@75-139.178.89.23:22-2.57.122.87:51684.service: Deactivated successfully. Feb 9 12:41:23.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.89.23:22-2.57.122.87:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:24.040553 kernel: audit: type=1131 audit(1707482483.945:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.89.23:22-2.57.122.87:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:42.053169 systemd[1]: Started sshd@76-139.178.89.23:22-175.178.214.25:34796.service. Feb 9 12:41:42.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.89.23:22-175.178.214.25:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:42.146385 kernel: audit: type=1130 audit(1707482502.051:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.89.23:22-175.178.214.25:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:42.946463 systemd[1]: Started sshd@77-139.178.89.23:22-124.222.50.131:51878.service. Feb 9 12:41:42.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.89.23:22-124.222.50.131:51878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:42.980905 sshd[2349]: Invalid user onluslis from 175.178.214.25 port 34796 Feb 9 12:41:42.982254 sshd[2349]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:42.982554 sshd[2349]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:42.982598 sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:41:42.984243 sshd[2349]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:42.982000 audit[2349]: USER_AUTH pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="onluslis" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:41:43.131833 kernel: audit: type=1130 audit(1707482502.945:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.89.23:22-124.222.50.131:51878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:43.131869 kernel: audit: type=1100 audit(1707482502.982:367): pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="onluslis" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:41:44.526088 sshd[2352]: Invalid user backend from 124.222.50.131 port 51878 Feb 9 12:41:44.532233 sshd[2352]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:44.533316 sshd[2352]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:44.533428 sshd[2352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.50.131 Feb 9 12:41:44.534305 sshd[2352]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:44.533000 audit[2352]: USER_AUTH pid=2352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="backend" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:41:44.628402 kernel: audit: type=1100 audit(1707482504.533:368): pid=2352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="backend" exe="/usr/sbin/sshd" hostname=124.222.50.131 addr=124.222.50.131 terminal=ssh res=failed' Feb 9 12:41:45.181766 sshd[2349]: Failed password for invalid user onluslis from 175.178.214.25 port 34796 ssh2 Feb 9 12:41:46.348510 sshd[2349]: Received disconnect from 175.178.214.25 port 34796:11: Bye Bye [preauth] Feb 9 12:41:46.348510 sshd[2349]: Disconnected from invalid user onluslis 175.178.214.25 port 34796 [preauth] Feb 9 12:41:46.350997 systemd[1]: sshd@76-139.178.89.23:22-175.178.214.25:34796.service: Deactivated successfully. Feb 9 12:41:46.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.89.23:22-175.178.214.25:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:46.445447 kernel: audit: type=1131 audit(1707482506.350:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.89.23:22-175.178.214.25:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:47.007681 sshd[2352]: Failed password for invalid user backend from 124.222.50.131 port 51878 ssh2 Feb 9 12:41:47.527917 sshd[2352]: Received disconnect from 124.222.50.131 port 51878:11: Bye Bye [preauth] Feb 9 12:41:47.527917 sshd[2352]: Disconnected from invalid user backend 124.222.50.131 port 51878 [preauth] Feb 9 12:41:47.530421 systemd[1]: sshd@77-139.178.89.23:22-124.222.50.131:51878.service: Deactivated successfully. Feb 9 12:41:47.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.89.23:22-124.222.50.131:51878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:47.624576 kernel: audit: type=1131 audit(1707482507.529:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.89.23:22-124.222.50.131:51878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:03.470928 sshd[2321]: Timeout before authentication for 124.222.50.131 port 34894 Feb 9 12:42:03.472327 systemd[1]: sshd@70-139.178.89.23:22-124.222.50.131:34894.service: Deactivated successfully. Feb 9 12:42:03.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.89.23:22-124.222.50.131:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:03.566552 kernel: audit: type=1131 audit(1707482523.471:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.89.23:22-124.222.50.131:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:13.576543 systemd[1]: Started sshd@78-139.178.89.23:22-175.178.214.25:42674.service. Feb 9 12:42:13.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.89.23:22-175.178.214.25:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:13.670566 kernel: audit: type=1130 audit(1707482533.575:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.89.23:22-175.178.214.25:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:14.504098 sshd[2362]: Invalid user lqs from 175.178.214.25 port 42674 Feb 9 12:42:14.510240 sshd[2362]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:14.511239 sshd[2362]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:14.511325 sshd[2362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:42:14.512413 sshd[2362]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:14.511000 audit[2362]: USER_AUTH pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lqs" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:42:14.606439 kernel: audit: type=1100 audit(1707482534.511:373): pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lqs" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:42:16.770250 sshd[2362]: Failed password for invalid user lqs from 175.178.214.25 port 42674 ssh2 Feb 9 12:42:18.744990 sshd[2362]: Received disconnect from 175.178.214.25 port 42674:11: Bye Bye [preauth] Feb 9 12:42:18.744990 sshd[2362]: Disconnected from invalid user lqs 175.178.214.25 port 42674 [preauth] Feb 9 12:42:18.747468 systemd[1]: sshd@78-139.178.89.23:22-175.178.214.25:42674.service: Deactivated successfully. Feb 9 12:42:18.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.89.23:22-175.178.214.25:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:18.841418 kernel: audit: type=1131 audit(1707482538.746:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.89.23:22-175.178.214.25:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:23.180720 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:42:23.180Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1231} Feb 9 12:42:23.196056 systemd[1]: Started sshd@79-139.178.89.23:22-201.131.212.19:49086.service. Feb 9 12:42:23.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.89.23:22-201.131.212.19:49086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:23.200603 etcd-wrapper[1703]: {"level":"info","ts":"2024-02-09T12:42:23.200Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1231,"took":"19.570751ms"} Feb 9 12:42:23.290577 kernel: audit: type=1130 audit(1707482543.194:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.89.23:22-201.131.212.19:49086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:23.894602 sshd[2368]: Invalid user xieql from 201.131.212.19 port 49086 Feb 9 12:42:23.900962 sshd[2368]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:23.902246 sshd[2368]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:23.902332 sshd[2368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:42:23.903326 sshd[2368]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:23.902000 audit[2368]: USER_AUTH pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xieql" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:42:23.996422 kernel: audit: type=1100 audit(1707482543.902:376): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xieql" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:42:25.393781 sshd[2368]: Failed password for invalid user xieql from 201.131.212.19 port 49086 ssh2 Feb 9 12:42:26.065718 sshd[2368]: Received disconnect from 201.131.212.19 port 49086:11: Bye Bye [preauth] Feb 9 12:42:26.065718 sshd[2368]: Disconnected from invalid user xieql 201.131.212.19 port 49086 [preauth] Feb 9 12:42:26.068156 systemd[1]: sshd@79-139.178.89.23:22-201.131.212.19:49086.service: Deactivated successfully. Feb 9 12:42:26.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.89.23:22-201.131.212.19:49086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:26.162567 kernel: audit: type=1131 audit(1707482546.067:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.89.23:22-201.131.212.19:49086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:33.843247 systemd[1]: Started sshd@80-139.178.89.23:22-124.222.50.131:60378.service. Feb 9 12:42:33.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.89.23:22-124.222.50.131:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:33.936524 kernel: audit: type=1130 audit(1707482553.842:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.89.23:22-124.222.50.131:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:46.523222 systemd[1]: Started sshd@81-139.178.89.23:22-175.178.214.25:50556.service. Feb 9 12:42:46.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.89.23:22-175.178.214.25:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:46.617564 kernel: audit: type=1130 audit(1707482566.522:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.89.23:22-175.178.214.25:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:47.451021 sshd[2374]: Invalid user b3auser from 175.178.214.25 port 50556 Feb 9 12:42:47.457202 sshd[2374]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:47.458359 sshd[2374]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:47.458468 sshd[2374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:42:47.459343 sshd[2374]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:47.459000 audit[2374]: USER_AUTH pid=2374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="b3auser" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:42:47.553438 kernel: audit: type=1100 audit(1707482567.459:380): pid=2374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="b3auser" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:42:48.914231 sshd[2374]: Failed password for invalid user b3auser from 175.178.214.25 port 50556 ssh2 Feb 9 12:42:49.730910 sshd[2374]: Received disconnect from 175.178.214.25 port 50556:11: Bye Bye [preauth] Feb 9 12:42:49.730910 sshd[2374]: Disconnected from invalid user b3auser 175.178.214.25 port 50556 [preauth] Feb 9 12:42:49.733460 systemd[1]: sshd@81-139.178.89.23:22-175.178.214.25:50556.service: Deactivated successfully. Feb 9 12:42:49.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.89.23:22-175.178.214.25:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:49.827563 kernel: audit: type=1131 audit(1707482569.733:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.89.23:22-175.178.214.25:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:52.424199 sshd[2329]: Timeout before authentication for 124.222.50.131 port 43374 Feb 9 12:42:52.425753 systemd[1]: sshd@72-139.178.89.23:22-124.222.50.131:43374.service: Deactivated successfully. Feb 9 12:42:52.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.89.23:22-124.222.50.131:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:52.518563 kernel: audit: type=1131 audit(1707482572.425:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.89.23:22-124.222.50.131:43374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:17.862356 systemd[1]: Started sshd@82-139.178.89.23:22-175.178.214.25:58440.service. Feb 9 12:43:17.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.89.23:22-175.178.214.25:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:17.956558 kernel: audit: type=1130 audit(1707482597.861:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.89.23:22-175.178.214.25:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:18.792798 sshd[2379]: Invalid user xmjj from 175.178.214.25 port 58440 Feb 9 12:43:18.793949 sshd[2379]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:18.794145 sshd[2379]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:18.794161 sshd[2379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:43:18.794319 sshd[2379]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:18.793000 audit[2379]: USER_AUTH pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmjj" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:43:18.888569 kernel: audit: type=1100 audit(1707482598.793:384): pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xmjj" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:43:20.836432 sshd[2379]: Failed password for invalid user xmjj from 175.178.214.25 port 58440 ssh2 Feb 9 12:43:21.066278 sshd[2379]: Received disconnect from 175.178.214.25 port 58440:11: Bye Bye [preauth] Feb 9 12:43:21.066278 sshd[2379]: Disconnected from invalid user xmjj 175.178.214.25 port 58440 [preauth] Feb 9 12:43:21.068840 systemd[1]: sshd@82-139.178.89.23:22-175.178.214.25:58440.service: Deactivated successfully. Feb 9 12:43:21.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.89.23:22-175.178.214.25:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:21.162395 kernel: audit: type=1131 audit(1707482601.067:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.89.23:22-175.178.214.25:58440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:22.013932 systemd[1]: Started sshd@83-139.178.89.23:22-124.222.50.131:40628.service. Feb 9 12:43:22.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.89.23:22-124.222.50.131:40628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:22.107562 kernel: audit: type=1130 audit(1707482602.012:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.89.23:22-124.222.50.131:40628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:49.995809 systemd[1]: Started sshd@84-139.178.89.23:22-201.131.212.19:37344.service. Feb 9 12:43:49.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.89.23:22-201.131.212.19:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:50.089367 kernel: audit: type=1130 audit(1707482629.995:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.89.23:22-201.131.212.19:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:50.674774 sshd[2385]: Invalid user zeni from 201.131.212.19 port 37344 Feb 9 12:43:50.680850 sshd[2385]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:50.681701 sshd[2385]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:50.681718 sshd[2385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:43:50.681928 sshd[2385]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:50.681000 audit[2385]: USER_AUTH pid=2385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zeni" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:43:50.776366 kernel: audit: type=1100 audit(1707482630.681:388): pid=2385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zeni" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:43:52.201842 systemd[1]: Started sshd@85-139.178.89.23:22-175.178.214.25:38084.service. Feb 9 12:43:52.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.89.23:22-175.178.214.25:38084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:52.296422 kernel: audit: type=1130 audit(1707482632.201:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.89.23:22-175.178.214.25:38084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:52.783972 sshd[2385]: Failed password for invalid user zeni from 201.131.212.19 port 37344 ssh2 Feb 9 12:43:53.122380 sshd[2385]: Received disconnect from 201.131.212.19 port 37344:11: Bye Bye [preauth] Feb 9 12:43:53.122380 sshd[2385]: Disconnected from invalid user zeni 201.131.212.19 port 37344 [preauth] Feb 9 12:43:53.124843 systemd[1]: sshd@84-139.178.89.23:22-201.131.212.19:37344.service: Deactivated successfully. Feb 9 12:43:53.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.89.23:22-201.131.212.19:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:53.127151 sshd[2388]: Invalid user sansari from 175.178.214.25 port 38084 Feb 9 12:43:53.129922 sshd[2388]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:53.130184 sshd[2388]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:53.130199 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:43:53.130431 sshd[2388]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:53.130000 audit[2388]: USER_AUTH pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sansari" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:43:53.311186 kernel: audit: type=1131 audit(1707482633.124:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.89.23:22-201.131.212.19:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:53.311219 kernel: audit: type=1100 audit(1707482633.130:391): pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sansari" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:43:54.644604 sshd[2388]: Failed password for invalid user sansari from 175.178.214.25 port 38084 ssh2 Feb 9 12:43:55.189885 sshd[2388]: Received disconnect from 175.178.214.25 port 38084:11: Bye Bye [preauth] Feb 9 12:43:55.189885 sshd[2388]: Disconnected from invalid user sansari 175.178.214.25 port 38084 [preauth] Feb 9 12:43:55.192305 systemd[1]: sshd@85-139.178.89.23:22-175.178.214.25:38084.service: Deactivated successfully. Feb 9 12:43:55.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.89.23:22-175.178.214.25:38084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:55.287467 kernel: audit: type=1131 audit(1707482635.192:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.89.23:22-175.178.214.25:38084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:24.720288 systemd[1]: Started sshd@86-139.178.89.23:22-175.178.214.25:45968.service. Feb 9 12:44:24.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.89.23:22-175.178.214.25:45968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:24.814432 kernel: audit: type=1130 audit(1707482664.719:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.89.23:22-175.178.214.25:45968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:25.685835 sshd[2394]: Invalid user chola from 175.178.214.25 port 45968 Feb 9 12:44:25.691908 sshd[2394]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:25.692685 sshd[2394]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:44:25.692726 sshd[2394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.214.25 Feb 9 12:44:25.692956 sshd[2394]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:25.691000 audit[2394]: USER_AUTH pid=2394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="chola" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:44:25.787571 kernel: audit: type=1100 audit(1707482665.691:394): pid=2394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="chola" exe="/usr/sbin/sshd" hostname=175.178.214.25 addr=175.178.214.25 terminal=ssh res=failed' Feb 9 12:44:27.599513 sshd[2394]: Failed password for invalid user chola from 175.178.214.25 port 45968 ssh2 Feb 9 12:44:29.336871 sshd[2394]: Received disconnect from 175.178.214.25 port 45968:11: Bye Bye [preauth] Feb 9 12:44:29.336871 sshd[2394]: Disconnected from invalid user chola 175.178.214.25 port 45968 [preauth] Feb 9 12:44:29.339326 systemd[1]: sshd@86-139.178.89.23:22-175.178.214.25:45968.service: Deactivated successfully. Feb 9 12:44:29.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.89.23:22-175.178.214.25:45968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:29.433542 kernel: audit: type=1131 audit(1707482669.338:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.89.23:22-175.178.214.25:45968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.850483 sshd[2372]: Timeout before authentication for 124.222.50.131 port 60378 Feb 9 12:44:33.852131 systemd[1]: sshd@80-139.178.89.23:22-124.222.50.131:60378.service: Deactivated successfully. Feb 9 12:44:33.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.89.23:22-124.222.50.131:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:33.946562 kernel: audit: type=1131 audit(1707482673.851:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.89.23:22-124.222.50.131:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:15.061395 systemd[1]: Started sshd@87-139.178.89.23:22-201.131.212.19:58128.service. Feb 9 12:45:15.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.89.23:22-201.131.212.19:58128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:15.155556 kernel: audit: type=1130 audit(1707482715.060:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.89.23:22-201.131.212.19:58128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:15.759063 sshd[2402]: Invalid user dmielgo from 201.131.212.19 port 58128 Feb 9 12:45:15.765173 sshd[2402]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:15.766291 sshd[2402]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:45:15.766412 sshd[2402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.212.19 Feb 9 12:45:15.767456 sshd[2402]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:15.766000 audit[2402]: USER_AUTH pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dmielgo" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:45:15.861561 kernel: audit: type=1100 audit(1707482715.766:398): pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dmielgo" exe="/usr/sbin/sshd" hostname=201.131.212.19 addr=201.131.212.19 terminal=ssh res=failed' Feb 9 12:45:17.538403 sshd[2402]: Failed password for invalid user dmielgo from 201.131.212.19 port 58128 ssh2 Feb 9 12:45:18.299237 sshd[2402]: Received disconnect from 201.131.212.19 port 58128:11: Bye Bye [preauth] Feb 9 12:45:18.299237 sshd[2402]: Disconnected from invalid user dmielgo 201.131.212.19 port 58128 [preauth] Feb 9 12:45:18.301684 systemd[1]: sshd@87-139.178.89.23:22-201.131.212.19:58128.service: Deactivated successfully. Feb 9 12:45:18.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.89.23:22-201.131.212.19:58128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:18.396554 kernel: audit: type=1131 audit(1707482718.300:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.89.23:22-201.131.212.19:58128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:22.019097 sshd[2383]: Timeout before authentication for 124.222.50.131 port 40628 Feb 9 12:45:22.020583 systemd[1]: sshd@83-139.178.89.23:22-124.222.50.131:40628.service: Deactivated successfully. Feb 9 12:45:22.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.89.23:22-124.222.50.131:40628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:22.114565 kernel: audit: type=1131 audit(1707482722.019:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.89.23:22-124.222.50.131:40628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'