Feb 9 11:43:30.566136 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 11:43:30.566149 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 11:43:30.566156 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 11:43:30.566160 kernel: BIOS-provided physical RAM map: Feb 9 11:43:30.566164 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 11:43:30.566167 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 11:43:30.566172 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 11:43:30.566176 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 11:43:30.566180 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 11:43:30.566184 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000061f6efff] usable Feb 9 11:43:30.566188 kernel: BIOS-e820: [mem 0x0000000061f6f000-0x0000000061f6ffff] ACPI NVS Feb 9 11:43:30.566192 kernel: BIOS-e820: [mem 0x0000000061f70000-0x0000000061f70fff] reserved Feb 9 11:43:30.566195 kernel: BIOS-e820: [mem 0x0000000061f71000-0x000000006c0c4fff] usable Feb 9 11:43:30.566199 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Feb 9 11:43:30.566204 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Feb 9 11:43:30.566209 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Feb 9 11:43:30.566213 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Feb 9 11:43:30.566217 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Feb 9 11:43:30.566222 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Feb 9 11:43:30.566226 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 11:43:30.566230 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 11:43:30.566234 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 11:43:30.566238 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 11:43:30.566242 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 11:43:30.566246 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Feb 9 11:43:30.566251 kernel: NX (Execute Disable) protection: active Feb 9 11:43:30.566255 kernel: SMBIOS 3.2.1 present. Feb 9 11:43:30.566259 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 11:43:30.566263 kernel: tsc: Detected 3400.000 MHz processor Feb 9 11:43:30.566268 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 11:43:30.566272 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 11:43:30.566276 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 11:43:30.566281 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Feb 9 11:43:30.566285 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 11:43:30.566289 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Feb 9 11:43:30.566294 kernel: Using GB pages for direct mapping Feb 9 11:43:30.566299 kernel: ACPI: Early table checksum verification disabled Feb 9 11:43:30.566303 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 11:43:30.566308 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 11:43:30.566312 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Feb 9 11:43:30.566320 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 11:43:30.566325 kernel: ACPI: FACS 0x000000006D762F80 000040 Feb 9 11:43:30.566330 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Feb 9 11:43:30.566356 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Feb 9 11:43:30.566361 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 11:43:30.566366 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 11:43:30.566387 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 11:43:30.566392 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 11:43:30.566396 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 11:43:30.566402 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 11:43:30.566406 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 11:43:30.566411 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 11:43:30.566416 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 11:43:30.566420 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 11:43:30.566425 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 11:43:30.566429 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 11:43:30.566434 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 11:43:30.566439 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 11:43:30.566444 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 11:43:30.566449 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 11:43:30.566454 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 11:43:30.566458 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 11:43:30.566463 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 11:43:30.566467 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 11:43:30.566472 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xf0a 01072009 AMI 00010013) Feb 9 11:43:30.566477 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 11:43:30.566482 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 11:43:30.566487 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 11:43:30.566492 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 11:43:30.566496 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 11:43:30.566501 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Feb 9 11:43:30.566506 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Feb 9 11:43:30.566510 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Feb 9 11:43:30.566515 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Feb 9 11:43:30.566519 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Feb 9 11:43:30.566525 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Feb 9 11:43:30.566529 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Feb 9 11:43:30.566534 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Feb 9 11:43:30.566539 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Feb 9 11:43:30.566543 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Feb 9 11:43:30.566548 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Feb 9 11:43:30.566552 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Feb 9 11:43:30.566557 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Feb 9 11:43:30.566561 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Feb 9 11:43:30.566567 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Feb 9 11:43:30.566571 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Feb 9 11:43:30.566576 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Feb 9 11:43:30.566580 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Feb 9 11:43:30.566585 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Feb 9 11:43:30.566590 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Feb 9 11:43:30.566594 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Feb 9 11:43:30.566599 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Feb 9 11:43:30.566603 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Feb 9 11:43:30.566609 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Feb 9 11:43:30.566613 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Feb 9 11:43:30.566618 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Feb 9 11:43:30.566622 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Feb 9 11:43:30.566627 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Feb 9 11:43:30.566632 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Feb 9 11:43:30.566636 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Feb 9 11:43:30.566641 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Feb 9 11:43:30.566645 kernel: No NUMA configuration found Feb 9 11:43:30.566651 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Feb 9 11:43:30.566655 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Feb 9 11:43:30.566660 kernel: Zone ranges: Feb 9 11:43:30.566665 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 11:43:30.566669 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 11:43:30.566674 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Feb 9 11:43:30.566679 kernel: Movable zone start for each node Feb 9 11:43:30.566683 kernel: Early memory node ranges Feb 9 11:43:30.566688 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 11:43:30.566692 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 11:43:30.566698 kernel: node 0: [mem 0x0000000040400000-0x0000000061f6efff] Feb 9 11:43:30.566702 kernel: node 0: [mem 0x0000000061f71000-0x000000006c0c4fff] Feb 9 11:43:30.566707 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Feb 9 11:43:30.566711 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Feb 9 11:43:30.566716 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Feb 9 11:43:30.566721 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Feb 9 11:43:30.566729 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 11:43:30.566734 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 11:43:30.566739 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 11:43:30.566744 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 11:43:30.566750 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 11:43:30.566755 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 9 11:43:30.566760 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Feb 9 11:43:30.566765 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 11:43:30.566770 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 11:43:30.566775 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 11:43:30.566781 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 11:43:30.566786 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 11:43:30.566791 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 11:43:30.566795 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 11:43:30.566800 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 11:43:30.566805 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 11:43:30.566810 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 11:43:30.566815 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 11:43:30.566820 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 11:43:30.566826 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 11:43:30.566831 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 11:43:30.566836 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 11:43:30.566840 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 11:43:30.566845 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 11:43:30.566850 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 11:43:30.566855 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 11:43:30.566860 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 11:43:30.566865 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 11:43:30.566871 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 11:43:30.566876 kernel: TSC deadline timer available Feb 9 11:43:30.566881 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 11:43:30.566886 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Feb 9 11:43:30.566891 kernel: Booting paravirtualized kernel on bare hardware Feb 9 11:43:30.566896 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 11:43:30.566901 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 11:43:30.566906 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 11:43:30.566911 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 11:43:30.566916 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 11:43:30.566921 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Feb 9 11:43:30.566926 kernel: Policy zone: Normal Feb 9 11:43:30.566932 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 11:43:30.566937 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 11:43:30.566942 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 11:43:30.566947 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 11:43:30.566952 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 11:43:30.566958 kernel: Memory: 32555728K/33281940K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 725952K reserved, 0K cma-reserved) Feb 9 11:43:30.566963 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 11:43:30.566968 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 11:43:30.566973 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 11:43:30.566977 kernel: rcu: Hierarchical RCU implementation. Feb 9 11:43:30.566983 kernel: rcu: RCU event tracing is enabled. Feb 9 11:43:30.566988 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 11:43:30.566992 kernel: Rude variant of Tasks RCU enabled. Feb 9 11:43:30.566997 kernel: Tracing variant of Tasks RCU enabled. Feb 9 11:43:30.567003 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 11:43:30.567008 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 11:43:30.567013 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 11:43:30.567018 kernel: random: crng init done Feb 9 11:43:30.567023 kernel: Console: colour dummy device 80x25 Feb 9 11:43:30.567028 kernel: printk: console [tty0] enabled Feb 9 11:43:30.567033 kernel: printk: console [ttyS1] enabled Feb 9 11:43:30.567038 kernel: ACPI: Core revision 20210730 Feb 9 11:43:30.567043 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 11:43:30.567048 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 11:43:30.567053 kernel: DMAR: Host address width 39 Feb 9 11:43:30.567058 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 11:43:30.567063 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 11:43:30.567068 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 11:43:30.567073 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 11:43:30.567078 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Feb 9 11:43:30.567083 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Feb 9 11:43:30.567088 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 11:43:30.567094 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 11:43:30.567099 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 11:43:30.567104 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 11:43:30.567108 kernel: x2apic enabled Feb 9 11:43:30.567113 kernel: Switched APIC routing to cluster x2apic. Feb 9 11:43:30.567118 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 11:43:30.567123 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 11:43:30.567128 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 11:43:30.567133 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 11:43:30.567139 kernel: process: using mwait in idle threads Feb 9 11:43:30.567144 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 11:43:30.567149 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 11:43:30.567154 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 11:43:30.567159 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 11:43:30.567164 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 11:43:30.567169 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 11:43:30.567174 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 11:43:30.567179 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 11:43:30.567184 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 11:43:30.567190 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 11:43:30.567195 kernel: TAA: Mitigation: TSX disabled Feb 9 11:43:30.567200 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 11:43:30.567205 kernel: SRBDS: Mitigation: Microcode Feb 9 11:43:30.567209 kernel: GDS: Vulnerable: No microcode Feb 9 11:43:30.567214 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 11:43:30.567219 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 11:43:30.567224 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 11:43:30.567230 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 11:43:30.567235 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 11:43:30.567240 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 11:43:30.567245 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 11:43:30.567250 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 11:43:30.567255 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 11:43:30.567260 kernel: Freeing SMP alternatives memory: 32K Feb 9 11:43:30.567264 kernel: pid_max: default: 32768 minimum: 301 Feb 9 11:43:30.567269 kernel: LSM: Security Framework initializing Feb 9 11:43:30.567275 kernel: SELinux: Initializing. Feb 9 11:43:30.567280 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 11:43:30.567285 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 11:43:30.567290 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 11:43:30.567295 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 11:43:30.567300 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 11:43:30.567305 kernel: ... version: 4 Feb 9 11:43:30.567310 kernel: ... bit width: 48 Feb 9 11:43:30.567315 kernel: ... generic registers: 4 Feb 9 11:43:30.567322 kernel: ... value mask: 0000ffffffffffff Feb 9 11:43:30.567327 kernel: ... max period: 00007fffffffffff Feb 9 11:43:30.567332 kernel: ... fixed-purpose events: 3 Feb 9 11:43:30.567359 kernel: ... event mask: 000000070000000f Feb 9 11:43:30.567364 kernel: signal: max sigframe size: 2032 Feb 9 11:43:30.567369 kernel: rcu: Hierarchical SRCU implementation. Feb 9 11:43:30.567374 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 11:43:30.567379 kernel: smp: Bringing up secondary CPUs ... Feb 9 11:43:30.567400 kernel: x86: Booting SMP configuration: Feb 9 11:43:30.567405 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 11:43:30.567411 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 11:43:30.567416 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 11:43:30.567421 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 11:43:30.567425 kernel: smpboot: Max logical packages: 1 Feb 9 11:43:30.567430 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 11:43:30.567435 kernel: devtmpfs: initialized Feb 9 11:43:30.567440 kernel: x86/mm: Memory block size: 128MB Feb 9 11:43:30.567445 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x61f6f000-0x61f6ffff] (4096 bytes) Feb 9 11:43:30.567451 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Feb 9 11:43:30.567456 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 11:43:30.567461 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 11:43:30.567466 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 11:43:30.567471 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 11:43:30.567476 kernel: audit: initializing netlink subsys (disabled) Feb 9 11:43:30.567481 kernel: audit: type=2000 audit(1707479005.110:1): state=initialized audit_enabled=0 res=1 Feb 9 11:43:30.567485 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 11:43:30.567491 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 11:43:30.567496 kernel: cpuidle: using governor menu Feb 9 11:43:30.567501 kernel: ACPI: bus type PCI registered Feb 9 11:43:30.567506 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 11:43:30.567511 kernel: dca service started, version 1.12.1 Feb 9 11:43:30.567516 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 11:43:30.567521 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 11:43:30.567526 kernel: PCI: Using configuration type 1 for base access Feb 9 11:43:30.567531 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 11:43:30.567536 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 11:43:30.567541 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 11:43:30.567546 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 11:43:30.567551 kernel: ACPI: Added _OSI(Module Device) Feb 9 11:43:30.567556 kernel: ACPI: Added _OSI(Processor Device) Feb 9 11:43:30.567561 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 11:43:30.567566 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 11:43:30.567571 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 11:43:30.567576 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 11:43:30.567581 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 11:43:30.567587 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 11:43:30.567591 kernel: ACPI: Dynamic OEM Table Load: Feb 9 11:43:30.567596 kernel: ACPI: SSDT 0xFFFFA0DA00215000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 11:43:30.567601 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 11:43:30.567606 kernel: ACPI: Dynamic OEM Table Load: Feb 9 11:43:30.567611 kernel: ACPI: SSDT 0xFFFFA0DA01CEB400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 11:43:30.567616 kernel: ACPI: Dynamic OEM Table Load: Feb 9 11:43:30.567621 kernel: ACPI: SSDT 0xFFFFA0DA01C59000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 11:43:30.567626 kernel: ACPI: Dynamic OEM Table Load: Feb 9 11:43:30.567631 kernel: ACPI: SSDT 0xFFFFA0DA01C5E000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 11:43:30.567636 kernel: ACPI: Dynamic OEM Table Load: Feb 9 11:43:30.567641 kernel: ACPI: SSDT 0xFFFFA0DA0014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 11:43:30.567646 kernel: ACPI: Dynamic OEM Table Load: Feb 9 11:43:30.567651 kernel: ACPI: SSDT 0xFFFFA0DA01CED000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 11:43:30.567656 kernel: ACPI: Interpreter enabled Feb 9 11:43:30.567661 kernel: ACPI: PM: (supports S0 S5) Feb 9 11:43:30.567666 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 11:43:30.567671 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 11:43:30.567677 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 11:43:30.567681 kernel: HEST: Table parsing has been initialized. Feb 9 11:43:30.567686 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 11:43:30.567691 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 11:43:30.567696 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 11:43:30.567701 kernel: ACPI: PM: Power Resource [USBC] Feb 9 11:43:30.567706 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 11:43:30.567711 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 11:43:30.567716 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 11:43:30.567721 kernel: ACPI: PM: Power Resource [WRST] Feb 9 11:43:30.567726 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 11:43:30.567731 kernel: ACPI: PM: Power Resource [FN00] Feb 9 11:43:30.567736 kernel: ACPI: PM: Power Resource [FN01] Feb 9 11:43:30.567741 kernel: ACPI: PM: Power Resource [FN02] Feb 9 11:43:30.567746 kernel: ACPI: PM: Power Resource [FN03] Feb 9 11:43:30.567751 kernel: ACPI: PM: Power Resource [FN04] Feb 9 11:43:30.567756 kernel: ACPI: PM: Power Resource [PIN] Feb 9 11:43:30.567761 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 11:43:30.567824 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 11:43:30.567871 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 11:43:30.567910 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 11:43:30.567917 kernel: PCI host bridge to bus 0000:00 Feb 9 11:43:30.567961 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 11:43:30.567998 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 11:43:30.568034 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 11:43:30.568071 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Feb 9 11:43:30.568106 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 11:43:30.568143 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 11:43:30.568191 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 11:43:30.568239 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 11:43:30.568281 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.568330 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 11:43:30.568411 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.568456 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 11:43:30.568499 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Feb 9 11:43:30.568542 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 11:43:30.568584 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 11:43:30.568631 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 11:43:30.568674 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Feb 9 11:43:30.568719 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 11:43:30.568760 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Feb 9 11:43:30.568805 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 11:43:30.568846 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Feb 9 11:43:30.568889 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 11:43:30.568932 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 11:43:30.568973 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Feb 9 11:43:30.569012 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Feb 9 11:43:30.569055 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 11:43:30.569097 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 11:43:30.569140 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 11:43:30.569184 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 11:43:30.569230 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 11:43:30.569271 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Feb 9 11:43:30.569313 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 11:43:30.569402 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 11:43:30.569446 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Feb 9 11:43:30.569488 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 11:43:30.569533 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 11:43:30.569574 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Feb 9 11:43:30.569614 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 11:43:30.569658 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 11:43:30.569699 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Feb 9 11:43:30.569739 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Feb 9 11:43:30.569781 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 11:43:30.569821 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 11:43:30.569861 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 11:43:30.569902 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Feb 9 11:43:30.569942 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 11:43:30.569987 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 11:43:30.570031 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.570078 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 11:43:30.570121 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.570167 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 11:43:30.570211 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.570255 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 11:43:30.570297 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.570370 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 11:43:30.570427 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.570472 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 11:43:30.570512 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 11:43:30.570558 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 11:43:30.570601 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 11:43:30.570645 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Feb 9 11:43:30.570685 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 11:43:30.570732 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 11:43:30.570773 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 11:43:30.570815 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 11:43:30.570862 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 11:43:30.570904 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 11:43:30.570947 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Feb 9 11:43:30.570989 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 11:43:30.571031 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 11:43:30.571073 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 11:43:30.571123 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 11:43:30.571166 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 11:43:30.571209 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Feb 9 11:43:30.571250 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 11:43:30.571293 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 11:43:30.571364 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 11:43:30.571421 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 11:43:30.571464 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 11:43:30.571504 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 11:43:30.571546 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 11:43:30.571592 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 11:43:30.571636 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Feb 9 11:43:30.571678 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 11:43:30.571720 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Feb 9 11:43:30.571761 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.571805 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 11:43:30.571845 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 11:43:30.571886 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 11:43:30.571931 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 11:43:30.571973 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Feb 9 11:43:30.572016 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 11:43:30.572058 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Feb 9 11:43:30.572102 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 11:43:30.572142 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 11:43:30.572183 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 11:43:30.572222 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 11:43:30.572263 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 11:43:30.572309 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 11:43:30.572404 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 11:43:30.572446 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 11:43:30.572545 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 11:43:30.572587 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 11:43:30.572627 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 11:43:30.572669 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 11:43:30.572716 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 11:43:30.572766 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 11:43:30.572811 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Feb 9 11:43:30.572859 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Feb 9 11:43:30.572902 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 11:43:30.572946 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 11:43:30.572990 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 11:43:30.573034 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 11:43:30.573077 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 11:43:30.573120 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 11:43:30.573162 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 11:43:30.573171 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 11:43:30.573176 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 11:43:30.573181 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 11:43:30.573187 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 11:43:30.573192 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 11:43:30.573198 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 11:43:30.573203 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 11:43:30.573208 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 11:43:30.573214 kernel: iommu: Default domain type: Translated Feb 9 11:43:30.573220 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 11:43:30.573263 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 11:43:30.573310 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 11:43:30.573356 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 11:43:30.573364 kernel: vgaarb: loaded Feb 9 11:43:30.573370 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 11:43:30.573375 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 11:43:30.573380 kernel: PTP clock support registered Feb 9 11:43:30.573387 kernel: PCI: Using ACPI for IRQ routing Feb 9 11:43:30.573392 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 11:43:30.573397 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 11:43:30.573403 kernel: e820: reserve RAM buffer [mem 0x61f6f000-0x63ffffff] Feb 9 11:43:30.573408 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Feb 9 11:43:30.573413 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Feb 9 11:43:30.573418 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Feb 9 11:43:30.573423 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 11:43:30.573429 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 11:43:30.573435 kernel: clocksource: Switched to clocksource tsc-early Feb 9 11:43:30.573440 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 11:43:30.573445 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 11:43:30.573450 kernel: pnp: PnP ACPI init Feb 9 11:43:30.573493 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 11:43:30.573534 kernel: pnp 00:02: [dma 0 disabled] Feb 9 11:43:30.573575 kernel: pnp 00:03: [dma 0 disabled] Feb 9 11:43:30.573617 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 11:43:30.573655 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 11:43:30.573697 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 11:43:30.573736 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 11:43:30.573774 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 11:43:30.573812 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 11:43:30.573848 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 11:43:30.573887 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 11:43:30.573923 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 11:43:30.573958 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 11:43:30.573995 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 11:43:30.574034 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 11:43:30.574072 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 11:43:30.574109 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 11:43:30.574145 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 11:43:30.574181 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 11:43:30.574217 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 11:43:30.574253 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 11:43:30.574292 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 11:43:30.574300 kernel: pnp: PnP ACPI: found 10 devices Feb 9 11:43:30.574305 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 11:43:30.574312 kernel: NET: Registered PF_INET protocol family Feb 9 11:43:30.574319 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 11:43:30.574325 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 11:43:30.574330 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 11:43:30.574336 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 11:43:30.574341 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 11:43:30.574346 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 11:43:30.574352 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 11:43:30.574358 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 11:43:30.574363 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 11:43:30.574369 kernel: NET: Registered PF_XDP protocol family Feb 9 11:43:30.574412 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Feb 9 11:43:30.574454 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Feb 9 11:43:30.574495 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Feb 9 11:43:30.574536 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 11:43:30.574580 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 11:43:30.574622 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 11:43:30.574666 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 11:43:30.574710 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 11:43:30.574751 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 11:43:30.574793 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 11:43:30.574836 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 11:43:30.574878 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 11:43:30.574919 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 11:43:30.574961 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 11:43:30.575001 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 11:43:30.575043 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 11:43:30.575084 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 11:43:30.575125 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 11:43:30.575167 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 11:43:30.575211 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 11:43:30.575254 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 11:43:30.575295 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 11:43:30.575340 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 11:43:30.575381 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 11:43:30.575421 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 11:43:30.575459 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 11:43:30.575495 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 11:43:30.575533 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 11:43:30.575569 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 11:43:30.575605 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Feb 9 11:43:30.575640 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 11:43:30.575681 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Feb 9 11:43:30.575720 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 11:43:30.575763 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 11:43:30.575804 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Feb 9 11:43:30.575846 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 11:43:30.575885 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Feb 9 11:43:30.575926 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 11:43:30.575964 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 11:43:30.576004 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 11:43:30.576043 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 11:43:30.576052 kernel: PCI: CLS 64 bytes, default 64 Feb 9 11:43:30.576057 kernel: DMAR: No ATSR found Feb 9 11:43:30.576063 kernel: DMAR: No SATC found Feb 9 11:43:30.576068 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 11:43:30.576073 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 11:43:30.576079 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 11:43:30.576084 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 11:43:30.576089 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 11:43:30.576095 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 11:43:30.576101 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 11:43:30.576106 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 11:43:30.576111 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 11:43:30.576116 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 11:43:30.576122 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 11:43:30.576127 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 11:43:30.576170 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 11:43:30.576211 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 11:43:30.576254 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 11:43:30.576296 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 11:43:30.576340 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 11:43:30.576381 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 11:43:30.576421 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 11:43:30.576462 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 11:43:30.576502 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 11:43:30.576543 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 11:43:30.576583 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 11:43:30.576626 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 11:43:30.576666 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 11:43:30.576707 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 11:43:30.576748 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 11:43:30.576789 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 11:43:30.576831 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 11:43:30.576873 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 11:43:30.576914 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 11:43:30.576956 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 11:43:30.576996 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 11:43:30.577037 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 11:43:30.577078 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 11:43:30.577121 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 11:43:30.577164 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 11:43:30.577208 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 11:43:30.577251 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 11:43:30.577296 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 11:43:30.577342 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 11:43:30.577349 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 11:43:30.577355 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 11:43:30.577360 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Feb 9 11:43:30.577366 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 11:43:30.577371 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 11:43:30.577376 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 11:43:30.577383 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 11:43:30.577388 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 11:43:30.577432 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 11:43:30.577441 kernel: Initialise system trusted keyrings Feb 9 11:43:30.577446 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 11:43:30.577451 kernel: Key type asymmetric registered Feb 9 11:43:30.577457 kernel: Asymmetric key parser 'x509' registered Feb 9 11:43:30.577462 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 11:43:30.577469 kernel: io scheduler mq-deadline registered Feb 9 11:43:30.577474 kernel: io scheduler kyber registered Feb 9 11:43:30.577479 kernel: io scheduler bfq registered Feb 9 11:43:30.577520 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 11:43:30.577562 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 11:43:30.577603 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 11:43:30.577645 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 11:43:30.577686 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 11:43:30.577729 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 11:43:30.577771 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 11:43:30.577815 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 11:43:30.577823 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 11:43:30.577829 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 11:43:30.577834 kernel: pstore: Registered erst as persistent store backend Feb 9 11:43:30.577839 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 11:43:30.577845 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 11:43:30.577852 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 11:43:30.577857 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 11:43:30.577901 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 11:43:30.577909 kernel: i8042: PNP: No PS/2 controller found. Feb 9 11:43:30.577946 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 11:43:30.577984 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 11:43:30.578021 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T11:43:29 UTC (1707479009) Feb 9 11:43:30.578057 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 11:43:30.578066 kernel: fail to initialize ptp_kvm Feb 9 11:43:30.578071 kernel: intel_pstate: Intel P-state driver initializing Feb 9 11:43:30.578077 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 11:43:30.578082 kernel: intel_pstate: HWP enabled Feb 9 11:43:30.578087 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 11:43:30.578093 kernel: vesafb: scrolling: redraw Feb 9 11:43:30.578098 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 11:43:30.578103 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x0000000012bf4e20, using 768k, total 768k Feb 9 11:43:30.578110 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 11:43:30.578115 kernel: fb0: VESA VGA frame buffer device Feb 9 11:43:30.578120 kernel: NET: Registered PF_INET6 protocol family Feb 9 11:43:30.578126 kernel: Segment Routing with IPv6 Feb 9 11:43:30.578131 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 11:43:30.578136 kernel: NET: Registered PF_PACKET protocol family Feb 9 11:43:30.578141 kernel: Key type dns_resolver registered Feb 9 11:43:30.578147 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 11:43:30.578152 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 11:43:30.578157 kernel: IPI shorthand broadcast: enabled Feb 9 11:43:30.578163 kernel: sched_clock: Marking stable (1837510141, 1348871675)->(4611212812, -1424830996) Feb 9 11:43:30.578168 kernel: registered taskstats version 1 Feb 9 11:43:30.578174 kernel: Loading compiled-in X.509 certificates Feb 9 11:43:30.578179 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 11:43:30.578184 kernel: Key type .fscrypt registered Feb 9 11:43:30.578189 kernel: Key type fscrypt-provisioning registered Feb 9 11:43:30.578195 kernel: pstore: Using crash dump compression: deflate Feb 9 11:43:30.578200 kernel: ima: Allocated hash algorithm: sha1 Feb 9 11:43:30.578206 kernel: ima: No architecture policies found Feb 9 11:43:30.578212 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 11:43:30.578217 kernel: Write protecting the kernel read-only data: 28672k Feb 9 11:43:30.578222 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 11:43:30.578228 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 11:43:30.578233 kernel: Run /init as init process Feb 9 11:43:30.578238 kernel: with arguments: Feb 9 11:43:30.578243 kernel: /init Feb 9 11:43:30.578249 kernel: with environment: Feb 9 11:43:30.578255 kernel: HOME=/ Feb 9 11:43:30.578260 kernel: TERM=linux Feb 9 11:43:30.578265 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 11:43:30.578271 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 11:43:30.578278 systemd[1]: Detected architecture x86-64. Feb 9 11:43:30.578284 systemd[1]: Running in initrd. Feb 9 11:43:30.578289 systemd[1]: No hostname configured, using default hostname. Feb 9 11:43:30.578294 systemd[1]: Hostname set to . Feb 9 11:43:30.578301 systemd[1]: Initializing machine ID from random generator. Feb 9 11:43:30.578306 systemd[1]: Queued start job for default target initrd.target. Feb 9 11:43:30.578312 systemd[1]: Started systemd-ask-password-console.path. Feb 9 11:43:30.578317 systemd[1]: Reached target cryptsetup.target. Feb 9 11:43:30.578325 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 9 11:43:30.578330 systemd[1]: Reached target paths.target. Feb 9 11:43:30.578335 systemd[1]: Reached target slices.target. Feb 9 11:43:30.578341 systemd[1]: Reached target swap.target. Feb 9 11:43:30.578347 systemd[1]: Reached target timers.target. Feb 9 11:43:30.578353 systemd[1]: Listening on iscsid.socket. Feb 9 11:43:30.578359 systemd[1]: Listening on iscsiuio.socket. Feb 9 11:43:30.578364 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 11:43:30.578370 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 11:43:30.578375 systemd[1]: Listening on systemd-journald.socket. Feb 9 11:43:30.578381 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 11:43:30.578386 kernel: tsc: Refined TSC clocksource calibration: 3408.047 MHz Feb 9 11:43:30.578392 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x31200094248, max_idle_ns: 440795318142 ns Feb 9 11:43:30.578398 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 11:43:30.578403 kernel: clocksource: Switched to clocksource tsc Feb 9 11:43:30.578409 systemd[1]: Reached target sockets.target. Feb 9 11:43:30.578414 systemd[1]: Starting iscsiuio.service... Feb 9 11:43:30.578420 systemd[1]: Starting kmod-static-nodes.service... Feb 9 11:43:30.578425 kernel: SCSI subsystem initialized Feb 9 11:43:30.578430 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 11:43:30.578436 kernel: Loading iSCSI transport class v2.0-870. Feb 9 11:43:30.578442 systemd[1]: Starting systemd-journald.service... Feb 9 11:43:30.578448 systemd[1]: Starting systemd-modules-load.service... Feb 9 11:43:30.578456 systemd-journald[267]: Journal started Feb 9 11:43:30.578482 systemd-journald[267]: Runtime Journal (/run/log/journal/e6235fb851a04264a873f6877c3e2d16) is 8.0M, max 636.8M, 628.8M free. Feb 9 11:43:30.581115 systemd-modules-load[268]: Inserted module 'overlay' Feb 9 11:43:30.605324 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 11:43:30.638334 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 11:43:30.638367 systemd[1]: Started iscsiuio.service. Feb 9 11:43:30.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.664363 kernel: Bridge firewalling registered Feb 9 11:43:30.664378 kernel: audit: type=1130 audit(1707479010.662:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.664386 systemd[1]: Started systemd-journald.service. Feb 9 11:43:30.723485 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 9 11:43:30.838438 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 11:43:30.838451 kernel: audit: type=1130 audit(1707479010.741:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.838459 kernel: device-mapper: uevent: version 1.0.3 Feb 9 11:43:30.838465 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 11:43:30.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.742504 systemd[1]: Finished kmod-static-nodes.service. Feb 9 11:43:30.896108 kernel: audit: type=1130 audit(1707479010.850:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.845293 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 9 11:43:30.947563 kernel: audit: type=1130 audit(1707479010.904:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.851848 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 11:43:31.001222 kernel: audit: type=1130 audit(1707479010.956:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.904574 systemd[1]: Finished systemd-modules-load.service. Feb 9 11:43:31.056287 kernel: audit: type=1130 audit(1707479011.009:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:30.956590 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 11:43:31.009874 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 11:43:31.056648 systemd[1]: Starting systemd-sysctl.service... Feb 9 11:43:31.056932 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 11:43:31.059706 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 11:43:31.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.060301 systemd[1]: Finished systemd-sysctl.service. Feb 9 11:43:31.109386 kernel: audit: type=1130 audit(1707479011.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.121641 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 11:43:31.228239 kernel: audit: type=1130 audit(1707479011.121:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.228255 kernel: audit: type=1130 audit(1707479011.177:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.177895 systemd[1]: Starting dracut-cmdline.service... Feb 9 11:43:31.260419 kernel: iscsi: registered transport (tcp) Feb 9 11:43:31.260432 dracut-cmdline[290]: dracut-dracut-053 Feb 9 11:43:31.260432 dracut-cmdline[290]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 11:43:31.260432 dracut-cmdline[290]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 11:43:31.332581 kernel: iscsi: registered transport (qla4xxx) Feb 9 11:43:31.332597 kernel: QLogic iSCSI HBA Driver Feb 9 11:43:31.320069 systemd[1]: Finished dracut-cmdline.service. Feb 9 11:43:31.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.359222 systemd[1]: Starting dracut-pre-udev.service... Feb 9 11:43:31.372875 systemd[1]: Starting iscsid.service... Feb 9 11:43:31.387551 systemd[1]: Started iscsid.service. Feb 9 11:43:31.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.410791 iscsid[442]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 11:43:31.410791 iscsid[442]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 11:43:31.410791 iscsid[442]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 11:43:31.410791 iscsid[442]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 11:43:31.410791 iscsid[442]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 11:43:31.410791 iscsid[442]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 11:43:31.410791 iscsid[442]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 11:43:31.562430 kernel: raid6: avx2x4 gen() 26519 MB/s Feb 9 11:43:31.562444 kernel: raid6: avx2x4 xor() 21752 MB/s Feb 9 11:43:31.562451 kernel: raid6: avx2x2 gen() 53860 MB/s Feb 9 11:43:31.562458 kernel: raid6: avx2x2 xor() 32169 MB/s Feb 9 11:43:31.562464 kernel: raid6: avx2x1 gen() 45306 MB/s Feb 9 11:43:31.606389 kernel: raid6: avx2x1 xor() 27909 MB/s Feb 9 11:43:31.641393 kernel: raid6: sse2x4 gen() 21364 MB/s Feb 9 11:43:31.676392 kernel: raid6: sse2x4 xor() 11992 MB/s Feb 9 11:43:31.711354 kernel: raid6: sse2x2 gen() 21679 MB/s Feb 9 11:43:31.746397 kernel: raid6: sse2x2 xor() 13440 MB/s Feb 9 11:43:31.779393 kernel: raid6: sse2x1 gen() 18306 MB/s Feb 9 11:43:31.832126 kernel: raid6: sse2x1 xor() 8931 MB/s Feb 9 11:43:31.832142 kernel: raid6: using algorithm avx2x2 gen() 53860 MB/s Feb 9 11:43:31.832149 kernel: raid6: .... xor() 32169 MB/s, rmw enabled Feb 9 11:43:31.850610 kernel: raid6: using avx2x2 recovery algorithm Feb 9 11:43:31.897372 kernel: xor: automatically using best checksumming function avx Feb 9 11:43:31.976359 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 11:43:31.981168 systemd[1]: Finished dracut-pre-udev.service. Feb 9 11:43:31.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:31.990000 audit: BPF prog-id=6 op=LOAD Feb 9 11:43:31.990000 audit: BPF prog-id=7 op=LOAD Feb 9 11:43:31.991217 systemd[1]: Starting systemd-udevd.service... Feb 9 11:43:31.999179 systemd-udevd[468]: Using default interface naming scheme 'v252'. Feb 9 11:43:32.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:32.004479 systemd[1]: Started systemd-udevd.service. Feb 9 11:43:32.044448 dracut-pre-trigger[480]: rd.md=0: removing MD RAID activation Feb 9 11:43:32.020920 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 11:43:32.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:32.048991 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 11:43:32.062639 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 11:43:32.146072 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 11:43:32.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:32.146643 systemd[1]: Starting dracut-initqueue.service... Feb 9 11:43:32.175326 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 11:43:32.177335 kernel: libata version 3.00 loaded. Feb 9 11:43:32.177356 kernel: ACPI: bus type USB registered Feb 9 11:43:32.232445 kernel: usbcore: registered new interface driver usbfs Feb 9 11:43:32.232493 kernel: usbcore: registered new interface driver hub Feb 9 11:43:32.232505 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 11:43:32.249858 kernel: usbcore: registered new device driver usb Feb 9 11:43:32.268322 kernel: AES CTR mode by8 optimization enabled Feb 9 11:43:32.285324 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 11:43:32.319718 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 11:43:32.320325 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 11:43:32.361236 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 11:43:32.361316 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 11:43:32.361381 kernel: pps pps0: new PPS source ptp0 Feb 9 11:43:32.392457 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 11:43:32.392539 kernel: scsi host0: ahci Feb 9 11:43:32.392558 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 11:43:32.437334 kernel: scsi host1: ahci Feb 9 11:43:32.437463 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:66 Feb 9 11:43:32.437552 kernel: scsi host2: ahci Feb 9 11:43:32.438324 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 9 11:43:32.438397 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 11:43:32.468172 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 11:43:32.468276 kernel: scsi host3: ahci Feb 9 11:43:32.485321 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 11:43:32.530322 kernel: pps pps1: new PPS source ptp1 Feb 9 11:43:32.530396 kernel: scsi host4: ahci Feb 9 11:43:32.570086 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 11:43:32.570161 kernel: scsi host5: ahci Feb 9 11:43:32.570178 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 11:43:32.593087 kernel: scsi host6: ahci Feb 9 11:43:32.593107 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:67 Feb 9 11:43:32.607584 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 11:43:32.618091 kernel: scsi host7: ahci Feb 9 11:43:32.618111 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 11:43:32.688671 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 129 Feb 9 11:43:32.688684 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 129 Feb 9 11:43:32.704623 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 11:43:32.704697 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 129 Feb 9 11:43:32.755553 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 129 Feb 9 11:43:32.755567 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 11:43:32.755639 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 129 Feb 9 11:43:32.807073 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 129 Feb 9 11:43:32.807085 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 129 Feb 9 11:43:32.840887 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 129 Feb 9 11:43:33.067463 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 11:43:33.115802 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 9 11:43:33.115991 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 11:43:33.161352 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 11:43:33.161373 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 11:43:33.176384 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 11:43:33.191380 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 11:43:33.205353 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 11:43:33.220353 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 11:43:33.234353 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 11:43:33.250330 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 11:43:33.265323 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 11:43:33.281352 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 11:43:33.328408 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 11:43:33.328448 kernel: ata1.00: Features: NCQ-prio Feb 9 11:43:33.328465 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 11:43:33.356378 kernel: ata2.00: Features: NCQ-prio Feb 9 11:43:33.374354 kernel: ata1.00: configured for UDMA/133 Feb 9 11:43:33.374386 kernel: ata2.00: configured for UDMA/133 Feb 9 11:43:33.374403 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 11:43:33.407324 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 11:43:33.407397 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 11:43:33.442368 kernel: port_module: 9 callbacks suppressed Feb 9 11:43:33.442383 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 11:43:33.487326 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 11:43:33.487440 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 11:43:33.517152 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 11:43:33.550194 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 11:43:33.550267 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 11:43:33.550325 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 11:43:33.566444 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 11:43:33.608305 kernel: hub 1-0:1.0: USB hub found Feb 9 11:43:33.608394 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 11:43:33.608403 kernel: hub 1-0:1.0: 16 ports detected Feb 9 11:43:33.608461 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 11:43:33.634241 kernel: hub 2-0:1.0: USB hub found Feb 9 11:43:33.634352 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 11:43:33.634425 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 11:43:33.634501 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 9 11:43:33.634563 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 9 11:43:33.634619 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 11:43:33.634671 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 11:43:33.634726 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 11:43:33.636325 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 11:43:33.636345 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 11:43:33.636357 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 9 11:43:33.637327 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 11:43:33.638326 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 11:43:33.662700 kernel: hub 2-0:1.0: 10 ports detected Feb 9 11:43:33.662780 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 9 11:43:33.692299 kernel: usb: port power management may be unreliable Feb 9 11:43:33.692316 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 9 11:43:33.857793 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 11:43:33.857871 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 11:43:33.857931 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 11:43:33.894392 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 11:43:33.894419 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 11:43:33.938338 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 11:43:33.938355 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 9 11:43:33.970366 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 9 11:43:33.984168 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 11:43:34.059430 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sdb6 scanned by (udev-worker) (528) Feb 9 11:43:34.059445 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 9 11:43:34.059520 kernel: hub 1-14:1.0: USB hub found Feb 9 11:43:34.059584 kernel: hub 1-14:1.0: 4 ports detected Feb 9 11:43:34.028458 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 11:43:34.051133 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 11:43:34.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.069635 systemd[1]: Finished dracut-initqueue.service. Feb 9 11:43:34.147526 kernel: audit: type=1130 audit(1707479014.090:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.097983 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 11:43:34.141584 systemd[1]: Reached target initrd-root-device.target. Feb 9 11:43:34.156525 systemd[1]: Reached target remote-fs-pre.target. Feb 9 11:43:34.156555 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 11:43:34.179477 systemd[1]: Reached target remote-fs.target. Feb 9 11:43:34.180019 systemd[1]: Starting disk-uuid.service... Feb 9 11:43:34.314779 kernel: audit: type=1130 audit(1707479014.229:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.314794 kernel: audit: type=1131 audit(1707479014.229:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.208649 systemd[1]: Starting dracut-pre-mount.service... Feb 9 11:43:34.385867 kernel: audit: type=1130 audit(1707479014.322:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.385878 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 11:43:34.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.222499 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 11:43:34.222547 systemd[1]: Finished disk-uuid.service. Feb 9 11:43:34.229668 systemd[1]: Finished dracut-pre-mount.service. Feb 9 11:43:34.323422 systemd[1]: Reached target local-fs-pre.target. Feb 9 11:43:34.394456 systemd[1]: Reached target local-fs.target. Feb 9 11:43:34.394490 systemd[1]: Reached target sysinit.target. Feb 9 11:43:34.416433 systemd[1]: Reached target basic.target. Feb 9 11:43:34.429127 systemd[1]: Starting systemd-fsck-root.service... Feb 9 11:43:34.443958 systemd[1]: Starting verity-setup.service... Feb 9 11:43:34.462429 systemd-fsck[709]: ROOT: clean, 624/553520 files, 56033/553472 blocks Feb 9 11:43:34.494329 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 11:43:34.496699 systemd[1]: Finished systemd-fsck-root.service. Feb 9 11:43:34.577439 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 11:43:34.577453 kernel: audit: type=1130 audit(1707479014.509:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.577461 kernel: usbcore: registered new interface driver usbhid Feb 9 11:43:34.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.510820 systemd[1]: Mounting sysroot.mount... Feb 9 11:43:34.642572 kernel: usbhid: USB HID core driver Feb 9 11:43:34.642587 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 11:43:34.621848 systemd[1]: Found device dev-mapper-usr.device. Feb 9 11:43:34.677414 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 11:43:34.664513 systemd[1]: Finished verity-setup.service. Feb 9 11:43:34.858277 kernel: audit: type=1130 audit(1707479014.686:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.858291 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 11:43:34.858446 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 11:43:34.858460 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 11:43:34.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:34.686902 systemd[1]: Mounted sysroot.mount. Feb 9 11:43:34.866668 systemd[1]: Reached target initrd-root-fs.target. Feb 9 11:43:34.874999 systemd[1]: Mounting sysusr-usr.mount... Feb 9 11:43:34.926533 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 11:43:34.920005 systemd[1]: Mounted sysusr-usr.mount. Feb 9 11:43:34.927258 systemd[1]: Mounting sysroot-usr.mount... Feb 9 11:43:34.946994 systemd[1]: Mounted sysroot-usr.mount. Feb 9 11:43:34.963939 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 11:43:35.064000 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 11:43:35.064015 kernel: BTRFS info (device sdb6): using free space tree Feb 9 11:43:35.064023 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 11:43:35.064030 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 11:43:34.983157 systemd[1]: Starting initrd-setup-root.service... Feb 9 11:43:35.072657 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 11:43:35.089646 systemd[1]: Finished initrd-setup-root.service. Feb 9 11:43:35.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.107992 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 11:43:35.178559 kernel: audit: type=1130 audit(1707479015.107:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.168623 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 11:43:35.243332 kernel: audit: type=1130 audit(1707479015.188:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.243364 initrd-setup-root-after-ignition[804]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 11:43:35.188604 systemd[1]: Reached target ignition-subsequent.target. Feb 9 11:43:35.251836 systemd[1]: Starting initrd-parse-etc.service... Feb 9 11:43:35.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.343394 kernel: audit: type=1130 audit(1707479015.288:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.271360 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 11:43:35.271408 systemd[1]: Finished initrd-parse-etc.service. Feb 9 11:43:35.288590 systemd[1]: Reached target initrd-fs.target. Feb 9 11:43:35.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.352532 systemd[1]: Reached target initrd.target. Feb 9 11:43:35.352615 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 11:43:35.352982 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 11:43:35.374722 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 11:43:35.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.390941 systemd[1]: Starting initrd-cleanup.service... Feb 9 11:43:35.408167 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 11:43:35.419639 systemd[1]: Stopped target timers.target. Feb 9 11:43:35.437799 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 11:43:35.438063 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 11:43:35.455189 systemd[1]: Stopped target initrd.target. Feb 9 11:43:35.469895 systemd[1]: Stopped target basic.target. Feb 9 11:43:35.485060 systemd[1]: Stopped target ignition-subsequent.target. Feb 9 11:43:35.503055 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 9 11:43:35.520910 systemd[1]: Stopped target initrd-root-device.target. Feb 9 11:43:35.537901 systemd[1]: Stopped target paths.target. Feb 9 11:43:35.551901 systemd[1]: Stopped target remote-fs.target. Feb 9 11:43:35.567895 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 11:43:35.583893 systemd[1]: Stopped target slices.target. Feb 9 11:43:35.600045 systemd[1]: Stopped target sockets.target. Feb 9 11:43:35.619047 systemd[1]: Stopped target sysinit.target. Feb 9 11:43:35.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.637059 systemd[1]: Stopped target local-fs.target. Feb 9 11:43:35.652917 systemd[1]: Stopped target local-fs-pre.target. Feb 9 11:43:35.668893 systemd[1]: Stopped target swap.target. Feb 9 11:43:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.683830 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 11:43:35.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.684066 systemd[1]: Closed iscsid.socket. Feb 9 11:43:35.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.698913 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 11:43:35.699227 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 11:43:35.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.715102 systemd[1]: Stopped target cryptsetup.target. Feb 9 11:43:35.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.730924 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 11:43:35.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.735532 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 11:43:35.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.745753 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 11:43:35.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.746077 systemd[1]: Stopped dracut-initqueue.service. Feb 9 11:43:35.762018 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 11:43:35.762373 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 11:43:35.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.779999 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 11:43:35.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.780311 systemd[1]: Stopped initrd-setup-root.service. Feb 9 11:43:35.796362 systemd[1]: Stopping iscsiuio.service... Feb 9 11:43:35.809521 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 11:43:35.809898 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 11:43:36.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.825987 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 11:43:36.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.826295 systemd[1]: Stopped systemd-sysctl.service. Feb 9 11:43:36.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.842093 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 11:43:35.842447 systemd[1]: Stopped systemd-modules-load.service. Feb 9 11:43:36.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.858092 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 11:43:36.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:36.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.858435 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 11:43:36.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:36.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:35.876971 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 11:43:35.877289 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 11:43:35.895360 systemd[1]: Stopping systemd-udevd.service... Feb 9 11:43:35.911949 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 11:43:35.912366 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 11:43:35.912413 systemd[1]: Stopped iscsiuio.service. Feb 9 11:43:36.199494 iscsid[442]: iscsid shutting down. Feb 9 11:43:35.933876 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 11:43:35.933972 systemd[1]: Stopped systemd-udevd.service. Feb 9 11:43:35.951850 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 11:43:35.951931 systemd[1]: Closed iscsiuio.socket. Feb 9 11:43:35.968739 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 11:43:35.968850 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 11:43:35.983699 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 11:43:35.983797 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 11:43:35.998687 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 11:43:35.998839 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 11:43:36.016765 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 11:43:36.016901 systemd[1]: Stopped dracut-cmdline.service. Feb 9 11:43:36.031774 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 11:43:36.031914 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 11:43:36.049306 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 11:43:36.062497 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 11:43:36.062566 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 11:43:36.080803 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 11:43:36.080858 systemd[1]: Finished initrd-cleanup.service. Feb 9 11:43:36.096900 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 11:43:36.096988 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 11:43:36.116248 systemd[1]: Reached target initrd-switch-root.target. Feb 9 11:43:36.132190 systemd[1]: Starting initrd-switch-root.service... Feb 9 11:43:36.158128 systemd[1]: Switching root. Feb 9 11:43:36.200195 systemd-journald[267]: Journal stopped Feb 9 11:43:40.239698 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 9 11:43:40.239712 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 11:43:40.239721 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 11:43:40.239727 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 11:43:40.239732 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 11:43:40.239737 kernel: SELinux: policy capability open_perms=1 Feb 9 11:43:40.239743 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 11:43:40.239748 kernel: SELinux: policy capability always_check_network=0 Feb 9 11:43:40.239755 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 11:43:40.239760 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 11:43:40.239765 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 11:43:40.239770 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 11:43:40.239776 systemd[1]: Successfully loaded SELinux policy in 306.240ms. Feb 9 11:43:40.239782 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.688ms. Feb 9 11:43:40.239791 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 11:43:40.239797 systemd[1]: Detected architecture x86-64. Feb 9 11:43:40.239803 systemd[1]: Detected first boot. Feb 9 11:43:40.239808 systemd[1]: Hostname set to . Feb 9 11:43:40.239815 systemd[1]: Initializing machine ID from random generator. Feb 9 11:43:40.239820 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 11:43:40.239827 systemd[1]: Populated /etc with preset unit settings. Feb 9 11:43:40.239833 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 11:43:40.239839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 11:43:40.239846 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 11:43:40.239852 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 9 11:43:40.239858 kernel: audit: type=1334 audit(1707479018.542:60): prog-id=10 op=LOAD Feb 9 11:43:40.239863 kernel: audit: type=1334 audit(1707479018.542:61): prog-id=3 op=UNLOAD Feb 9 11:43:40.239870 kernel: audit: type=1334 audit(1707479018.584:62): prog-id=11 op=LOAD Feb 9 11:43:40.239875 kernel: audit: type=1334 audit(1707479018.626:63): prog-id=12 op=LOAD Feb 9 11:43:40.239881 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 11:43:40.239887 kernel: audit: type=1334 audit(1707479018.626:64): prog-id=4 op=UNLOAD Feb 9 11:43:40.239893 systemd[1]: Stopped iscsid.service. Feb 9 11:43:40.239898 kernel: audit: type=1334 audit(1707479018.626:65): prog-id=5 op=UNLOAD Feb 9 11:43:40.239904 kernel: audit: type=1131 audit(1707479018.626:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.239909 kernel: audit: type=1334 audit(1707479018.774:67): prog-id=10 op=UNLOAD Feb 9 11:43:40.239916 kernel: audit: type=1131 audit(1707479018.787:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.239922 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 11:43:40.239929 systemd[1]: Stopped initrd-switch-root.service. Feb 9 11:43:40.239935 kernel: audit: type=1130 audit(1707479018.895:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.239941 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 11:43:40.239949 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 11:43:40.239955 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 11:43:40.239963 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 11:43:40.239969 systemd[1]: Created slice system-getty.slice. Feb 9 11:43:40.239975 systemd[1]: Created slice system-modprobe.slice. Feb 9 11:43:40.239981 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 11:43:40.239988 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 11:43:40.239994 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 11:43:40.240000 systemd[1]: Created slice user.slice. Feb 9 11:43:40.240006 systemd[1]: Started systemd-ask-password-console.path. Feb 9 11:43:40.240012 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 11:43:40.240019 systemd[1]: Set up automount boot.automount. Feb 9 11:43:40.240026 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 11:43:40.240032 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 11:43:40.240038 systemd[1]: Stopped target initrd-fs.target. Feb 9 11:43:40.240044 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 11:43:40.240050 systemd[1]: Reached target integritysetup.target. Feb 9 11:43:40.240056 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 11:43:40.240063 systemd[1]: Reached target remote-fs.target. Feb 9 11:43:40.240070 systemd[1]: Reached target slices.target. Feb 9 11:43:40.240076 systemd[1]: Reached target swap.target. Feb 9 11:43:40.240082 systemd[1]: Reached target torcx.target. Feb 9 11:43:40.240089 systemd[1]: Reached target veritysetup.target. Feb 9 11:43:40.240095 systemd[1]: Listening on systemd-coredump.socket. Feb 9 11:43:40.240102 systemd[1]: Listening on systemd-initctl.socket. Feb 9 11:43:40.240109 systemd[1]: Listening on systemd-networkd.socket. Feb 9 11:43:40.240115 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 11:43:40.240121 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 11:43:40.240128 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 11:43:40.240134 systemd[1]: Mounting dev-hugepages.mount... Feb 9 11:43:40.240141 systemd[1]: Mounting dev-mqueue.mount... Feb 9 11:43:40.240147 systemd[1]: Mounting media.mount... Feb 9 11:43:40.240154 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 11:43:40.240161 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 11:43:40.240167 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 11:43:40.240174 systemd[1]: Mounting tmp.mount... Feb 9 11:43:40.240180 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 11:43:40.240186 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 11:43:40.240193 systemd[1]: Starting kmod-static-nodes.service... Feb 9 11:43:40.240199 systemd[1]: Starting modprobe@configfs.service... Feb 9 11:43:40.240205 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 11:43:40.240212 systemd[1]: Starting modprobe@drm.service... Feb 9 11:43:40.240219 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 11:43:40.240225 systemd[1]: Starting modprobe@fuse.service... Feb 9 11:43:40.240231 kernel: fuse: init (API version 7.34) Feb 9 11:43:40.240237 systemd[1]: Starting modprobe@loop.service... Feb 9 11:43:40.240243 kernel: loop: module loaded Feb 9 11:43:40.240249 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 11:43:40.240256 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 11:43:40.240262 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 11:43:40.240270 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 11:43:40.240276 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 11:43:40.240283 systemd[1]: Stopped systemd-journald.service. Feb 9 11:43:40.240289 systemd[1]: Starting systemd-journald.service... Feb 9 11:43:40.240295 systemd[1]: Starting systemd-modules-load.service... Feb 9 11:43:40.240304 systemd-journald[946]: Journal started Feb 9 11:43:40.240333 systemd-journald[946]: Runtime Journal (/run/log/journal/3e50a26d864f4f59b80771f3c06d7cca) is 8.0M, max 636.8M, 628.8M free. Feb 9 11:43:36.681000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 11:43:36.939000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 11:43:36.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 11:43:36.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 11:43:36.942000 audit: BPF prog-id=8 op=LOAD Feb 9 11:43:36.942000 audit: BPF prog-id=8 op=UNLOAD Feb 9 11:43:36.942000 audit: BPF prog-id=9 op=LOAD Feb 9 11:43:36.942000 audit: BPF prog-id=9 op=UNLOAD Feb 9 11:43:37.008000 audit[838]: AVC avc: denied { associate } for pid=838 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 11:43:37.008000 audit[838]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=821 pid=838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:43:37.008000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 11:43:37.034000 audit[838]: AVC avc: denied { associate } for pid=838 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 11:43:37.034000 audit[838]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=821 pid=838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:43:37.034000 audit: CWD cwd="/" Feb 9 11:43:37.034000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:37.034000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:37.034000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 11:43:38.542000 audit: BPF prog-id=10 op=LOAD Feb 9 11:43:38.542000 audit: BPF prog-id=3 op=UNLOAD Feb 9 11:43:38.584000 audit: BPF prog-id=11 op=LOAD Feb 9 11:43:38.626000 audit: BPF prog-id=12 op=LOAD Feb 9 11:43:38.626000 audit: BPF prog-id=4 op=UNLOAD Feb 9 11:43:38.626000 audit: BPF prog-id=5 op=UNLOAD Feb 9 11:43:38.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:38.774000 audit: BPF prog-id=10 op=UNLOAD Feb 9 11:43:38.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:38.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:38.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.212000 audit: BPF prog-id=13 op=LOAD Feb 9 11:43:40.212000 audit: BPF prog-id=14 op=LOAD Feb 9 11:43:40.212000 audit: BPF prog-id=15 op=LOAD Feb 9 11:43:40.212000 audit: BPF prog-id=11 op=UNLOAD Feb 9 11:43:40.212000 audit: BPF prog-id=12 op=UNLOAD Feb 9 11:43:40.236000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 11:43:40.236000 audit[946]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffdefda350 a2=4000 a3=7fffdefda3ec items=0 ppid=1 pid=946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:43:40.236000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 11:43:37.008418 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 11:43:38.541450 systemd[1]: Queued start job for default target multi-user.target. Feb 9 11:43:37.008842 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 11:43:38.541456 systemd[1]: Unnecessary job was removed for dev-sdb6.device. Feb 9 11:43:37.008853 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 11:43:38.628097 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 11:43:37.008872 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 11:43:37.008877 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 11:43:37.008893 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 11:43:37.008900 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 11:43:37.009202 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 11:43:37.009224 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 11:43:37.009231 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 11:43:37.009673 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 11:43:37.009691 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 11:43:37.009701 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 11:43:37.009708 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 11:43:37.009717 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 11:43:37.009724 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 11:43:38.201661 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 11:43:38.201803 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 11:43:38.201857 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 11:43:38.201947 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 11:43:38.201977 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 11:43:38.202011 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-09T11:43:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 11:43:40.271498 systemd[1]: Starting systemd-network-generator.service... Feb 9 11:43:40.293361 systemd[1]: Starting systemd-remount-fs.service... Feb 9 11:43:40.315366 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 11:43:40.347864 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 11:43:40.347883 systemd[1]: Stopped verity-setup.service. Feb 9 11:43:40.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.382369 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 11:43:40.397494 systemd[1]: Started systemd-journald.service. Feb 9 11:43:40.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.404828 systemd[1]: Mounted dev-hugepages.mount. Feb 9 11:43:40.411540 systemd[1]: Mounted dev-mqueue.mount. Feb 9 11:43:40.418557 systemd[1]: Mounted media.mount. Feb 9 11:43:40.425564 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 11:43:40.434552 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 11:43:40.443538 systemd[1]: Mounted tmp.mount. Feb 9 11:43:40.450625 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 11:43:40.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.458651 systemd[1]: Finished kmod-static-nodes.service. Feb 9 11:43:40.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.467619 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 11:43:40.467714 systemd[1]: Finished modprobe@configfs.service. Feb 9 11:43:40.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.476738 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 11:43:40.476854 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 11:43:40.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.485804 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 11:43:40.485959 systemd[1]: Finished modprobe@drm.service. Feb 9 11:43:40.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.495976 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 11:43:40.496207 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 11:43:40.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.506168 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 11:43:40.506492 systemd[1]: Finished modprobe@fuse.service. Feb 9 11:43:40.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.515162 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 11:43:40.515483 systemd[1]: Finished modprobe@loop.service. Feb 9 11:43:40.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.524146 systemd[1]: Finished systemd-modules-load.service. Feb 9 11:43:40.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.533124 systemd[1]: Finished systemd-network-generator.service. Feb 9 11:43:40.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.542123 systemd[1]: Finished systemd-remount-fs.service. Feb 9 11:43:40.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.551116 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 11:43:40.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.560626 systemd[1]: Reached target network-pre.target. Feb 9 11:43:40.572045 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 11:43:40.580995 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 11:43:40.587505 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 11:43:40.588522 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 11:43:40.595987 systemd[1]: Starting systemd-journal-flush.service... Feb 9 11:43:40.599786 systemd-journald[946]: Time spent on flushing to /var/log/journal/3e50a26d864f4f59b80771f3c06d7cca is 10.518ms for 1291 entries. Feb 9 11:43:40.599786 systemd-journald[946]: System Journal (/var/log/journal/3e50a26d864f4f59b80771f3c06d7cca) is 8.0M, max 195.6M, 187.6M free. Feb 9 11:43:40.634731 systemd-journald[946]: Received client request to flush runtime journal. Feb 9 11:43:40.611453 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 11:43:40.611951 systemd[1]: Starting systemd-random-seed.service... Feb 9 11:43:40.623440 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 11:43:40.623936 systemd[1]: Starting systemd-sysctl.service... Feb 9 11:43:40.630965 systemd[1]: Starting systemd-sysusers.service... Feb 9 11:43:40.637903 systemd[1]: Starting systemd-udev-settle.service... Feb 9 11:43:40.645523 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 11:43:40.653501 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 11:43:40.661550 systemd[1]: Finished systemd-journal-flush.service. Feb 9 11:43:40.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.669567 systemd[1]: Finished systemd-random-seed.service. Feb 9 11:43:40.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.677527 systemd[1]: Finished systemd-sysctl.service. Feb 9 11:43:40.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.685520 systemd[1]: Finished systemd-sysusers.service. Feb 9 11:43:40.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.694412 systemd[1]: Reached target first-boot-complete.target. Feb 9 11:43:40.702621 udevadm[963]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 11:43:40.887575 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 11:43:40.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.896000 audit: BPF prog-id=16 op=LOAD Feb 9 11:43:40.896000 audit: BPF prog-id=17 op=LOAD Feb 9 11:43:40.896000 audit: BPF prog-id=6 op=UNLOAD Feb 9 11:43:40.896000 audit: BPF prog-id=7 op=UNLOAD Feb 9 11:43:40.897644 systemd[1]: Starting systemd-udevd.service... Feb 9 11:43:40.909203 systemd-udevd[964]: Using default interface naming scheme 'v252'. Feb 9 11:43:40.929116 systemd[1]: Started systemd-udevd.service. Feb 9 11:43:40.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:40.940496 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 11:43:40.940000 audit: BPF prog-id=18 op=LOAD Feb 9 11:43:40.941870 systemd[1]: Starting systemd-networkd.service... Feb 9 11:43:40.972189 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 11:43:40.972262 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 11:43:40.970000 audit: BPF prog-id=19 op=LOAD Feb 9 11:43:40.970000 audit: BPF prog-id=20 op=LOAD Feb 9 11:43:40.971000 audit: BPF prog-id=21 op=LOAD Feb 9 11:43:40.972822 systemd[1]: Starting systemd-userdbd.service... Feb 9 11:43:40.989324 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 11:43:40.989360 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 11:43:41.005328 kernel: ACPI: button: Power Button [PWRF] Feb 9 11:43:41.008901 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 11:43:41.019349 kernel: IPMI message handler: version 39.2 Feb 9 11:43:40.975000 audit[968]: AVC avc: denied { confidentiality } for pid=968 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 11:43:41.048424 kernel: ipmi device interface Feb 9 11:43:41.067769 systemd[1]: Started systemd-userdbd.service. Feb 9 11:43:41.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.104098 kernel: ipmi_si: IPMI System Interface driver Feb 9 11:43:41.104141 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 11:43:41.104230 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 11:43:41.120901 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 11:43:41.152080 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 11:43:41.152202 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 11:43:40.975000 audit[968]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5621e666ee30 a1=4d8bc a2=7f067a022bc5 a3=5 items=42 ppid=964 pid=968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:43:40.975000 audit: CWD cwd="/" Feb 9 11:43:40.975000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=1 name=(null) inode=24693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=2 name=(null) inode=24693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=3 name=(null) inode=24694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=4 name=(null) inode=24693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=5 name=(null) inode=24695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=6 name=(null) inode=24693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=7 name=(null) inode=24696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=8 name=(null) inode=24696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=9 name=(null) inode=24697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=10 name=(null) inode=24696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=11 name=(null) inode=24698 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=12 name=(null) inode=24696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=13 name=(null) inode=24699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=14 name=(null) inode=24696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=15 name=(null) inode=24700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=16 name=(null) inode=24696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=17 name=(null) inode=24701 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=18 name=(null) inode=24693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=19 name=(null) inode=24702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=20 name=(null) inode=24702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=21 name=(null) inode=24703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=22 name=(null) inode=24702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=23 name=(null) inode=24704 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=24 name=(null) inode=24702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=25 name=(null) inode=24705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=26 name=(null) inode=24702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=27 name=(null) inode=24706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=28 name=(null) inode=24702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=29 name=(null) inode=24707 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=30 name=(null) inode=24693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=31 name=(null) inode=24708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=32 name=(null) inode=24708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=33 name=(null) inode=24709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=34 name=(null) inode=24708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=35 name=(null) inode=24710 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=36 name=(null) inode=24708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=37 name=(null) inode=24711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=38 name=(null) inode=24708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=39 name=(null) inode=24712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=40 name=(null) inode=24708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PATH item=41 name=(null) inode=24713 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 11:43:40.975000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 11:43:41.197331 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 11:43:41.197449 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 11:43:41.197465 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 11:43:41.197545 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 11:43:41.228339 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 11:43:41.282326 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 11:43:41.282441 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 11:43:41.298325 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 11:43:41.330381 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 11:43:41.346371 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 11:43:41.390329 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 11:43:41.416616 systemd-networkd[1017]: bond0: netdev ready Feb 9 11:43:41.418730 systemd-networkd[1017]: lo: Link UP Feb 9 11:43:41.418733 systemd-networkd[1017]: lo: Gained carrier Feb 9 11:43:41.419043 systemd-networkd[1017]: Enumeration completed Feb 9 11:43:41.419129 systemd[1]: Started systemd-networkd.service. Feb 9 11:43:41.419332 systemd-networkd[1017]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 11:43:41.421740 systemd-networkd[1017]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a1:e9.network. Feb 9 11:43:41.430976 kernel: intel_rapl_common: Found RAPL domain package Feb 9 11:43:41.431009 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 11:43:41.431082 kernel: intel_rapl_common: Found RAPL domain core Feb 9 11:43:41.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.463114 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 11:43:41.463717 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 11:43:41.463759 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 11:43:41.463837 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 11:43:41.526325 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 11:43:41.529495 systemd[1]: Finished systemd-udev-settle.service. Feb 9 11:43:41.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.539014 systemd[1]: Starting lvm2-activation-early.service... Feb 9 11:43:41.554487 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 11:43:41.586761 systemd[1]: Finished lvm2-activation-early.service. Feb 9 11:43:41.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.595454 systemd[1]: Reached target cryptsetup.target. Feb 9 11:43:41.603970 systemd[1]: Starting lvm2-activation.service... Feb 9 11:43:41.606092 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 11:43:41.637760 systemd[1]: Finished lvm2-activation.service. Feb 9 11:43:41.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.647467 systemd[1]: Reached target local-fs-pre.target. Feb 9 11:43:41.655406 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 11:43:41.655420 systemd[1]: Reached target local-fs.target. Feb 9 11:43:41.663412 systemd[1]: Reached target machines.target. Feb 9 11:43:41.672023 systemd[1]: Starting ldconfig.service... Feb 9 11:43:41.679092 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 11:43:41.679113 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 11:43:41.679624 systemd[1]: Starting systemd-boot-update.service... Feb 9 11:43:41.686821 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 11:43:41.696894 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 11:43:41.697069 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 11:43:41.697094 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 11:43:41.697564 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 11:43:41.697740 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1072 (bootctl) Feb 9 11:43:41.698365 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 11:43:41.708802 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 11:43:41.709121 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 11:43:41.710664 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 11:43:41.714811 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 11:43:41.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.718769 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 11:43:41.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.719926 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 11:43:41.772803 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) Feb 9 11:43:41.772803 systemd-fsck[1080]: /dev/sdb1: 789 files, 115332/258078 clusters Feb 9 11:43:41.773437 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 11:43:41.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.785127 systemd[1]: Mounting boot.mount... Feb 9 11:43:41.805678 systemd[1]: Mounted boot.mount. Feb 9 11:43:41.825074 systemd[1]: Finished systemd-boot-update.service. Feb 9 11:43:41.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.853390 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 11:43:41.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:43:41.862190 systemd[1]: Starting audit-rules.service... Feb 9 11:43:41.869961 systemd[1]: Starting clean-ca-certificates.service... Feb 9 11:43:41.878938 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 11:43:41.880000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 11:43:41.880000 audit[1103]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffec8ea9e80 a2=420 a3=0 items=0 ppid=1086 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:43:41.880000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 11:43:41.882445 augenrules[1103]: No rules Feb 9 11:43:41.889422 systemd[1]: Starting systemd-resolved.service... Feb 9 11:43:41.898425 systemd[1]: Starting systemd-timesyncd.service... Feb 9 11:43:41.906833 systemd[1]: Starting systemd-update-utmp.service... Feb 9 11:43:41.914663 systemd[1]: Finished audit-rules.service. Feb 9 11:43:41.922502 systemd[1]: Finished clean-ca-certificates.service. Feb 9 11:43:41.931476 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 11:43:41.944226 systemd[1]: Finished systemd-update-utmp.service. Feb 9 11:43:41.952414 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 11:43:41.961121 ldconfig[1071]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 11:43:41.963516 systemd[1]: Finished ldconfig.service. Feb 9 11:43:41.971833 systemd-resolved[1109]: Positive Trust Anchors: Feb 9 11:43:41.971840 systemd-resolved[1109]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 11:43:41.971860 systemd-resolved[1109]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 11:43:41.972008 systemd[1]: Starting systemd-update-done.service... Feb 9 11:43:41.978501 systemd[1]: Started systemd-timesyncd.service. Feb 9 11:43:41.987528 systemd[1]: Finished systemd-update-done.service. Feb 9 11:43:41.991455 systemd-resolved[1109]: Using system hostname 'ci-3510.3.2-a-7f3e7a1b0e'. Feb 9 11:43:41.996481 systemd[1]: Reached target time-set.target. Feb 9 11:43:42.026472 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 11:43:42.050371 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 11:43:42.050430 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 11:43:42.050778 systemd-networkd[1017]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a1:e8.network. Feb 9 11:43:42.051380 systemd[1]: Started systemd-resolved.service. Feb 9 11:43:42.079442 systemd[1]: Reached target network.target. Feb 9 11:43:42.087404 systemd[1]: Reached target nss-lookup.target. Feb 9 11:43:42.095395 systemd[1]: Reached target sysinit.target. Feb 9 11:43:42.103609 systemd[1]: Started motdgen.path. Feb 9 11:43:42.110415 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 11:43:42.120468 systemd[1]: Started logrotate.timer. Feb 9 11:43:42.127531 systemd[1]: Started mdadm.timer. Feb 9 11:43:42.134401 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 11:43:42.142468 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 11:43:42.142490 systemd[1]: Reached target paths.target. Feb 9 11:43:42.149467 systemd[1]: Reached target timers.target. Feb 9 11:43:42.156595 systemd[1]: Listening on dbus.socket. Feb 9 11:43:42.164307 systemd[1]: Starting docker.socket... Feb 9 11:43:42.173973 systemd[1]: Listening on sshd.socket. Feb 9 11:43:42.192388 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 11:43:42.199585 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 11:43:42.199804 systemd[1]: Listening on docker.socket. Feb 9 11:43:42.206583 systemd[1]: Reached target sockets.target. Feb 9 11:43:42.215357 systemd[1]: Reached target basic.target. Feb 9 11:43:42.222516 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 11:43:42.222532 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 11:43:42.223059 systemd[1]: Starting containerd.service... Feb 9 11:43:42.231046 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 11:43:42.240136 systemd[1]: Starting coreos-metadata.service... Feb 9 11:43:42.247330 systemd[1]: Starting dbus.service... Feb 9 11:43:42.253450 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 11:43:42.261439 jq[1122]: false Feb 9 11:43:42.270343 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 11:43:42.276626 dbus-daemon[1121]: [system] SELinux support is enabled Feb 9 11:43:42.285440 systemd[1]: Starting extend-filesystems.service... Feb 9 11:43:42.296332 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 11:43:42.298812 extend-filesystems[1125]: Found sda Feb 9 11:43:42.383481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 11:43:42.383502 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 11:43:42.383515 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 11:43:42.383526 kernel: bond0: active interface up! Feb 9 11:43:42.383540 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 11:43:42.383563 coreos-metadata[1118]: Feb 09 11:43:42.315 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 11:43:42.383563 coreos-metadata[1118]: Feb 09 11:43:42.322 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb1 Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb2 Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb3 Feb 9 11:43:42.383688 extend-filesystems[1125]: Found usr Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb4 Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb6 Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb7 Feb 9 11:43:42.383688 extend-filesystems[1125]: Found sdb9 Feb 9 11:43:42.383688 extend-filesystems[1125]: Checking size of /dev/sdb9 Feb 9 11:43:42.383688 extend-filesystems[1125]: Resized partition /dev/sdb9 Feb 9 11:43:42.566405 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 11:43:42.566426 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 11:43:42.566455 coreos-metadata[1117]: Feb 09 11:43:42.315 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 11:43:42.566455 coreos-metadata[1117]: Feb 09 11:43:42.322 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 11:43:42.316194 systemd-networkd[1017]: bond0: Link UP Feb 9 11:43:42.566712 extend-filesystems[1132]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 11:43:42.316503 systemd-networkd[1017]: enp2s0f1np1: Link UP Feb 9 11:43:42.577666 dbus-daemon[1121]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 11:43:42.368829 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 11:43:42.369557 systemd[1]: Starting motdgen.service... Feb 9 11:43:42.391618 systemd-networkd[1017]: enp2s0f0np0: Link UP Feb 9 11:43:42.582984 update_engine[1153]: I0209 11:43:42.544467 1153 main.cc:92] Flatcar Update Engine starting Feb 9 11:43:42.582984 update_engine[1153]: I0209 11:43:42.547894 1153 update_check_scheduler.cc:74] Next update check in 6m12s Feb 9 11:43:42.391808 systemd-networkd[1017]: enp2s0f1np1: Gained carrier Feb 9 11:43:42.583245 jq[1154]: true Feb 9 11:43:42.392792 systemd-networkd[1017]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:7e:a1:e8.network. Feb 9 11:43:42.399039 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 11:43:42.583503 jq[1157]: false Feb 9 11:43:42.412996 systemd[1]: Starting sshd-keygen.service... Feb 9 11:43:42.432905 systemd[1]: Starting systemd-logind.service... Feb 9 11:43:42.449395 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 11:43:42.449987 systemd[1]: Starting tcsd.service... Feb 9 11:43:42.453962 systemd-logind[1151]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 11:43:42.453971 systemd-logind[1151]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 11:43:42.453981 systemd-logind[1151]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 11:43:42.454084 systemd-logind[1151]: New seat seat0. Feb 9 11:43:42.462649 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 11:43:42.463056 systemd[1]: Starting update-engine.service... Feb 9 11:43:42.478622 systemd-networkd[1017]: bond0: Gained carrier Feb 9 11:43:42.478772 systemd-networkd[1017]: enp2s0f0np0: Gained carrier Feb 9 11:43:42.478799 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.478954 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 11:43:42.488504 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.488550 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.488734 systemd-networkd[1017]: enp2s0f1np1: Link DOWN Feb 9 11:43:42.488737 systemd-networkd[1017]: enp2s0f1np1: Lost carrier Feb 9 11:43:42.519141 systemd[1]: Started dbus.service. Feb 9 11:43:42.534474 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.534520 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.534619 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.545342 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 11:43:42.545431 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 11:43:42.545573 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 11:43:42.545649 systemd[1]: Finished motdgen.service. Feb 9 11:43:42.558668 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 11:43:42.558739 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 11:43:42.578208 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 9 11:43:42.578299 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 9 11:43:42.583037 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 11:43:42.583119 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 11:43:42.584324 systemd[1]: Started update-engine.service. Feb 9 11:43:42.586961 env[1158]: time="2024-02-09T11:43:42.586934244Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 11:43:42.594376 systemd[1]: Started systemd-logind.service. Feb 9 11:43:42.595818 env[1158]: time="2024-02-09T11:43:42.595775699Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 11:43:42.595850 env[1158]: time="2024-02-09T11:43:42.595831876Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596465 env[1158]: time="2024-02-09T11:43:42.596422417Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596465 env[1158]: time="2024-02-09T11:43:42.596442652Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596594 env[1158]: time="2024-02-09T11:43:42.596554145Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596594 env[1158]: time="2024-02-09T11:43:42.596564956Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596594 env[1158]: time="2024-02-09T11:43:42.596571936Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 11:43:42.596594 env[1158]: time="2024-02-09T11:43:42.596577618Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596672 env[1158]: time="2024-02-09T11:43:42.596617042Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596769 env[1158]: time="2024-02-09T11:43:42.596732202Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596800 env[1158]: time="2024-02-09T11:43:42.596792550Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 11:43:42.596823 env[1158]: time="2024-02-09T11:43:42.596801742Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 11:43:42.596840 env[1158]: time="2024-02-09T11:43:42.596826474Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 11:43:42.596840 env[1158]: time="2024-02-09T11:43:42.596833977Z" level=info msg="metadata content store policy set" policy=shared Feb 9 11:43:42.603914 systemd[1]: Started locksmithd.service. Feb 9 11:43:42.609758 env[1158]: time="2024-02-09T11:43:42.609745440Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 11:43:42.609791 env[1158]: time="2024-02-09T11:43:42.609761225Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 11:43:42.609791 env[1158]: time="2024-02-09T11:43:42.609768791Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 11:43:42.609791 env[1158]: time="2024-02-09T11:43:42.609784665Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609792656Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609800754Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609808329Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609815549Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609822273Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609829163Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609835796Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.609846 env[1158]: time="2024-02-09T11:43:42.609843522Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 11:43:42.609960 env[1158]: time="2024-02-09T11:43:42.609892082Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 11:43:42.609960 env[1158]: time="2024-02-09T11:43:42.609935660Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 11:43:42.610102 env[1158]: time="2024-02-09T11:43:42.610064955Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 11:43:42.610102 env[1158]: time="2024-02-09T11:43:42.610086231Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610102 env[1158]: time="2024-02-09T11:43:42.610094594Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 11:43:42.610151 env[1158]: time="2024-02-09T11:43:42.610120695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610151 env[1158]: time="2024-02-09T11:43:42.610129256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610151 env[1158]: time="2024-02-09T11:43:42.610136207Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610151 env[1158]: time="2024-02-09T11:43:42.610142293Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610151 env[1158]: time="2024-02-09T11:43:42.610148857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610224 env[1158]: time="2024-02-09T11:43:42.610155681Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610224 env[1158]: time="2024-02-09T11:43:42.610161863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610224 env[1158]: time="2024-02-09T11:43:42.610167737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610224 env[1158]: time="2024-02-09T11:43:42.610175242Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 11:43:42.610285 env[1158]: time="2024-02-09T11:43:42.610243102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610285 env[1158]: time="2024-02-09T11:43:42.610252335Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610285 env[1158]: time="2024-02-09T11:43:42.610259235Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610285 env[1158]: time="2024-02-09T11:43:42.610267562Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 11:43:42.610285 env[1158]: time="2024-02-09T11:43:42.610275280Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 11:43:42.610285 env[1158]: time="2024-02-09T11:43:42.610281954Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 11:43:42.610377 env[1158]: time="2024-02-09T11:43:42.610293999Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 11:43:42.610377 env[1158]: time="2024-02-09T11:43:42.610313917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 11:43:42.610434 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 11:43:42.610513 env[1158]: time="2024-02-09T11:43:42.610458107Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 11:43:42.610513 env[1158]: time="2024-02-09T11:43:42.610507335Z" level=info msg="Connect containerd service" Feb 9 11:43:42.610511 systemd[1]: Reached target system-config.target. Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.610536557Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611067747Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611128805Z" level=info msg="Start subscribing containerd event" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611169596Z" level=info msg="Start recovering state" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611313695Z" level=info msg="Start event monitor" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611334154Z" level=info msg="Start snapshots syncer" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611341413Z" level=info msg="Start cni network conf syncer for default" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611345758Z" level=info msg="Start streaming server" Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611397220Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611424685Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 11:43:42.612625 env[1158]: time="2024-02-09T11:43:42.611450425Z" level=info msg="containerd successfully booted in 0.024845s" Feb 9 11:43:42.618408 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 11:43:42.618479 systemd[1]: Reached target user-config.target. Feb 9 11:43:42.627898 systemd[1]: Started containerd.service. Feb 9 11:43:42.665590 locksmithd[1176]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 11:43:42.669452 sshd_keygen[1150]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 11:43:42.680325 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 11:43:42.681030 systemd[1]: Finished sshd-keygen.service. Feb 9 11:43:42.695861 systemd[1]: Starting issuegen.service... Feb 9 11:43:42.702325 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 11:43:42.703259 systemd-networkd[1017]: enp2s0f1np1: Link UP Feb 9 11:43:42.703440 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.703461 systemd-networkd[1017]: enp2s0f1np1: Gained carrier Feb 9 11:43:42.703479 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.708578 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 11:43:42.708683 systemd[1]: Finished issuegen.service. Feb 9 11:43:42.717124 systemd[1]: Starting systemd-user-sessions.service... Feb 9 11:43:42.717503 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.717544 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.717605 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:42.725574 systemd[1]: Finished systemd-user-sessions.service. Feb 9 11:43:42.734102 systemd[1]: Started getty@tty1.service. Feb 9 11:43:42.758145 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 11:43:42.758324 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 11:43:42.775579 systemd[1]: Reached target getty.target. Feb 9 11:43:42.779350 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 11:43:42.875354 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 11:43:42.901269 extend-filesystems[1132]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 11:43:42.901269 extend-filesystems[1132]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 11:43:42.901269 extend-filesystems[1132]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 11:43:42.938410 extend-filesystems[1125]: Resized filesystem in /dev/sdb9 Feb 9 11:43:42.901663 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 11:43:42.901757 systemd[1]: Finished extend-filesystems.service. Feb 9 11:43:43.322900 coreos-metadata[1117]: Feb 09 11:43:43.322 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 11:43:43.322973 coreos-metadata[1118]: Feb 09 11:43:43.322 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 11:43:43.980546 systemd-networkd[1017]: bond0: Gained IPv6LL Feb 9 11:43:43.981316 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:44.108601 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:44.108685 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:44.109531 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 11:43:44.119619 systemd[1]: Reached target network-online.target. Feb 9 11:43:45.142385 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 11:43:47.760723 login[1203]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 11:43:47.768912 systemd-logind[1151]: New session 1 of user core. Feb 9 11:43:47.769468 systemd[1]: Created slice user-500.slice. Feb 9 11:43:47.769570 login[1202]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 11:43:47.770008 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 11:43:47.772218 systemd-logind[1151]: New session 2 of user core. Feb 9 11:43:47.775516 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 11:43:47.776214 systemd[1]: Starting user@500.service... Feb 9 11:43:47.778041 (systemd)[1208]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:43:47.843963 systemd[1208]: Queued start job for default target default.target. Feb 9 11:43:47.844193 systemd[1208]: Reached target paths.target. Feb 9 11:43:47.844205 systemd[1208]: Reached target sockets.target. Feb 9 11:43:47.844213 systemd[1208]: Reached target timers.target. Feb 9 11:43:47.844219 systemd[1208]: Reached target basic.target. Feb 9 11:43:47.844238 systemd[1208]: Reached target default.target. Feb 9 11:43:47.844251 systemd[1208]: Startup finished in 63ms. Feb 9 11:43:47.844298 systemd[1]: Started user@500.service. Feb 9 11:43:47.844845 systemd[1]: Started session-1.scope. Feb 9 11:43:47.845183 systemd[1]: Started session-2.scope. Feb 9 11:43:49.485465 coreos-metadata[1117]: Feb 09 11:43:49.485 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 11:43:49.486258 coreos-metadata[1118]: Feb 09 11:43:49.485 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 11:43:50.386475 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 11:43:50.386627 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 11:43:50.892688 systemd[1]: Created slice system-sshd.slice. Feb 9 11:43:50.893264 systemd[1]: Started sshd@0-86.109.11.101:22-147.75.109.163:60560.service. Feb 9 11:43:50.958765 sshd[1229]: Connection closed by authenticating user core 147.75.109.163 port 60560 [preauth] Feb 9 11:43:50.959287 systemd[1]: sshd@0-86.109.11.101:22-147.75.109.163:60560.service: Deactivated successfully. Feb 9 11:43:51.485787 coreos-metadata[1118]: Feb 09 11:43:51.485 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 11:43:51.486569 coreos-metadata[1117]: Feb 09 11:43:51.485 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 11:43:51.514619 coreos-metadata[1118]: Feb 09 11:43:51.514 INFO Fetch successful Feb 9 11:43:51.514930 coreos-metadata[1117]: Feb 09 11:43:51.514 INFO Fetch successful Feb 9 11:43:51.540019 systemd[1]: Finished coreos-metadata.service. Feb 9 11:43:51.540519 unknown[1117]: wrote ssh authorized keys file for user: core Feb 9 11:43:51.540945 systemd[1]: Starting etcd-member.service... Feb 9 11:43:51.541735 systemd[1]: Started packet-phone-home.service. Feb 9 11:43:51.547935 curl[1235]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 11:43:51.548073 curl[1235]: Dload Upload Total Spent Left Speed Feb 9 11:43:51.557159 update-ssh-keys[1236]: Updated "/home/core/.ssh/authorized_keys" Feb 9 11:43:51.557510 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 11:43:51.558732 systemd[1]: Starting docker.service... Feb 9 11:43:51.575796 env[1251]: time="2024-02-09T11:43:51.575741177Z" level=info msg="Starting up" Feb 9 11:43:51.576364 env[1251]: time="2024-02-09T11:43:51.576330041Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 11:43:51.576364 env[1251]: time="2024-02-09T11:43:51.576341050Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 11:43:51.576364 env[1251]: time="2024-02-09T11:43:51.576355240Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 11:43:51.576364 env[1251]: time="2024-02-09T11:43:51.576364544Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 11:43:51.577145 env[1251]: time="2024-02-09T11:43:51.577135396Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 11:43:51.577145 env[1251]: time="2024-02-09T11:43:51.577144056Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 11:43:51.577192 env[1251]: time="2024-02-09T11:43:51.577151900Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 11:43:51.577192 env[1251]: time="2024-02-09T11:43:51.577156741Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 11:43:51.594868 env[1251]: time="2024-02-09T11:43:51.594857928Z" level=info msg="Loading containers: start." Feb 9 11:43:51.698393 kernel: Initializing XFRM netlink socket Feb 9 11:43:51.766705 curl[1235]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 11:43:51.767394 env[1251]: time="2024-02-09T11:43:51.767377742Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 11:43:51.767438 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 11:43:51.768063 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:51.768131 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:51.772048 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:51.772150 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:51.824229 systemd-networkd[1017]: docker0: Link UP Feb 9 11:43:51.824535 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 9 11:43:51.832679 env[1251]: time="2024-02-09T11:43:51.832623945Z" level=info msg="Loading containers: done." Feb 9 11:43:51.842743 env[1251]: time="2024-02-09T11:43:51.842681346Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 11:43:51.842902 env[1251]: time="2024-02-09T11:43:51.842860645Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 11:43:51.842990 env[1251]: time="2024-02-09T11:43:51.842962749Z" level=info msg="Daemon has completed initialization" Feb 9 11:43:51.843416 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck613955477-merged.mount: Deactivated successfully. Feb 9 11:43:51.857828 systemd[1]: Started docker.service. Feb 9 11:43:51.865152 env[1251]: time="2024-02-09T11:43:51.865099936Z" level=info msg="API listen on /run/docker.sock" Feb 9 11:43:51.865733 etcd-wrapper[1240]: Error response from daemon: No such container: etcd-member Feb 9 11:43:51.877153 etcd-wrapper[1374]: Error: No such container: etcd-member Feb 9 11:43:51.944574 etcd-wrapper[1396]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 11:43:53.213936 etcd-wrapper[1396]: v3.5.0: Pulling from coreos/etcd Feb 9 11:43:53.535981 etcd-wrapper[1396]: 1813d21adc01: Pulling fs layer Feb 9 11:43:53.535981 etcd-wrapper[1396]: 6e96907ab677: Pulling fs layer Feb 9 11:43:53.535981 etcd-wrapper[1396]: 444ed0ea8673: Pulling fs layer Feb 9 11:43:53.535981 etcd-wrapper[1396]: 0fd2df5633f0: Pulling fs layer Feb 9 11:43:53.535981 etcd-wrapper[1396]: 8cc22b9456bb: Pulling fs layer Feb 9 11:43:53.536605 etcd-wrapper[1396]: 7ac70aecd290: Pulling fs layer Feb 9 11:43:53.536605 etcd-wrapper[1396]: 4b376c64dfe4: Pulling fs layer Feb 9 11:43:53.536605 etcd-wrapper[1396]: 0fd2df5633f0: Waiting Feb 9 11:43:53.536605 etcd-wrapper[1396]: 8cc22b9456bb: Waiting Feb 9 11:43:53.536605 etcd-wrapper[1396]: 4b376c64dfe4: Waiting Feb 9 11:43:53.899704 etcd-wrapper[1396]: 444ed0ea8673: Verifying Checksum Feb 9 11:43:53.899704 etcd-wrapper[1396]: 444ed0ea8673: Download complete Feb 9 11:43:54.110896 etcd-wrapper[1396]: 6e96907ab677: Verifying Checksum Feb 9 11:43:54.110896 etcd-wrapper[1396]: 6e96907ab677: Download complete Feb 9 11:43:54.153563 etcd-wrapper[1396]: 1813d21adc01: Verifying Checksum Feb 9 11:43:54.153563 etcd-wrapper[1396]: 1813d21adc01: Download complete Feb 9 11:43:54.274111 etcd-wrapper[1396]: 0fd2df5633f0: Verifying Checksum Feb 9 11:43:54.274111 etcd-wrapper[1396]: 0fd2df5633f0: Download complete Feb 9 11:43:54.443372 etcd-wrapper[1396]: 8cc22b9456bb: Verifying Checksum Feb 9 11:43:54.443372 etcd-wrapper[1396]: 8cc22b9456bb: Download complete Feb 9 11:43:54.611534 etcd-wrapper[1396]: 4b376c64dfe4: Verifying Checksum Feb 9 11:43:54.611534 etcd-wrapper[1396]: 4b376c64dfe4: Download complete Feb 9 11:43:54.633894 etcd-wrapper[1396]: 1813d21adc01: Pull complete Feb 9 11:43:54.634913 etcd-wrapper[1396]: 7ac70aecd290: Download complete Feb 9 11:43:54.820032 systemd[1]: var-lib-docker-overlay2-3e46b87281fe0645a61551663288d32132e673b4c9fa0c0ac1e8dc39795f1015-merged.mount: Deactivated successfully. Feb 9 11:43:55.040669 etcd-wrapper[1396]: 6e96907ab677: Pull complete Feb 9 11:43:55.194313 systemd[1]: var-lib-docker-overlay2-be2422c3d15213d3587e7db570acc0368cb0ba90f7c6a7c21bde89e6363892f4-merged.mount: Deactivated successfully. Feb 9 11:43:55.237461 etcd-wrapper[1396]: 444ed0ea8673: Pull complete Feb 9 11:43:55.431701 etcd-wrapper[1396]: 0fd2df5633f0: Pull complete Feb 9 11:43:55.472393 etcd-wrapper[1396]: 8cc22b9456bb: Pull complete Feb 9 11:43:55.507444 etcd-wrapper[1396]: 7ac70aecd290: Pull complete Feb 9 11:43:55.531071 etcd-wrapper[1396]: 4b376c64dfe4: Pull complete Feb 9 11:43:55.533801 etcd-wrapper[1396]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 11:43:55.534608 etcd-wrapper[1396]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 11:43:55.575991 env[1158]: time="2024-02-09T11:43:55.575926550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 11:43:55.575991 env[1158]: time="2024-02-09T11:43:55.575949139Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 11:43:55.575991 env[1158]: time="2024-02-09T11:43:55.575959856Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 11:43:55.576255 env[1158]: time="2024-02-09T11:43:55.576032793Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/9083be0d0b3a7d5d55d38108e281c649949a212e2230dd5a01589d623de3b43b pid=1574 runtime=io.containerd.runc.v2 Feb 9 11:43:55.593899 systemd[1]: Started docker-9083be0d0b3a7d5d55d38108e281c649949a212e2230dd5a01589d623de3b43b.scope. Feb 9 11:43:55.645501 systemd[1]: var-lib-docker-overlay2-f1b73ba02d8ef6721f126ec03302891202de7b72092e0ea21ae1745f713bb62a-merged.mount: Deactivated successfully. Feb 9 11:43:55.676647 etcd-wrapper[1396]: {"level":"info","ts":1707479035.6761034,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 11:43:55.676647 etcd-wrapper[1396]: {"level":"info","ts":1707479035.6762905,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"3e50a26d864f4f59b80771f3c06d7cca"} Feb 9 11:43:55.676647 etcd-wrapper[1396]: {"level":"warn","ts":1707479035.6763968,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 11:43:55.676647 etcd-wrapper[1396]: {"level":"warn","ts":1707479035.6764183,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 11:43:55.676647 etcd-wrapper[1396]: {"level":"warn","ts":1707479035.6764364,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 11:43:55.676647 etcd-wrapper[1396]: {"level":"warn","ts":1707479035.6764498,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 11:43:55.677458 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.676Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.7:2379"]} Feb 9 11:43:55.677458 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.676Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 9 11:43:55.678094 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.677Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 11:43:55.678413 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.677Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"3e50a26d864f4f59b80771f3c06d7cca","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.7:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"3e50a26d864f4f59b80771f3c06d7cca=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 11:43:55.680434 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.680Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"1.462949ms"} Feb 9 11:43:55.684339 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.683Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 9 11:43:55.684339 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.684Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 9 11:43:55.684339 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.684Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 9 11:43:55.684339 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.684Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 11:43:55.684339 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.684Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 9 11:43:55.684891 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.684Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 11:43:55.685924 etcd-wrapper[1396]: {"level":"warn","ts":"2024-02-09T11:43:55.685Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 11:43:55.687159 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.686Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 11:43:55.687742 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.687Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 11:43:55.688404 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.687Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 11:43:55.688606 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.688Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 9 11:43:55.690708 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.689Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 11:43:55.690916 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.690Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 9 11:43:55.694676 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.694Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 9 11:43:55.694676 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.694Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.7:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 11:43:55.694676 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.694Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 9 11:43:55.885768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 9 11:43:55.886626 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.885Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 9 11:43:55.886768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.886Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 9 11:43:55.886768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.886Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 11:43:55.886768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.886Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 9 11:43:55.886768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.886Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 9 11:43:55.886768 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.886Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:3e50a26d864f4f59b80771f3c06d7cca ClientURLs:[http://10.67.80.7:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 9 11:43:55.887306 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.886Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 11:43:55.887306 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.887Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 11:43:55.887368 systemd[1]: Started etcd-member.service. Feb 9 11:43:55.888083 systemd[1]: Reached target multi-user.target. Feb 9 11:43:55.888421 etcd-wrapper[1396]: {"level":"info","ts":"2024-02-09T11:43:55.888Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 11:43:55.891107 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 11:43:55.899873 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 11:43:55.899955 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 11:43:55.900071 systemd[1]: Startup finished in 2.003s (kernel) + 6.523s (initrd) + 19.548s (userspace) = 28.075s. Feb 9 11:44:00.967785 systemd[1]: Started sshd@1-86.109.11.101:22-147.75.109.163:56148.service. Feb 9 11:44:01.001104 sshd[1624]: Accepted publickey for core from 147.75.109.163 port 56148 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.002076 sshd[1624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.005184 systemd-logind[1151]: New session 3 of user core. Feb 9 11:44:01.005928 systemd[1]: Started session-3.scope. Feb 9 11:44:01.059250 systemd[1]: Started sshd@2-86.109.11.101:22-147.75.109.163:56160.service. Feb 9 11:44:01.092392 sshd[1629]: Accepted publickey for core from 147.75.109.163 port 56160 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.093042 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.095215 systemd-logind[1151]: New session 4 of user core. Feb 9 11:44:01.095745 systemd[1]: Started session-4.scope. Feb 9 11:44:01.145493 sshd[1629]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:01.147051 systemd[1]: sshd@2-86.109.11.101:22-147.75.109.163:56160.service: Deactivated successfully. Feb 9 11:44:01.147362 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 11:44:01.147723 systemd-logind[1151]: Session 4 logged out. Waiting for processes to exit. Feb 9 11:44:01.148219 systemd[1]: Started sshd@3-86.109.11.101:22-147.75.109.163:56176.service. Feb 9 11:44:01.148727 systemd-logind[1151]: Removed session 4. Feb 9 11:44:01.181459 sshd[1635]: Accepted publickey for core from 147.75.109.163 port 56176 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.182394 sshd[1635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.185540 systemd-logind[1151]: New session 5 of user core. Feb 9 11:44:01.186249 systemd[1]: Started session-5.scope. Feb 9 11:44:01.240702 sshd[1635]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:01.247286 systemd[1]: sshd@3-86.109.11.101:22-147.75.109.163:56176.service: Deactivated successfully. Feb 9 11:44:01.248875 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 11:44:01.250461 systemd-logind[1151]: Session 5 logged out. Waiting for processes to exit. Feb 9 11:44:01.253018 systemd[1]: Started sshd@4-86.109.11.101:22-147.75.109.163:56188.service. Feb 9 11:44:01.255393 systemd-logind[1151]: Removed session 5. Feb 9 11:44:01.321673 sshd[1641]: Accepted publickey for core from 147.75.109.163 port 56188 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.324490 sshd[1641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.334002 systemd-logind[1151]: New session 6 of user core. Feb 9 11:44:01.336152 systemd[1]: Started session-6.scope. Feb 9 11:44:01.404479 sshd[1641]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:01.405851 systemd[1]: sshd@4-86.109.11.101:22-147.75.109.163:56188.service: Deactivated successfully. Feb 9 11:44:01.406151 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 11:44:01.406560 systemd-logind[1151]: Session 6 logged out. Waiting for processes to exit. Feb 9 11:44:01.407037 systemd[1]: Started sshd@5-86.109.11.101:22-147.75.109.163:56196.service. Feb 9 11:44:01.407446 systemd-logind[1151]: Removed session 6. Feb 9 11:44:01.440410 sshd[1647]: Accepted publickey for core from 147.75.109.163 port 56196 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.441536 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.445362 systemd-logind[1151]: New session 7 of user core. Feb 9 11:44:01.446328 systemd[1]: Started session-7.scope. Feb 9 11:44:01.545692 sudo[1650]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 11:44:01.546301 sudo[1650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 11:44:01.569728 dbus-daemon[1121]: Э\xd1o\xb8U: received setenforce notice (enforcing=135453680) Feb 9 11:44:01.574141 sudo[1650]: pam_unix(sudo:session): session closed for user root Feb 9 11:44:01.578682 sshd[1647]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:01.585387 systemd[1]: sshd@5-86.109.11.101:22-147.75.109.163:56196.service: Deactivated successfully. Feb 9 11:44:01.586885 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 11:44:01.588421 systemd-logind[1151]: Session 7 logged out. Waiting for processes to exit. Feb 9 11:44:01.590862 systemd[1]: Started sshd@6-86.109.11.101:22-147.75.109.163:56204.service. Feb 9 11:44:01.593094 systemd-logind[1151]: Removed session 7. Feb 9 11:44:01.658187 sshd[1654]: Accepted publickey for core from 147.75.109.163 port 56204 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.661164 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.670663 systemd-logind[1151]: New session 8 of user core. Feb 9 11:44:01.672860 systemd[1]: Started session-8.scope. Feb 9 11:44:01.749214 sudo[1658]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 11:44:01.749827 sudo[1658]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 11:44:01.757248 sudo[1658]: pam_unix(sudo:session): session closed for user root Feb 9 11:44:01.769595 sudo[1657]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 11:44:01.770164 sudo[1657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 11:44:01.794271 systemd[1]: Stopping audit-rules.service... Feb 9 11:44:01.795000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 11:44:01.797560 auditctl[1661]: No rules Feb 9 11:44:01.798296 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 11:44:01.798767 systemd[1]: Stopped audit-rules.service. Feb 9 11:44:01.802526 systemd[1]: Starting audit-rules.service... Feb 9 11:44:01.802979 kernel: kauditd_printk_skb: 106 callbacks suppressed Feb 9 11:44:01.803137 kernel: audit: type=1305 audit(1707479041.795:127): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 11:44:01.795000 audit[1661]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc189a63b0 a2=420 a3=0 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:44:01.834087 augenrules[1678]: No rules Feb 9 11:44:01.834668 systemd[1]: Finished audit-rules.service. Feb 9 11:44:01.835615 sudo[1657]: pam_unix(sudo:session): session closed for user root Feb 9 11:44:01.836854 sshd[1654]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:01.839060 systemd[1]: sshd@6-86.109.11.101:22-147.75.109.163:56204.service: Deactivated successfully. Feb 9 11:44:01.839603 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 11:44:01.840161 systemd-logind[1151]: Session 8 logged out. Waiting for processes to exit. Feb 9 11:44:01.841006 systemd[1]: Started sshd@7-86.109.11.101:22-147.75.109.163:56206.service. Feb 9 11:44:01.841813 systemd-logind[1151]: Removed session 8. Feb 9 11:44:01.850109 kernel: audit: type=1300 audit(1707479041.795:127): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc189a63b0 a2=420 a3=0 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:44:01.850148 kernel: audit: type=1327 audit(1707479041.795:127): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 11:44:01.795000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 11:44:01.859637 kernel: audit: type=1131 audit(1707479041.797:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.882107 kernel: audit: type=1130 audit(1707479041.833:129): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.886960 sshd[1684]: Accepted publickey for core from 147.75.109.163 port 56206 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:01.888951 sshd[1684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:01.891241 systemd-logind[1151]: New session 9 of user core. Feb 9 11:44:01.891652 systemd[1]: Started session-9.scope. Feb 9 11:44:01.904581 kernel: audit: type=1106 audit(1707479041.834:130): pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.834000 audit[1657]: USER_END pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.930557 kernel: audit: type=1104 audit(1707479041.834:131): pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.834000 audit[1657]: CRED_DISP pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.936606 sshd[1684]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:01.938037 systemd[1]: sshd@7-86.109.11.101:22-147.75.109.163:56206.service: Deactivated successfully. Feb 9 11:44:01.938334 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 11:44:01.938712 systemd-logind[1151]: Session 9 logged out. Waiting for processes to exit. Feb 9 11:44:01.939168 systemd[1]: Started sshd@8-86.109.11.101:22-147.75.109.163:56220.service. Feb 9 11:44:01.939695 systemd-logind[1151]: Removed session 9. Feb 9 11:44:01.954084 kernel: audit: type=1106 audit(1707479041.836:132): pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.836000 audit[1654]: USER_END pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.986362 kernel: audit: type=1104 audit(1707479041.836:133): pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.836000 audit[1654]: CRED_DISP pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.012294 kernel: audit: type=1131 audit(1707479041.837:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-86.109.11.101:22-147.75.109.163:56204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-86.109.11.101:22-147.75.109.163:56204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:02.013636 sshd[1692]: Accepted publickey for core from 147.75.109.163 port 56220 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 11:44:02.014765 sshd[1692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 11:44:02.016891 systemd-logind[1151]: New session 10 of user core. Feb 9 11:44:02.017262 systemd[1]: Started session-10.scope. Feb 9 11:44:01.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-86.109.11.101:22-147.75.109.163:56206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.885000 audit[1684]: USER_ACCT pid=1684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.887000 audit[1684]: CRED_ACQ pid=1684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.887000 audit[1684]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bf2bc10 a2=3 a3=0 items=0 ppid=1 pid=1684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:44:01.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 11:44:01.892000 audit[1684]: USER_START pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.893000 audit[1686]: CRED_ACQ pid=1686 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.935000 audit[1684]: USER_END pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.936000 audit[1684]: CRED_DISP pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:01.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-86.109.11.101:22-147.75.109.163:56206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:01.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-86.109.11.101:22-147.75.109.163:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:02.012000 audit[1692]: USER_ACCT pid=1692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.013000 audit[1692]: CRED_ACQ pid=1692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.013000 audit[1692]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3aaba440 a2=3 a3=0 items=0 ppid=1 pid=1692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 11:44:02.013000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 11:44:02.018000 audit[1692]: USER_START pid=1692 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.018000 audit[1694]: CRED_ACQ pid=1694 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.390636 sshd[1692]: pam_unix(sshd:session): session closed for user core Feb 9 11:44:02.391000 audit[1692]: USER_END pid=1692 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.391000 audit[1692]: CRED_DISP pid=1692 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 11:44:02.395982 systemd[1]: sshd@8-86.109.11.101:22-147.75.109.163:56220.service: Deactivated successfully. Feb 9 11:44:02.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-86.109.11.101:22-147.75.109.163:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:02.397577 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 11:44:02.399169 systemd-logind[1151]: Session 10 logged out. Waiting for processes to exit. Feb 9 11:44:02.401303 systemd-logind[1151]: Removed session 10. Feb 9 11:44:04.730653 systemd[1]: Started sshd@9-86.109.11.101:22-158.140.133.54:24421.service. Feb 9 11:44:04.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-86.109.11.101:22-158.140.133.54:24421 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:04.735422 sshd[1716]: kex_exchange_identification: Connection closed by remote host Feb 9 11:44:04.735422 sshd[1716]: Connection closed by 158.140.133.54 port 24421 Feb 9 11:44:04.735602 systemd[1]: sshd@9-86.109.11.101:22-158.140.133.54:24421.service: Deactivated successfully. Feb 9 11:44:04.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-86.109.11.101:22-158.140.133.54:24421 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:04.919056 systemd[1]: Started sshd@10-86.109.11.101:22-158.140.133.54:59173.service. Feb 9 11:44:04.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-158.140.133.54:59173 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:04.922241 systemd[1]: Started sshd@11-86.109.11.101:22-61.177.172.140:47991.service. Feb 9 11:44:04.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-86.109.11.101:22-61.177.172.140:47991 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:05.677057 sshd[1720]: Invalid user admin from 158.140.133.54 port 59173 Feb 9 11:44:05.866677 sshd[1720]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:05.867651 sshd[1720]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:05.867740 sshd[1720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:05.868632 sshd[1720]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:05.867000 audit[1720]: USER_AUTH pid=1720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:05.869959 sshd[1721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 9 11:44:05.868000 audit[1721]: USER_AUTH pid=1721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:07.811067 sshd[1720]: Failed password for invalid user admin from 158.140.133.54 port 59173 ssh2 Feb 9 11:44:07.812297 sshd[1721]: Failed password for root from 61.177.172.140 port 47991 ssh2 Feb 9 11:44:08.057822 sshd[1720]: Connection closed by invalid user admin 158.140.133.54 port 59173 [preauth] Feb 9 11:44:08.060198 systemd[1]: sshd@10-86.109.11.101:22-158.140.133.54:59173.service: Deactivated successfully. Feb 9 11:44:08.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-158.140.133.54:59173 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:08.066373 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 9 11:44:08.066456 kernel: audit: type=1131 audit(1707479048.059:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-158.140.133.54:59173 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:08.249662 systemd[1]: Started sshd@12-86.109.11.101:22-158.140.133.54:10465.service. Feb 9 11:44:08.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-86.109.11.101:22-158.140.133.54:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:08.327487 kernel: audit: type=1130 audit(1707479048.248:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-86.109.11.101:22-158.140.133.54:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:08.667000 audit[1721]: USER_AUTH pid=1721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:08.747371 kernel: audit: type=1100 audit(1707479048.667:161): pid=1721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:09.327204 sshd[1726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:44:09.326000 audit[1726]: USER_AUTH pid=1726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:09.410496 kernel: audit: type=1100 audit(1707479049.326:162): pid=1726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:10.355000 sshd[1721]: Failed password for root from 61.177.172.140 port 47991 ssh2 Feb 9 11:44:11.466000 audit[1721]: USER_AUTH pid=1721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:11.484478 sshd[1726]: Failed password for root from 158.140.133.54 port 10465 ssh2 Feb 9 11:44:11.553494 kernel: audit: type=1100 audit(1707479051.466:163): pid=1721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:12.167043 sshd[1726]: Connection closed by authenticating user root 158.140.133.54 port 10465 [preauth] Feb 9 11:44:12.169569 systemd[1]: sshd@12-86.109.11.101:22-158.140.133.54:10465.service: Deactivated successfully. Feb 9 11:44:12.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-86.109.11.101:22-158.140.133.54:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:12.259512 kernel: audit: type=1131 audit(1707479052.168:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-86.109.11.101:22-158.140.133.54:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:12.385368 systemd[1]: Started sshd@13-86.109.11.101:22-158.140.133.54:50160.service. Feb 9 11:44:12.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-158.140.133.54:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:12.477511 kernel: audit: type=1130 audit(1707479052.384:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-158.140.133.54:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:13.212048 sshd[1730]: Invalid user ubnt from 158.140.133.54 port 50160 Feb 9 11:44:13.413195 sshd[1730]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:13.414193 sshd[1730]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:13.414283 sshd[1730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:13.415247 sshd[1730]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:13.414000 audit[1730]: USER_AUTH pid=1730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubnt" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:13.508514 kernel: audit: type=1100 audit(1707479053.414:166): pid=1730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubnt" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:13.901221 sshd[1721]: Failed password for root from 61.177.172.140 port 47991 ssh2 Feb 9 11:44:14.267051 sshd[1721]: Received disconnect from 61.177.172.140 port 47991:11: [preauth] Feb 9 11:44:14.267051 sshd[1721]: Disconnected from authenticating user root 61.177.172.140 port 47991 [preauth] Feb 9 11:44:14.267478 sshd[1721]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 9 11:44:14.269535 systemd[1]: sshd@11-86.109.11.101:22-61.177.172.140:47991.service: Deactivated successfully. Feb 9 11:44:14.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-86.109.11.101:22-61.177.172.140:47991 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:14.362515 kernel: audit: type=1131 audit(1707479054.268:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-86.109.11.101:22-61.177.172.140:47991 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:14.417065 systemd[1]: Started sshd@14-86.109.11.101:22-61.177.172.140:57140.service. Feb 9 11:44:14.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-61.177.172.140:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:14.508521 kernel: audit: type=1130 audit(1707479054.415:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-61.177.172.140:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:15.457803 sshd[1730]: Failed password for invalid user ubnt from 158.140.133.54 port 50160 ssh2 Feb 9 11:44:15.808901 sshd[1735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 9 11:44:15.807000 audit[1735]: ANOM_LOGIN_FAILURES pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:15.809152 sshd[1735]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 11:44:15.807000 audit[1735]: USER_AUTH pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:15.964656 kernel: audit: type=2100 audit(1707479055.807:169): pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:15.964688 kernel: audit: type=1100 audit(1707479055.807:170): pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:17.031837 sshd[1730]: Connection closed by invalid user ubnt 158.140.133.54 port 50160 [preauth] Feb 9 11:44:17.034220 systemd[1]: sshd@13-86.109.11.101:22-158.140.133.54:50160.service: Deactivated successfully. Feb 9 11:44:17.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-158.140.133.54:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:17.128508 kernel: audit: type=1131 audit(1707479057.033:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-158.140.133.54:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:17.191361 systemd[1]: Started sshd@15-86.109.11.101:22-158.140.133.54:41385.service. Feb 9 11:44:17.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-158.140.133.54:41385 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:17.284509 kernel: audit: type=1130 audit(1707479057.190:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-158.140.133.54:41385 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:17.791632 sshd[1735]: Failed password for root from 61.177.172.140 port 57140 ssh2 Feb 9 11:44:18.088075 sshd[1739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:44:18.087000 audit[1739]: USER_AUTH pid=1739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:18.180497 kernel: audit: type=1100 audit(1707479058.087:173): pid=1739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:18.610000 audit[1735]: USER_AUTH pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:18.704494 kernel: audit: type=1100 audit(1707479058.610:174): pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:20.482100 sshd[1739]: Failed password for root from 158.140.133.54 port 41385 ssh2 Feb 9 11:44:20.911109 sshd[1739]: Connection closed by authenticating user root 158.140.133.54 port 41385 [preauth] Feb 9 11:44:20.913518 systemd[1]: sshd@15-86.109.11.101:22-158.140.133.54:41385.service: Deactivated successfully. Feb 9 11:44:20.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-158.140.133.54:41385 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:21.004489 sshd[1735]: Failed password for root from 61.177.172.140 port 57140 ssh2 Feb 9 11:44:21.007517 kernel: audit: type=1131 audit(1707479060.912:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-158.140.133.54:41385 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:21.133408 systemd[1]: Started sshd@16-86.109.11.101:22-158.140.133.54:23263.service. Feb 9 11:44:21.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-158.140.133.54:23263 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:21.227517 kernel: audit: type=1130 audit(1707479061.132:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-158.140.133.54:23263 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:21.791000 audit[1735]: USER_AUTH pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:21.886496 kernel: audit: type=1100 audit(1707479061.791:177): pid=1735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:21.958532 sshd[1743]: Invalid user admin from 158.140.133.54 port 23263 Feb 9 11:44:22.043001 systemd-timesyncd[1110]: Contacted time server [2607:fcd0:107:6af::1]:123 (2.flatcar.pool.ntp.org). Feb 9 11:44:22.043134 systemd-timesyncd[1110]: Initial clock synchronization to Fri 2024-02-09 11:44:22.039365 UTC. Feb 9 11:44:22.165151 sshd[1743]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:22.166232 sshd[1743]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:22.166340 sshd[1743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:22.167363 sshd[1743]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:22.166000 audit[1743]: USER_AUTH pid=1743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:22.268504 kernel: audit: type=1100 audit(1707479062.166:178): pid=1743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:24.266951 sshd[1735]: Failed password for root from 61.177.172.140 port 57140 ssh2 Feb 9 11:44:24.445720 sshd[1743]: Failed password for invalid user admin from 158.140.133.54 port 23263 ssh2 Feb 9 11:44:24.595280 sshd[1735]: Received disconnect from 61.177.172.140 port 57140:11: [preauth] Feb 9 11:44:24.595280 sshd[1735]: Disconnected from authenticating user root 61.177.172.140 port 57140 [preauth] Feb 9 11:44:24.595805 sshd[1735]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 9 11:44:24.597794 systemd[1]: sshd@14-86.109.11.101:22-61.177.172.140:57140.service: Deactivated successfully. Feb 9 11:44:24.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-61.177.172.140:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:24.692510 kernel: audit: type=1131 audit(1707479064.597:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-61.177.172.140:57140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:24.723393 systemd[1]: Started sshd@17-86.109.11.101:22-61.177.172.140:11084.service. Feb 9 11:44:24.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-61.177.172.140:11084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:24.817525 kernel: audit: type=1130 audit(1707479064.723:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-61.177.172.140:11084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:25.629799 sshd[1748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 9 11:44:25.628000 audit[1748]: USER_AUTH pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:25.723408 kernel: audit: type=1100 audit(1707479065.628:181): pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:26.179486 sshd[1743]: Connection closed by invalid user admin 158.140.133.54 port 23263 [preauth] Feb 9 11:44:26.181882 systemd[1]: sshd@16-86.109.11.101:22-158.140.133.54:23263.service: Deactivated successfully. Feb 9 11:44:26.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-158.140.133.54:23263 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:26.276516 kernel: audit: type=1131 audit(1707479066.181:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-158.140.133.54:23263 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:26.296285 systemd[1]: Started sshd@18-86.109.11.101:22-158.140.133.54:48771.service. Feb 9 11:44:26.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-158.140.133.54:48771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:26.390509 kernel: audit: type=1130 audit(1707479066.295:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-158.140.133.54:48771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:27.066547 sshd[1753]: Invalid user ansible from 158.140.133.54 port 48771 Feb 9 11:44:27.267416 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:27.268624 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:27.268713 sshd[1753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:27.269751 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:27.268000 audit[1753]: USER_AUTH pid=1753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ansible" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:27.364524 kernel: audit: type=1100 audit(1707479067.268:184): pid=1753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ansible" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:27.652367 sshd[1748]: Failed password for root from 61.177.172.140 port 11084 ssh2 Feb 9 11:44:27.850759 update_engine[1153]: I0209 11:44:27.850637 1153 update_attempter.cc:509] Updating boot flags... Feb 9 11:44:28.419000 audit[1748]: USER_AUTH pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:28.513374 kernel: audit: type=1100 audit(1707479068.419:185): pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:29.231583 sshd[1753]: Failed password for invalid user ansible from 158.140.133.54 port 48771 ssh2 Feb 9 11:44:30.854905 sshd[1748]: Failed password for root from 61.177.172.140 port 11084 ssh2 Feb 9 11:44:31.095389 sshd[1753]: Connection closed by invalid user ansible 158.140.133.54 port 48771 [preauth] Feb 9 11:44:31.097813 systemd[1]: sshd@18-86.109.11.101:22-158.140.133.54:48771.service: Deactivated successfully. Feb 9 11:44:31.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-158.140.133.54:48771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:31.192513 kernel: audit: type=1131 audit(1707479071.097:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-158.140.133.54:48771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:31.209000 audit[1748]: USER_AUTH pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:31.266916 systemd[1]: Started sshd@19-86.109.11.101:22-158.140.133.54:38588.service. Feb 9 11:44:31.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-158.140.133.54:38588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:31.394804 kernel: audit: type=1100 audit(1707479071.209:187): pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 9 11:44:31.394831 kernel: audit: type=1130 audit(1707479071.266:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-158.140.133.54:38588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:32.166848 sshd[1775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:44:32.165000 audit[1775]: USER_AUTH pid=1775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:32.260484 kernel: audit: type=1100 audit(1707479072.165:189): pid=1775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:32.720563 sshd[1748]: Failed password for root from 61.177.172.140 port 11084 ssh2 Feb 9 11:44:33.999303 sshd[1748]: Received disconnect from 61.177.172.140 port 11084:11: [preauth] Feb 9 11:44:33.999303 sshd[1748]: Disconnected from authenticating user root 61.177.172.140 port 11084 [preauth] Feb 9 11:44:33.999833 sshd[1748]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 9 11:44:34.001836 systemd[1]: sshd@17-86.109.11.101:22-61.177.172.140:11084.service: Deactivated successfully. Feb 9 11:44:34.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-61.177.172.140:11084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:34.096398 kernel: audit: type=1131 audit(1707479074.000:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-61.177.172.140:11084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:34.485075 sshd[1775]: Failed password for root from 158.140.133.54 port 38588 ssh2 Feb 9 11:44:34.990625 sshd[1775]: Connection closed by authenticating user root 158.140.133.54 port 38588 [preauth] Feb 9 11:44:34.993143 systemd[1]: sshd@19-86.109.11.101:22-158.140.133.54:38588.service: Deactivated successfully. Feb 9 11:44:34.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-158.140.133.54:38588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:35.087515 kernel: audit: type=1131 audit(1707479074.992:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-158.140.133.54:38588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:35.180292 systemd[1]: Started sshd@20-86.109.11.101:22-158.140.133.54:57967.service. Feb 9 11:44:35.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-158.140.133.54:57967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:35.274511 kernel: audit: type=1130 audit(1707479075.179:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-158.140.133.54:57967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:35.954923 sshd[1780]: Invalid user user from 158.140.133.54 port 57967 Feb 9 11:44:36.147828 sshd[1780]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:36.148811 sshd[1780]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:36.148899 sshd[1780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:36.149790 sshd[1780]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:36.148000 audit[1780]: USER_AUTH pid=1780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:36.243366 kernel: audit: type=1100 audit(1707479076.148:193): pid=1780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:38.683939 sshd[1780]: Failed password for invalid user user from 158.140.133.54 port 57967 ssh2 Feb 9 11:44:39.200209 sshd[1780]: Connection closed by invalid user user 158.140.133.54 port 57967 [preauth] Feb 9 11:44:39.202697 systemd[1]: sshd@20-86.109.11.101:22-158.140.133.54:57967.service: Deactivated successfully. Feb 9 11:44:39.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-158.140.133.54:57967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:39.297505 kernel: audit: type=1131 audit(1707479079.202:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-158.140.133.54:57967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:39.498889 systemd[1]: Started sshd@21-86.109.11.101:22-158.140.133.54:25743.service. Feb 9 11:44:39.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-158.140.133.54:25743 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:39.593371 kernel: audit: type=1130 audit(1707479079.499:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-158.140.133.54:25743 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:40.302291 sshd[1784]: Invalid user pi from 158.140.133.54 port 25743 Feb 9 11:44:40.506769 sshd[1784]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:40.507750 sshd[1784]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:40.507840 sshd[1784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:40.508740 sshd[1784]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:40.508000 audit[1784]: USER_AUTH pid=1784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:40.603514 kernel: audit: type=1100 audit(1707479080.508:196): pid=1784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:42.922668 sshd[1784]: Failed password for invalid user pi from 158.140.133.54 port 25743 ssh2 Feb 9 11:44:43.517579 sshd[1784]: Connection closed by invalid user pi 158.140.133.54 port 25743 [preauth] Feb 9 11:44:43.520017 systemd[1]: sshd@21-86.109.11.101:22-158.140.133.54:25743.service: Deactivated successfully. Feb 9 11:44:43.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-158.140.133.54:25743 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:43.614513 kernel: audit: type=1131 audit(1707479083.520:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-158.140.133.54:25743 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:43.679840 systemd[1]: Started sshd@22-86.109.11.101:22-158.140.133.54:12949.service. Feb 9 11:44:43.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-158.140.133.54:12949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:43.773503 kernel: audit: type=1130 audit(1707479083.679:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-158.140.133.54:12949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:44.369595 sshd[1788]: Invalid user test from 158.140.133.54 port 12949 Feb 9 11:44:44.543686 sshd[1788]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:44.544781 sshd[1788]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:44.544869 sshd[1788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:44.545774 sshd[1788]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:44.544000 audit[1788]: USER_AUTH pid=1788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:44.639512 kernel: audit: type=1100 audit(1707479084.544:199): pid=1788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:46.844183 sshd[1788]: Failed password for invalid user test from 158.140.133.54 port 12949 ssh2 Feb 9 11:44:48.889138 systemd[1]: Started sshd@23-86.109.11.101:22-158.140.133.54:55883.service. Feb 9 11:44:48.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-86.109.11.101:22-158.140.133.54:55883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:48.982366 kernel: audit: type=1130 audit(1707479088.887:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-86.109.11.101:22-158.140.133.54:55883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:49.139604 sshd[1788]: Connection closed by invalid user test 158.140.133.54 port 12949 [preauth] Feb 9 11:44:49.141897 systemd[1]: sshd@22-86.109.11.101:22-158.140.133.54:12949.service: Deactivated successfully. Feb 9 11:44:49.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-158.140.133.54:12949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:49.240499 kernel: audit: type=1131 audit(1707479089.141:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-158.140.133.54:12949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:49.813110 sshd[1791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:44:49.812000 audit[1791]: USER_AUTH pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:49.906381 kernel: audit: type=1100 audit(1707479089.812:202): pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:51.795714 sshd[1791]: Failed password for root from 158.140.133.54 port 55883 ssh2 Feb 9 11:44:52.668451 sshd[1791]: Connection closed by authenticating user root 158.140.133.54 port 55883 [preauth] Feb 9 11:44:52.670908 systemd[1]: sshd@23-86.109.11.101:22-158.140.133.54:55883.service: Deactivated successfully. Feb 9 11:44:52.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-86.109.11.101:22-158.140.133.54:55883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:52.765521 kernel: audit: type=1131 audit(1707479092.670:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-86.109.11.101:22-158.140.133.54:55883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:52.841999 systemd[1]: Started sshd@24-86.109.11.101:22-158.140.133.54:21495.service. Feb 9 11:44:52.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-158.140.133.54:21495 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:52.934516 kernel: audit: type=1130 audit(1707479092.840:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-158.140.133.54:21495 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:53.792214 sshd[1797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:44:53.791000 audit[1797]: USER_AUTH pid=1797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:53.885379 kernel: audit: type=1100 audit(1707479093.791:205): pid=1797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:55.990669 sshd[1797]: Failed password for root from 158.140.133.54 port 21495 ssh2 Feb 9 11:44:56.630452 sshd[1797]: Connection closed by authenticating user root 158.140.133.54 port 21495 [preauth] Feb 9 11:44:56.632929 systemd[1]: sshd@24-86.109.11.101:22-158.140.133.54:21495.service: Deactivated successfully. Feb 9 11:44:56.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-158.140.133.54:21495 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:56.726384 kernel: audit: type=1131 audit(1707479096.632:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-158.140.133.54:21495 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:56.804170 systemd[1]: Started sshd@25-86.109.11.101:22-158.140.133.54:24503.service. Feb 9 11:44:56.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-158.140.133.54:24503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:56.898520 kernel: audit: type=1130 audit(1707479096.802:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-158.140.133.54:24503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:44:57.532864 sshd[1801]: Invalid user postgres from 158.140.133.54 port 24503 Feb 9 11:44:57.708274 sshd[1801]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:57.709295 sshd[1801]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:44:57.709406 sshd[1801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:44:57.710289 sshd[1801]: pam_faillock(sshd:auth): User unknown Feb 9 11:44:57.709000 audit[1801]: USER_AUTH pid=1801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="postgres" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:57.804398 kernel: audit: type=1100 audit(1707479097.709:208): pid=1801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="postgres" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:44:59.792975 sshd[1801]: Failed password for invalid user postgres from 158.140.133.54 port 24503 ssh2 Feb 9 11:45:00.178114 sshd[1801]: Connection closed by invalid user postgres 158.140.133.54 port 24503 [preauth] Feb 9 11:45:00.180491 systemd[1]: sshd@25-86.109.11.101:22-158.140.133.54:24503.service: Deactivated successfully. Feb 9 11:45:00.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-158.140.133.54:24503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:00.274388 kernel: audit: type=1131 audit(1707479100.179:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-158.140.133.54:24503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:00.347960 systemd[1]: Started sshd@26-86.109.11.101:22-158.140.133.54:50714.service. Feb 9 11:45:00.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-158.140.133.54:50714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:00.441368 kernel: audit: type=1130 audit(1707479100.346:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-158.140.133.54:50714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:01.048811 sshd[1805]: Invalid user admin from 158.140.133.54 port 50714 Feb 9 11:45:01.221722 sshd[1805]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:01.222678 sshd[1805]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:45:01.222760 sshd[1805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:45:01.223718 sshd[1805]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:01.222000 audit[1805]: USER_AUTH pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:01.318491 kernel: audit: type=1100 audit(1707479101.222:211): pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:02.854669 sshd[1805]: Failed password for invalid user admin from 158.140.133.54 port 50714 ssh2 Feb 9 11:45:03.396244 sshd[1805]: Connection closed by invalid user admin 158.140.133.54 port 50714 [preauth] Feb 9 11:45:03.398700 systemd[1]: sshd@26-86.109.11.101:22-158.140.133.54:50714.service: Deactivated successfully. Feb 9 11:45:03.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-158.140.133.54:50714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:03.493508 kernel: audit: type=1131 audit(1707479103.397:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-158.140.133.54:50714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:03.577359 systemd[1]: Started sshd@27-86.109.11.101:22-158.140.133.54:14316.service. Feb 9 11:45:03.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-158.140.133.54:14316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:03.671325 kernel: audit: type=1130 audit(1707479103.576:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-158.140.133.54:14316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:04.506016 sshd[1809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:04.504000 audit[1809]: USER_AUTH pid=1809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:04.600501 kernel: audit: type=1100 audit(1707479104.504:214): pid=1809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:06.548774 sshd[1809]: Failed password for root from 158.140.133.54 port 14316 ssh2 Feb 9 11:45:07.329317 sshd[1809]: Connection closed by authenticating user root 158.140.133.54 port 14316 [preauth] Feb 9 11:45:07.331781 systemd[1]: sshd@27-86.109.11.101:22-158.140.133.54:14316.service: Deactivated successfully. Feb 9 11:45:07.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-158.140.133.54:14316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:07.426514 kernel: audit: type=1131 audit(1707479107.331:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-158.140.133.54:14316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:07.500391 systemd[1]: Started sshd@28-86.109.11.101:22-158.140.133.54:58632.service. Feb 9 11:45:07.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-86.109.11.101:22-158.140.133.54:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:07.594397 kernel: audit: type=1130 audit(1707479107.500:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-86.109.11.101:22-158.140.133.54:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:08.372910 sshd[1813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:08.371000 audit[1813]: USER_AUTH pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:08.466496 kernel: audit: type=1100 audit(1707479108.371:217): pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:10.631607 sshd[1813]: Failed password for root from 158.140.133.54 port 58632 ssh2 Feb 9 11:45:11.196103 sshd[1813]: Connection closed by authenticating user root 158.140.133.54 port 58632 [preauth] Feb 9 11:45:11.198578 systemd[1]: sshd@28-86.109.11.101:22-158.140.133.54:58632.service: Deactivated successfully. Feb 9 11:45:11.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-86.109.11.101:22-158.140.133.54:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:11.292384 kernel: audit: type=1131 audit(1707479111.198:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-86.109.11.101:22-158.140.133.54:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:11.374205 systemd[1]: Started sshd@29-86.109.11.101:22-158.140.133.54:23212.service. Feb 9 11:45:11.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-86.109.11.101:22-158.140.133.54:23212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:11.468522 kernel: audit: type=1130 audit(1707479111.373:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-86.109.11.101:22-158.140.133.54:23212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:12.093369 sshd[1817]: Invalid user steam from 158.140.133.54 port 23212 Feb 9 11:45:12.269407 sshd[1817]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:12.270391 sshd[1817]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:45:12.270482 sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:45:12.271388 sshd[1817]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:12.271000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="steam" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:12.366493 kernel: audit: type=1100 audit(1707479112.271:220): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="steam" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:14.744593 sshd[1817]: Failed password for invalid user steam from 158.140.133.54 port 23212 ssh2 Feb 9 11:45:16.013888 sshd[1817]: Connection closed by invalid user steam 158.140.133.54 port 23212 [preauth] Feb 9 11:45:16.016289 systemd[1]: sshd@29-86.109.11.101:22-158.140.133.54:23212.service: Deactivated successfully. Feb 9 11:45:16.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-86.109.11.101:22-158.140.133.54:23212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:16.110502 kernel: audit: type=1131 audit(1707479116.016:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-86.109.11.101:22-158.140.133.54:23212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:16.203425 systemd[1]: Started sshd@30-86.109.11.101:22-158.140.133.54:51237.service. Feb 9 11:45:16.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-158.140.133.54:51237 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:16.298512 kernel: audit: type=1130 audit(1707479116.203:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-158.140.133.54:51237 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:17.160811 sshd[1821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:17.160000 audit[1821]: USER_AUTH pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:17.254499 kernel: audit: type=1100 audit(1707479117.160:223): pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:19.323733 sshd[1821]: Failed password for root from 158.140.133.54 port 51237 ssh2 Feb 9 11:45:20.013194 sshd[1821]: Connection closed by authenticating user root 158.140.133.54 port 51237 [preauth] Feb 9 11:45:20.015708 systemd[1]: sshd@30-86.109.11.101:22-158.140.133.54:51237.service: Deactivated successfully. Feb 9 11:45:20.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-158.140.133.54:51237 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:20.110514 kernel: audit: type=1131 audit(1707479120.015:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-158.140.133.54:51237 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:20.183337 systemd[1]: Started sshd@31-86.109.11.101:22-158.140.133.54:39408.service. Feb 9 11:45:20.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-158.140.133.54:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:20.276344 kernel: audit: type=1130 audit(1707479120.183:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-158.140.133.54:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:21.056412 sshd[1825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:21.056000 audit[1825]: USER_AUTH pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:21.149493 kernel: audit: type=1100 audit(1707479121.056:226): pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:23.099277 sshd[1825]: Failed password for root from 158.140.133.54 port 39408 ssh2 Feb 9 11:45:23.878341 sshd[1825]: Connection closed by authenticating user root 158.140.133.54 port 39408 [preauth] Feb 9 11:45:23.880798 systemd[1]: sshd@31-86.109.11.101:22-158.140.133.54:39408.service: Deactivated successfully. Feb 9 11:45:23.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-158.140.133.54:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:23.975396 kernel: audit: type=1131 audit(1707479123.880:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-158.140.133.54:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:24.155134 systemd[1]: Started sshd@32-86.109.11.101:22-158.140.133.54:59045.service. Feb 9 11:45:24.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-158.140.133.54:59045 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:24.249525 kernel: audit: type=1130 audit(1707479124.155:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-158.140.133.54:59045 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:25.144393 sshd[1829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:25.144000 audit[1829]: USER_AUTH pid=1829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:25.238477 kernel: audit: type=1100 audit(1707479125.144:229): pid=1829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:26.734610 sshd[1829]: Failed password for root from 158.140.133.54 port 59045 ssh2 Feb 9 11:45:27.970725 sshd[1829]: Connection closed by authenticating user root 158.140.133.54 port 59045 [preauth] Feb 9 11:45:27.973143 systemd[1]: sshd@32-86.109.11.101:22-158.140.133.54:59045.service: Deactivated successfully. Feb 9 11:45:27.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-158.140.133.54:59045 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:28.067512 kernel: audit: type=1131 audit(1707479127.973:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-158.140.133.54:59045 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:28.157963 systemd[1]: Started sshd@33-86.109.11.101:22-158.140.133.54:21563.service. Feb 9 11:45:28.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-158.140.133.54:21563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:28.251390 kernel: audit: type=1130 audit(1707479128.157:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-158.140.133.54:21563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:28.931620 sshd[1833]: Invalid user craft from 158.140.133.54 port 21563 Feb 9 11:45:29.142443 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:29.143427 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:45:29.143518 sshd[1833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:45:29.144420 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:29.144000 audit[1833]: USER_AUTH pid=1833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="craft" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:29.238395 kernel: audit: type=1100 audit(1707479129.144:232): pid=1833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="craft" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:31.954554 sshd[1833]: Failed password for invalid user craft from 158.140.133.54 port 21563 ssh2 Feb 9 11:45:32.642636 sshd[1833]: Connection closed by invalid user craft 158.140.133.54 port 21563 [preauth] Feb 9 11:45:32.645056 systemd[1]: sshd@33-86.109.11.101:22-158.140.133.54:21563.service: Deactivated successfully. Feb 9 11:45:32.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-158.140.133.54:21563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:32.739504 kernel: audit: type=1131 audit(1707479132.644:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-158.140.133.54:21563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:32.814733 systemd[1]: Started sshd@34-86.109.11.101:22-158.140.133.54:26136.service. Feb 9 11:45:32.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-158.140.133.54:26136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:32.908324 kernel: audit: type=1130 audit(1707479132.813:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-158.140.133.54:26136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:33.692874 sshd[1838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:33.691000 audit[1838]: USER_AUTH pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:33.786502 kernel: audit: type=1100 audit(1707479133.691:235): pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:36.051450 sshd[1838]: Failed password for root from 158.140.133.54 port 26136 ssh2 Feb 9 11:45:36.516066 sshd[1838]: Connection closed by authenticating user root 158.140.133.54 port 26136 [preauth] Feb 9 11:45:36.518548 systemd[1]: sshd@34-86.109.11.101:22-158.140.133.54:26136.service: Deactivated successfully. Feb 9 11:45:36.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-158.140.133.54:26136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:36.612391 kernel: audit: type=1131 audit(1707479136.517:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-158.140.133.54:26136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:36.705012 systemd[1]: Started sshd@35-86.109.11.101:22-158.140.133.54:37999.service. Feb 9 11:45:36.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-158.140.133.54:37999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:36.799417 kernel: audit: type=1130 audit(1707479136.703:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-158.140.133.54:37999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:37.650658 sshd[1842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:37.649000 audit[1842]: USER_AUTH pid=1842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:37.744504 kernel: audit: type=1100 audit(1707479137.649:238): pid=1842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:39.221802 sshd[1842]: Failed password for root from 158.140.133.54 port 37999 ssh2 Feb 9 11:45:40.521711 sshd[1842]: Connection closed by authenticating user root 158.140.133.54 port 37999 [preauth] Feb 9 11:45:40.524182 systemd[1]: sshd@35-86.109.11.101:22-158.140.133.54:37999.service: Deactivated successfully. Feb 9 11:45:40.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-158.140.133.54:37999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:40.617393 kernel: audit: type=1131 audit(1707479140.523:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-158.140.133.54:37999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:40.709045 systemd[1]: Started sshd@36-86.109.11.101:22-158.140.133.54:17122.service. Feb 9 11:45:40.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-158.140.133.54:17122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:40.802505 kernel: audit: type=1130 audit(1707479140.707:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-158.140.133.54:17122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:41.663904 sshd[1846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:41.662000 audit[1846]: USER_AUTH pid=1846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:41.757500 kernel: audit: type=1100 audit(1707479141.662:241): pid=1846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:44.454160 sshd[1846]: Failed password for root from 158.140.133.54 port 17122 ssh2 Feb 9 11:45:45.896851 systemd[1]: Started sshd@37-86.109.11.101:22-158.140.133.54:50907.service. Feb 9 11:45:45.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-158.140.133.54:50907 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:45.989375 kernel: audit: type=1130 audit(1707479145.895:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-158.140.133.54:50907 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:46.774617 sshd[1849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:46.774000 audit[1849]: USER_AUTH pid=1849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:46.866511 kernel: audit: type=1100 audit(1707479146.774:243): pid=1849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:46.973709 sshd[1846]: Connection closed by authenticating user root 158.140.133.54 port 17122 [preauth] Feb 9 11:45:46.976105 systemd[1]: sshd@36-86.109.11.101:22-158.140.133.54:17122.service: Deactivated successfully. Feb 9 11:45:46.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-158.140.133.54:17122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:47.070512 kernel: audit: type=1131 audit(1707479146.976:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-158.140.133.54:17122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:49.249139 sshd[1849]: Failed password for root from 158.140.133.54 port 50907 ssh2 Feb 9 11:45:49.659820 sshd[1849]: Connection closed by authenticating user root 158.140.133.54 port 50907 [preauth] Feb 9 11:45:49.662300 systemd[1]: sshd@37-86.109.11.101:22-158.140.133.54:50907.service: Deactivated successfully. Feb 9 11:45:49.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-158.140.133.54:50907 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:49.755509 kernel: audit: type=1131 audit(1707479149.662:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-158.140.133.54:50907 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:49.851544 systemd[1]: Started sshd@38-86.109.11.101:22-158.140.133.54:10007.service. Feb 9 11:45:49.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-86.109.11.101:22-158.140.133.54:10007 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:49.945513 kernel: audit: type=1130 audit(1707479149.851:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-86.109.11.101:22-158.140.133.54:10007 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:50.746287 sshd[1854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:50.746000 audit[1854]: USER_AUTH pid=1854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:50.839477 kernel: audit: type=1100 audit(1707479150.746:247): pid=1854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:52.437674 sshd[1854]: Failed password for root from 158.140.133.54 port 10007 ssh2 Feb 9 11:45:53.572295 sshd[1854]: Connection closed by authenticating user root 158.140.133.54 port 10007 [preauth] Feb 9 11:45:53.574912 systemd[1]: sshd@38-86.109.11.101:22-158.140.133.54:10007.service: Deactivated successfully. Feb 9 11:45:53.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-86.109.11.101:22-158.140.133.54:10007 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:53.668404 kernel: audit: type=1131 audit(1707479153.575:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-86.109.11.101:22-158.140.133.54:10007 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:53.748511 systemd[1]: Started sshd@39-86.109.11.101:22-158.140.133.54:14011.service. Feb 9 11:45:53.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-86.109.11.101:22-158.140.133.54:14011 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:53.842511 kernel: audit: type=1130 audit(1707479153.748:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-86.109.11.101:22-158.140.133.54:14011 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:54.191511 systemd[1]: Started sshd@40-86.109.11.101:22-218.92.0.25:58587.service. Feb 9 11:45:54.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-86.109.11.101:22-218.92.0.25:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:54.285405 kernel: audit: type=1130 audit(1707479154.191:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-86.109.11.101:22-218.92.0.25:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:54.664123 sshd[1858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:45:54.664000 audit[1858]: USER_AUTH pid=1858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:54.756495 kernel: audit: type=1100 audit(1707479154.664:251): pid=1858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:57.238737 sshd[1858]: Failed password for root from 158.140.133.54 port 14011 ssh2 Feb 9 11:45:57.491840 sshd[1858]: Connection closed by authenticating user root 158.140.133.54 port 14011 [preauth] Feb 9 11:45:57.494134 systemd[1]: sshd@39-86.109.11.101:22-158.140.133.54:14011.service: Deactivated successfully. Feb 9 11:45:57.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-86.109.11.101:22-158.140.133.54:14011 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:57.588511 kernel: audit: type=1131 audit(1707479157.494:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-86.109.11.101:22-158.140.133.54:14011 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:57.670928 systemd[1]: Started sshd@41-86.109.11.101:22-158.140.133.54:41905.service. Feb 9 11:45:57.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-86.109.11.101:22-158.140.133.54:41905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:57.764506 kernel: audit: type=1130 audit(1707479157.670:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-86.109.11.101:22-158.140.133.54:41905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:45:58.396358 sshd[1868]: Invalid user admin from 158.140.133.54 port 41905 Feb 9 11:45:58.574929 sshd[1868]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:58.576000 sshd[1868]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:45:58.576087 sshd[1868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:45:58.577143 sshd[1868]: pam_faillock(sshd:auth): User unknown Feb 9 11:45:58.576000 audit[1868]: USER_AUTH pid=1868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:58.670501 kernel: audit: type=1100 audit(1707479158.576:254): pid=1868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:45:59.809574 sshd[1861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 11:45:59.808000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:45:59.902354 kernel: audit: type=1100 audit(1707479159.808:255): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:00.700117 sshd[1868]: Failed password for invalid user admin from 158.140.133.54 port 41905 ssh2 Feb 9 11:46:02.068148 sshd[1861]: Failed password for root from 218.92.0.25 port 58587 ssh2 Feb 9 11:46:02.667348 sshd[1868]: Connection closed by invalid user admin 158.140.133.54 port 41905 [preauth] Feb 9 11:46:02.669857 systemd[1]: sshd@41-86.109.11.101:22-158.140.133.54:41905.service: Deactivated successfully. Feb 9 11:46:02.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-86.109.11.101:22-158.140.133.54:41905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:02.763509 kernel: audit: type=1131 audit(1707479162.669:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-86.109.11.101:22-158.140.133.54:41905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:02.851664 systemd[1]: Started sshd@42-86.109.11.101:22-158.140.133.54:51563.service. Feb 9 11:46:02.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-158.140.133.54:51563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:02.945506 kernel: audit: type=1130 audit(1707479162.850:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-158.140.133.54:51563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:03.578000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:03.657241 sshd[1872]: Invalid user pi from 158.140.133.54 port 51563 Feb 9 11:46:03.672512 kernel: audit: type=1100 audit(1707479163.578:258): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:03.845257 sshd[1872]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:03.846314 sshd[1872]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:03.846424 sshd[1872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:03.847338 sshd[1872]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:03.846000 audit[1872]: USER_AUTH pid=1872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:03.945509 kernel: audit: type=1100 audit(1707479163.846:259): pid=1872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:05.055520 sshd[1861]: Failed password for root from 218.92.0.25 port 58587 ssh2 Feb 9 11:46:05.323124 sshd[1872]: Failed password for invalid user pi from 158.140.133.54 port 51563 ssh2 Feb 9 11:46:06.588000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:06.682511 kernel: audit: type=1100 audit(1707479166.588:260): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:06.841232 sshd[1872]: Connection closed by invalid user pi 158.140.133.54 port 51563 [preauth] Feb 9 11:46:06.843539 systemd[1]: sshd@42-86.109.11.101:22-158.140.133.54:51563.service: Deactivated successfully. Feb 9 11:46:06.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-158.140.133.54:51563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:06.937519 kernel: audit: type=1131 audit(1707479166.842:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-158.140.133.54:51563 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:07.018603 systemd[1]: Started sshd@43-86.109.11.101:22-158.140.133.54:34373.service. Feb 9 11:46:07.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-158.140.133.54:34373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:07.112516 kernel: audit: type=1130 audit(1707479167.017:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-158.140.133.54:34373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:07.791611 sshd[1876]: Invalid user fa from 158.140.133.54 port 34373 Feb 9 11:46:07.997261 sshd[1876]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:07.998266 sshd[1876]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:07.998377 sshd[1876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:07.999284 sshd[1876]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:07.998000 audit[1876]: USER_AUTH pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fa" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:08.093507 kernel: audit: type=1100 audit(1707479167.998:263): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fa" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:09.143909 sshd[1861]: Failed password for root from 218.92.0.25 port 58587 ssh2 Feb 9 11:46:09.595078 sshd[1861]: Received disconnect from 218.92.0.25 port 58587:11: [preauth] Feb 9 11:46:09.595078 sshd[1861]: Disconnected from authenticating user root 218.92.0.25 port 58587 [preauth] Feb 9 11:46:09.595597 sshd[1861]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 11:46:09.597552 systemd[1]: sshd@40-86.109.11.101:22-218.92.0.25:58587.service: Deactivated successfully. Feb 9 11:46:09.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-86.109.11.101:22-218.92.0.25:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:09.690479 kernel: audit: type=1131 audit(1707479169.596:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-86.109.11.101:22-218.92.0.25:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:09.690547 sshd[1876]: Failed password for invalid user fa from 158.140.133.54 port 34373 ssh2 Feb 9 11:46:11.491469 sshd[1876]: Connection closed by invalid user fa 158.140.133.54 port 34373 [preauth] Feb 9 11:46:11.493929 systemd[1]: sshd@43-86.109.11.101:22-158.140.133.54:34373.service: Deactivated successfully. Feb 9 11:46:11.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-158.140.133.54:34373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:11.587404 kernel: audit: type=1131 audit(1707479171.493:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-158.140.133.54:34373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:11.666884 systemd[1]: Started sshd@44-86.109.11.101:22-158.140.133.54:15213.service. Feb 9 11:46:11.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-158.140.133.54:15213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:11.760506 kernel: audit: type=1130 audit(1707479171.665:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-158.140.133.54:15213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:11.981424 systemd[1]: Started sshd@45-86.109.11.101:22-218.92.0.25:50646.service. Feb 9 11:46:11.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-218.92.0.25:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:12.074379 kernel: audit: type=1130 audit(1707479171.980:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-218.92.0.25:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:12.598673 sshd[1882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:46:12.597000 audit[1882]: USER_AUTH pid=1882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:12.691487 kernel: audit: type=1100 audit(1707479172.597:268): pid=1882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:14.310184 sshd[1882]: Failed password for root from 158.140.133.54 port 15213 ssh2 Feb 9 11:46:15.427376 sshd[1882]: Connection closed by authenticating user root 158.140.133.54 port 15213 [preauth] Feb 9 11:46:15.429838 systemd[1]: sshd@44-86.109.11.101:22-158.140.133.54:15213.service: Deactivated successfully. Feb 9 11:46:15.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-158.140.133.54:15213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:15.523401 kernel: audit: type=1131 audit(1707479175.429:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-158.140.133.54:15213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:15.599077 systemd[1]: Started sshd@46-86.109.11.101:22-158.140.133.54:48395.service. Feb 9 11:46:15.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-158.140.133.54:48395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:15.691322 kernel: audit: type=1130 audit(1707479175.597:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-158.140.133.54:48395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:16.477265 sshd[1889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:46:16.476000 audit[1889]: USER_AUTH pid=1889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:16.570495 kernel: audit: type=1100 audit(1707479176.476:271): pid=1889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:19.071994 sshd[1889]: Failed password for root from 158.140.133.54 port 48395 ssh2 Feb 9 11:46:19.301385 sshd[1889]: Connection closed by authenticating user root 158.140.133.54 port 48395 [preauth] Feb 9 11:46:19.303802 systemd[1]: sshd@46-86.109.11.101:22-158.140.133.54:48395.service: Deactivated successfully. Feb 9 11:46:19.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-158.140.133.54:48395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:19.397502 kernel: audit: type=1131 audit(1707479179.302:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-158.140.133.54:48395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:19.484561 systemd[1]: Started sshd@47-86.109.11.101:22-158.140.133.54:22028.service. Feb 9 11:46:19.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-158.140.133.54:22028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:19.577505 kernel: audit: type=1130 audit(1707479179.483:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-158.140.133.54:22028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:20.192485 sshd[1893]: Invalid user devops from 158.140.133.54 port 22028 Feb 9 11:46:20.366220 sshd[1893]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:20.367391 sshd[1893]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:20.367484 sshd[1893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:20.368512 sshd[1893]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:20.367000 audit[1893]: USER_AUTH pid=1893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="devops" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:20.462510 kernel: audit: type=1100 audit(1707479180.367:274): pid=1893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="devops" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:22.511570 sshd[1893]: Failed password for invalid user devops from 158.140.133.54 port 22028 ssh2 Feb 9 11:46:23.636112 sshd[1893]: Connection closed by invalid user devops 158.140.133.54 port 22028 [preauth] Feb 9 11:46:23.638509 systemd[1]: sshd@47-86.109.11.101:22-158.140.133.54:22028.service: Deactivated successfully. Feb 9 11:46:23.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-158.140.133.54:22028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:23.731500 kernel: audit: type=1131 audit(1707479183.637:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-158.140.133.54:22028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:23.807297 systemd[1]: Started sshd@48-86.109.11.101:22-158.140.133.54:55687.service. Feb 9 11:46:23.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-158.140.133.54:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:23.900430 kernel: audit: type=1130 audit(1707479183.806:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-158.140.133.54:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:24.518416 sshd[1897]: Invalid user oracle from 158.140.133.54 port 55687 Feb 9 11:46:24.692842 sshd[1897]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:24.693937 sshd[1897]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:24.694027 sshd[1897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:24.695019 sshd[1897]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:24.693000 audit[1897]: USER_AUTH pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:24.788508 kernel: audit: type=1100 audit(1707479184.693:277): pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:25.098779 sshd[1885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 11:46:25.097000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:25.197505 kernel: audit: type=1100 audit(1707479185.097:278): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:26.386351 sshd[1897]: Failed password for invalid user oracle from 158.140.133.54 port 55687 ssh2 Feb 9 11:46:26.594388 sshd[1885]: Failed password for root from 218.92.0.25 port 50646 ssh2 Feb 9 11:46:27.032174 sshd[1897]: Connection closed by invalid user oracle 158.140.133.54 port 55687 [preauth] Feb 9 11:46:27.034589 systemd[1]: sshd@48-86.109.11.101:22-158.140.133.54:55687.service: Deactivated successfully. Feb 9 11:46:27.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-158.140.133.54:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:27.128504 kernel: audit: type=1131 audit(1707479187.033:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-158.140.133.54:55687 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:27.221920 systemd[1]: Started sshd@49-86.109.11.101:22-158.140.133.54:13940.service. Feb 9 11:46:27.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-158.140.133.54:13940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:27.315506 kernel: audit: type=1130 audit(1707479187.220:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-158.140.133.54:13940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:27.989070 sshd[1901]: Invalid user admin from 158.140.133.54 port 13940 Feb 9 11:46:28.177941 sshd[1901]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:28.179107 sshd[1901]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:28.179198 sshd[1901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:28.180221 sshd[1901]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:28.179000 audit[1901]: USER_AUTH pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:28.273502 kernel: audit: type=1100 audit(1707479188.179:281): pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:29.650000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:29.743489 kernel: audit: type=1100 audit(1707479189.650:282): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:30.754647 sshd[1901]: Failed password for invalid user admin from 158.140.133.54 port 13940 ssh2 Feb 9 11:46:32.030491 sshd[1885]: Failed password for root from 218.92.0.25 port 50646 ssh2 Feb 9 11:46:32.222828 sshd[1901]: Connection closed by invalid user admin 158.140.133.54 port 13940 [preauth] Feb 9 11:46:32.225220 systemd[1]: sshd@49-86.109.11.101:22-158.140.133.54:13940.service: Deactivated successfully. Feb 9 11:46:32.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-158.140.133.54:13940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:32.318492 kernel: audit: type=1131 audit(1707479192.224:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-158.140.133.54:13940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:32.405697 systemd[1]: Started sshd@50-86.109.11.101:22-158.140.133.54:26724.service. Feb 9 11:46:32.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-158.140.133.54:26724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:32.498324 kernel: audit: type=1130 audit(1707479192.404:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-158.140.133.54:26724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:32.660000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:32.762377 kernel: audit: type=1100 audit(1707479192.660:285): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:33.317202 sshd[1905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:46:33.316000 audit[1905]: USER_AUTH pid=1905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:33.410492 kernel: audit: type=1100 audit(1707479193.316:286): pid=1905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:34.784818 sshd[1885]: Failed password for root from 218.92.0.25 port 50646 ssh2 Feb 9 11:46:34.912958 sshd[1905]: Failed password for root from 158.140.133.54 port 26724 ssh2 Feb 9 11:46:35.671549 sshd[1885]: Received disconnect from 218.92.0.25 port 50646:11: [preauth] Feb 9 11:46:35.671549 sshd[1885]: Disconnected from authenticating user root 218.92.0.25 port 50646 [preauth] Feb 9 11:46:35.672045 sshd[1885]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 11:46:35.674001 systemd[1]: sshd@45-86.109.11.101:22-218.92.0.25:50646.service: Deactivated successfully. Feb 9 11:46:35.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-218.92.0.25:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:35.767521 kernel: audit: type=1131 audit(1707479195.673:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-218.92.0.25:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:36.051615 systemd[1]: Started sshd@51-86.109.11.101:22-218.92.0.25:62918.service. Feb 9 11:46:36.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-218.92.0.25:62918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:36.143323 kernel: audit: type=1130 audit(1707479196.050:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-218.92.0.25:62918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:36.145443 sshd[1905]: Connection closed by authenticating user root 158.140.133.54 port 26724 [preauth] Feb 9 11:46:36.145860 systemd[1]: sshd@50-86.109.11.101:22-158.140.133.54:26724.service: Deactivated successfully. Feb 9 11:46:36.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-158.140.133.54:26724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:36.239511 kernel: audit: type=1131 audit(1707479196.144:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-158.140.133.54:26724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:36.312931 systemd[1]: Started sshd@52-86.109.11.101:22-158.140.133.54:54043.service. Feb 9 11:46:36.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-158.140.133.54:54043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:36.406513 kernel: audit: type=1130 audit(1707479196.311:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-158.140.133.54:54043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:37.197175 sshd[1913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:46:37.196000 audit[1913]: USER_AUTH pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:37.290493 kernel: audit: type=1100 audit(1707479197.196:291): pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:38.672983 sshd[1913]: Failed password for root from 158.140.133.54 port 54043 ssh2 Feb 9 11:46:40.059969 sshd[1913]: Connection closed by authenticating user root 158.140.133.54 port 54043 [preauth] Feb 9 11:46:40.062253 systemd[1]: sshd@52-86.109.11.101:22-158.140.133.54:54043.service: Deactivated successfully. Feb 9 11:46:40.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-158.140.133.54:54043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:40.154324 kernel: audit: type=1131 audit(1707479200.061:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-158.140.133.54:54043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:40.259998 systemd[1]: Started sshd@53-86.109.11.101:22-158.140.133.54:25487.service. Feb 9 11:46:40.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-158.140.133.54:25487 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:40.353507 kernel: audit: type=1130 audit(1707479200.258:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-158.140.133.54:25487 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:41.027907 sshd[1917]: Invalid user es from 158.140.133.54 port 25487 Feb 9 11:46:41.219788 sshd[1917]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:41.220784 sshd[1917]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:41.220871 sshd[1917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:41.221797 sshd[1917]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:41.220000 audit[1917]: USER_AUTH pid=1917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="es" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:41.315518 kernel: audit: type=1100 audit(1707479201.220:294): pid=1917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="es" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:41.640515 sshd[1909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 11:46:41.639000 audit[1909]: USER_AUTH pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:41.740324 kernel: audit: type=1100 audit(1707479201.639:295): pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:43.580680 sshd[1917]: Failed password for invalid user es from 158.140.133.54 port 25487 ssh2 Feb 9 11:46:43.999451 sshd[1909]: Failed password for root from 218.92.0.25 port 62918 ssh2 Feb 9 11:46:45.269909 sshd[1917]: Connection closed by invalid user es 158.140.133.54 port 25487 [preauth] Feb 9 11:46:45.272277 systemd[1]: sshd@53-86.109.11.101:22-158.140.133.54:25487.service: Deactivated successfully. Feb 9 11:46:45.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-158.140.133.54:25487 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:45.366416 kernel: audit: type=1131 audit(1707479205.271:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-158.140.133.54:25487 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:45.475938 systemd[1]: Started sshd@54-86.109.11.101:22-158.140.133.54:14428.service. Feb 9 11:46:45.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-158.140.133.54:14428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:45.568506 kernel: audit: type=1130 audit(1707479205.474:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-158.140.133.54:14428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:46.465584 sshd[1921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:46:46.465000 audit[1921]: USER_AUTH pid=1921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:46.557365 kernel: audit: type=1100 audit(1707479206.465:298): pid=1921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:46.754187 systemd[1]: Started sshd@55-86.109.11.101:22-218.92.0.29:63940.service. Feb 9 11:46:46.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-218.92.0.29:63940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:46.847505 kernel: audit: type=1130 audit(1707479206.753:299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-218.92.0.29:63940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:47.105000 audit[1909]: USER_AUTH pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:47.203357 kernel: audit: type=1100 audit(1707479207.105:300): pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:48.512917 sshd[1921]: Failed password for root from 158.140.133.54 port 14428 ssh2 Feb 9 11:46:49.288904 sshd[1909]: Failed password for root from 218.92.0.25 port 62918 ssh2 Feb 9 11:46:49.328883 sshd[1921]: Connection closed by authenticating user root 158.140.133.54 port 14428 [preauth] Feb 9 11:46:49.331292 systemd[1]: sshd@54-86.109.11.101:22-158.140.133.54:14428.service: Deactivated successfully. Feb 9 11:46:49.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-158.140.133.54:14428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:49.425508 kernel: audit: type=1131 audit(1707479209.331:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-158.140.133.54:14428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:49.494290 systemd[1]: Started sshd@56-86.109.11.101:22-158.140.133.54:17697.service. Feb 9 11:46:49.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-158.140.133.54:17697 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:49.586497 kernel: audit: type=1130 audit(1707479209.494:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-158.140.133.54:17697 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:49.771771 sshd[1924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 11:46:49.771000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:46:49.871324 kernel: audit: type=1100 audit(1707479209.771:303): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:46:50.112000 audit[1909]: USER_AUTH pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:50.211496 kernel: audit: type=1100 audit(1707479210.112:304): pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.25 addr=218.92.0.25 terminal=ssh res=failed' Feb 9 11:46:50.350066 sshd[1928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 user=root Feb 9 11:46:50.350000 audit[1928]: USER_AUTH pid=1928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:50.449475 kernel: audit: type=1100 audit(1707479210.350:305): pid=1928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:50.896110 sshd[1924]: Failed password for root from 218.92.0.29 port 63940 ssh2 Feb 9 11:46:52.039552 sshd[1909]: Failed password for root from 218.92.0.25 port 62918 ssh2 Feb 9 11:46:52.115000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:46:52.208411 kernel: audit: type=1100 audit(1707479212.115:306): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:46:52.277424 sshd[1928]: Failed password for root from 158.140.133.54 port 17697 ssh2 Feb 9 11:46:53.112226 sshd[1909]: Received disconnect from 218.92.0.25 port 62918:11: [preauth] Feb 9 11:46:53.112226 sshd[1909]: Disconnected from authenticating user root 218.92.0.25 port 62918 [preauth] Feb 9 11:46:53.112765 sshd[1909]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.25 user=root Feb 9 11:46:53.114820 systemd[1]: sshd@51-86.109.11.101:22-218.92.0.25:62918.service: Deactivated successfully. Feb 9 11:46:53.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-218.92.0.25:62918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:53.172173 sshd[1928]: Connection closed by authenticating user root 158.140.133.54 port 17697 [preauth] Feb 9 11:46:53.172687 systemd[1]: sshd@56-86.109.11.101:22-158.140.133.54:17697.service: Deactivated successfully. Feb 9 11:46:53.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-158.140.133.54:17697 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:53.298971 kernel: audit: type=1131 audit(1707479213.115:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-218.92.0.25:62918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:53.299005 kernel: audit: type=1131 audit(1707479213.172:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-158.140.133.54:17697 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:53.358204 systemd[1]: Started sshd@57-86.109.11.101:22-158.140.133.54:21349.service. Feb 9 11:46:53.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-158.140.133.54:21349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:53.450325 kernel: audit: type=1130 audit(1707479213.357:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-158.140.133.54:21349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:54.172912 sshd[1933]: Invalid user nagios from 158.140.133.54 port 21349 Feb 9 11:46:54.318156 sshd[1924]: Failed password for root from 218.92.0.29 port 63940 ssh2 Feb 9 11:46:54.363154 sshd[1933]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:54.364147 sshd[1933]: pam_unix(sshd:auth): check pass; user unknown Feb 9 11:46:54.364237 sshd[1933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.133.54 Feb 9 11:46:54.365153 sshd[1933]: pam_faillock(sshd:auth): User unknown Feb 9 11:46:54.365000 audit[1933]: USER_AUTH pid=1933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nagios" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:54.459401 kernel: audit: type=1100 audit(1707479214.365:310): pid=1933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nagios" exe="/usr/sbin/sshd" hostname=158.140.133.54 addr=158.140.133.54 terminal=ssh res=failed' Feb 9 11:46:54.937000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:46:55.030501 kernel: audit: type=1100 audit(1707479214.937:311): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:46:57.175608 sshd[1933]: Failed password for invalid user nagios from 158.140.133.54 port 21349 ssh2 Feb 9 11:46:57.747866 sshd[1924]: Failed password for root from 218.92.0.29 port 63940 ssh2 Feb 9 11:46:58.949962 sshd[1933]: Connection closed by invalid user nagios 158.140.133.54 port 21349 [preauth] Feb 9 11:46:58.952377 systemd[1]: sshd@57-86.109.11.101:22-158.140.133.54:21349.service: Deactivated successfully. Feb 9 11:46:58.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-158.140.133.54:21349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:46:59.046508 kernel: audit: type=1131 audit(1707479218.952:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-158.140.133.54:21349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:00.410111 sshd[1924]: Received disconnect from 218.92.0.29 port 63940:11: [preauth] Feb 9 11:47:00.410111 sshd[1924]: Disconnected from authenticating user root 218.92.0.29 port 63940 [preauth] Feb 9 11:47:00.410662 sshd[1924]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 11:47:00.412686 systemd[1]: sshd@55-86.109.11.101:22-218.92.0.29:63940.service: Deactivated successfully. Feb 9 11:47:00.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-218.92.0.29:63940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:00.506508 kernel: audit: type=1131 audit(1707479220.412:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-218.92.0.29:63940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:00.596073 systemd[1]: Started sshd@58-86.109.11.101:22-218.92.0.29:37478.service. Feb 9 11:47:00.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-218.92.0.29:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:00.689393 kernel: audit: type=1130 audit(1707479220.596:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-218.92.0.29:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:01.759209 sshd[1938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 11:47:01.759000 audit[1938]: USER_AUTH pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:01.852505 kernel: audit: type=1100 audit(1707479221.759:315): pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:02.863740 sshd[1938]: Failed password for root from 218.92.0.29 port 37478 ssh2 Feb 9 11:47:03.261000 audit[1938]: USER_AUTH pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:03.353324 kernel: audit: type=1100 audit(1707479223.261:316): pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:05.640496 sshd[1938]: Failed password for root from 218.92.0.29 port 37478 ssh2 Feb 9 11:47:06.081000 audit[1938]: USER_AUTH pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:06.173495 kernel: audit: type=1100 audit(1707479226.081:317): pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:08.540219 sshd[1938]: Failed password for root from 218.92.0.29 port 37478 ssh2 Feb 9 11:47:08.900921 sshd[1938]: Received disconnect from 218.92.0.29 port 37478:11: [preauth] Feb 9 11:47:08.900921 sshd[1938]: Disconnected from authenticating user root 218.92.0.29 port 37478 [preauth] Feb 9 11:47:08.901385 sshd[1938]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 11:47:08.903381 systemd[1]: sshd@58-86.109.11.101:22-218.92.0.29:37478.service: Deactivated successfully. Feb 9 11:47:08.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-218.92.0.29:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:08.997507 kernel: audit: type=1131 audit(1707479228.903:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-218.92.0.29:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:09.043263 systemd[1]: Started sshd@59-86.109.11.101:22-218.92.0.29:31905.service. Feb 9 11:47:09.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-218.92.0.29:31905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:09.135402 kernel: audit: type=1130 audit(1707479229.043:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-218.92.0.29:31905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:10.319976 sshd[1942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 11:47:10.319000 audit[1942]: USER_AUTH pid=1942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:10.412372 kernel: audit: type=1100 audit(1707479230.319:320): pid=1942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:12.327568 sshd[1942]: Failed password for root from 218.92.0.29 port 31905 ssh2 Feb 9 11:47:13.128000 audit[1942]: USER_AUTH pid=1942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:13.220324 kernel: audit: type=1100 audit(1707479233.128:321): pid=1942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:14.212480 sshd[1942]: Failed password for root from 218.92.0.29 port 31905 ssh2 Feb 9 11:47:14.609000 audit[1942]: USER_AUTH pid=1942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:14.702499 kernel: audit: type=1100 audit(1707479234.609:322): pid=1942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 11:47:16.832552 sshd[1942]: Failed password for root from 218.92.0.29 port 31905 ssh2 Feb 9 11:47:17.417562 sshd[1942]: Received disconnect from 218.92.0.29 port 31905:11: [preauth] Feb 9 11:47:17.417562 sshd[1942]: Disconnected from authenticating user root 218.92.0.29 port 31905 [preauth] Feb 9 11:47:17.418053 sshd[1942]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 11:47:17.420044 systemd[1]: sshd@59-86.109.11.101:22-218.92.0.29:31905.service: Deactivated successfully. Feb 9 11:47:17.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-218.92.0.29:31905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:47:17.513506 kernel: audit: type=1131 audit(1707479237.420:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-218.92.0.29:31905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:32.725279 systemd[1]: Started sshd@60-86.109.11.101:22-61.177.172.179:22926.service. Feb 9 11:49:32.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-61.177.172.179:22926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:32.818510 kernel: audit: type=1130 audit(1707479372.724:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-61.177.172.179:22926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:35.117539 sshd[1954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 11:49:35.116000 audit[1954]: USER_AUTH pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:35.210366 kernel: audit: type=1100 audit(1707479375.116:325): pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:36.697722 sshd[1954]: Failed password for root from 61.177.172.179 port 22926 ssh2 Feb 9 11:49:37.999000 audit[1954]: USER_AUTH pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:38.093474 kernel: audit: type=1100 audit(1707479377.999:326): pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:39.857047 sshd[1954]: Failed password for root from 61.177.172.179 port 22926 ssh2 Feb 9 11:49:40.863000 audit[1954]: USER_AUTH pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:40.957501 kernel: audit: type=1100 audit(1707479380.863:327): pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:42.465624 sshd[1954]: Failed password for root from 61.177.172.179 port 22926 ssh2 Feb 9 11:49:43.816146 sshd[1954]: Received disconnect from 61.177.172.179 port 22926:11: [preauth] Feb 9 11:49:43.816146 sshd[1954]: Disconnected from authenticating user root 61.177.172.179 port 22926 [preauth] Feb 9 11:49:43.816691 sshd[1954]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 11:49:43.818678 systemd[1]: sshd@60-86.109.11.101:22-61.177.172.179:22926.service: Deactivated successfully. Feb 9 11:49:43.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-61.177.172.179:22926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:43.912382 kernel: audit: type=1131 audit(1707479383.817:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-61.177.172.179:22926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:44.184026 systemd[1]: Started sshd@61-86.109.11.101:22-61.177.172.179:31337.service. Feb 9 11:49:44.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-61.177.172.179:31337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:44.277517 kernel: audit: type=1130 audit(1707479384.183:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-61.177.172.179:31337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:54.836873 update_engine[1153]: I0209 11:49:54.836755 1153 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 11:49:54.836873 update_engine[1153]: I0209 11:49:54.836833 1153 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 11:49:54.848311 update_engine[1153]: I0209 11:49:54.848227 1153 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 11:49:54.849265 update_engine[1153]: I0209 11:49:54.849175 1153 omaha_request_params.cc:62] Current group set to lts Feb 9 11:49:54.849579 update_engine[1153]: I0209 11:49:54.849496 1153 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 11:49:54.849579 update_engine[1153]: I0209 11:49:54.849516 1153 update_attempter.cc:643] Scheduling an action processor start. Feb 9 11:49:54.849579 update_engine[1153]: I0209 11:49:54.849548 1153 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 11:49:54.849962 update_engine[1153]: I0209 11:49:54.849611 1153 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 11:49:54.849962 update_engine[1153]: I0209 11:49:54.849766 1153 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 11:49:54.849962 update_engine[1153]: I0209 11:49:54.849782 1153 omaha_request_action.cc:271] Request: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: Feb 9 11:49:54.849962 update_engine[1153]: I0209 11:49:54.849792 1153 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 11:49:54.851031 locksmithd[1176]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 11:49:54.852953 update_engine[1153]: I0209 11:49:54.852872 1153 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 11:49:54.853252 update_engine[1153]: E0209 11:49:54.853101 1153 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 11:49:54.853405 update_engine[1153]: I0209 11:49:54.853255 1153 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 11:49:54.864097 systemd[1]: Started sshd@62-86.109.11.101:22-61.177.172.179:31862.service. Feb 9 11:49:54.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-61.177.172.179:31862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:54.956512 kernel: audit: type=1130 audit(1707479394.862:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-61.177.172.179:31862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:49:58.346756 sshd[1960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 11:49:58.345000 audit[1960]: USER_AUTH pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:58.439352 kernel: audit: type=1100 audit(1707479398.345:331): pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:49:59.751969 sshd[1960]: Failed password for root from 61.177.172.179 port 31862 ssh2 Feb 9 11:50:01.330000 audit[1960]: ANOM_LOGIN_FAILURES pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:01.331815 sshd[1960]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 11:50:01.330000 audit[1960]: USER_AUTH pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:01.489024 kernel: audit: type=2100 audit(1707479401.330:332): pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:01.489062 kernel: audit: type=1100 audit(1707479401.330:333): pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:03.148490 sshd[1960]: Failed password for root from 61.177.172.179 port 31862 ssh2 Feb 9 11:50:04.235000 audit[1960]: USER_AUTH pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:04.329504 kernel: audit: type=1100 audit(1707479404.235:334): pid=1960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:04.835712 update_engine[1153]: I0209 11:50:04.835587 1153 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 11:50:04.836531 update_engine[1153]: I0209 11:50:04.836050 1153 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 11:50:04.836531 update_engine[1153]: E0209 11:50:04.836247 1153 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 11:50:04.836531 update_engine[1153]: I0209 11:50:04.836457 1153 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 11:50:06.132784 sshd[1960]: Failed password for root from 61.177.172.179 port 31862 ssh2 Feb 9 11:50:07.197361 sshd[1960]: Received disconnect from 61.177.172.179 port 31862:11: [preauth] Feb 9 11:50:07.197361 sshd[1960]: Disconnected from authenticating user root 61.177.172.179 port 31862 [preauth] Feb 9 11:50:07.197878 sshd[1960]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 11:50:07.199862 systemd[1]: sshd@62-86.109.11.101:22-61.177.172.179:31862.service: Deactivated successfully. Feb 9 11:50:07.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-61.177.172.179:31862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:07.293388 kernel: audit: type=1131 audit(1707479407.199:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-61.177.172.179:31862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:07.742249 systemd[1]: Started sshd@63-86.109.11.101:22-61.177.172.179:45259.service. Feb 9 11:50:07.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-61.177.172.179:45259 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:07.835385 kernel: audit: type=1130 audit(1707479407.742:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-61.177.172.179:45259 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:09.950147 sshd[1964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 11:50:09.950000 audit[1964]: USER_AUTH pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:10.042497 kernel: audit: type=1100 audit(1707479409.950:337): pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:11.866985 sshd[1964]: Failed password for root from 61.177.172.179 port 45259 ssh2 Feb 9 11:50:12.996000 audit[1964]: USER_AUTH pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:13.089363 kernel: audit: type=1100 audit(1707479412.996:338): pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:14.657865 sshd[1964]: Failed password for root from 61.177.172.179 port 45259 ssh2 Feb 9 11:50:14.834929 update_engine[1153]: I0209 11:50:14.834807 1153 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 11:50:14.835752 update_engine[1153]: I0209 11:50:14.835268 1153 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 11:50:14.835752 update_engine[1153]: E0209 11:50:14.835502 1153 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 11:50:14.835752 update_engine[1153]: I0209 11:50:14.835671 1153 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 11:50:16.044000 audit[1964]: USER_AUTH pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:16.137368 kernel: audit: type=1100 audit(1707479416.044:339): pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 9 11:50:17.921571 sshd[1964]: Failed password for root from 61.177.172.179 port 45259 ssh2 Feb 9 11:50:18.986485 sshd[1964]: Received disconnect from 61.177.172.179 port 45259:11: [preauth] Feb 9 11:50:18.986485 sshd[1964]: Disconnected from authenticating user root 61.177.172.179 port 45259 [preauth] Feb 9 11:50:18.987002 sshd[1964]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 9 11:50:18.988977 systemd[1]: sshd@63-86.109.11.101:22-61.177.172.179:45259.service: Deactivated successfully. Feb 9 11:50:18.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-61.177.172.179:45259 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:19.082382 kernel: audit: type=1131 audit(1707479418.989:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-61.177.172.179:45259 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:50:24.835063 update_engine[1153]: I0209 11:50:24.834939 1153 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 11:50:24.835998 update_engine[1153]: I0209 11:50:24.835435 1153 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 11:50:24.835998 update_engine[1153]: E0209 11:50:24.835644 1153 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 11:50:24.835998 update_engine[1153]: I0209 11:50:24.835793 1153 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 11:50:24.835998 update_engine[1153]: I0209 11:50:24.835808 1153 omaha_request_action.cc:621] Omaha request response: Feb 9 11:50:24.835998 update_engine[1153]: E0209 11:50:24.835947 1153 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 11:50:24.835998 update_engine[1153]: I0209 11:50:24.835973 1153 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 11:50:24.835998 update_engine[1153]: I0209 11:50:24.835983 1153 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 11:50:24.835998 update_engine[1153]: I0209 11:50:24.835991 1153 update_attempter.cc:306] Processing Done. Feb 9 11:50:24.836816 update_engine[1153]: E0209 11:50:24.836016 1153 update_attempter.cc:619] Update failed. Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836026 1153 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836035 1153 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836045 1153 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836196 1153 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836246 1153 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836257 1153 omaha_request_action.cc:271] Request: Feb 9 11:50:24.836816 update_engine[1153]: Feb 9 11:50:24.836816 update_engine[1153]: Feb 9 11:50:24.836816 update_engine[1153]: Feb 9 11:50:24.836816 update_engine[1153]: Feb 9 11:50:24.836816 update_engine[1153]: Feb 9 11:50:24.836816 update_engine[1153]: Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836266 1153 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 11:50:24.836816 update_engine[1153]: I0209 11:50:24.836591 1153 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 11:50:24.836816 update_engine[1153]: E0209 11:50:24.836752 1153 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836884 1153 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836898 1153 omaha_request_action.cc:621] Omaha request response: Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836908 1153 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836916 1153 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836925 1153 update_attempter.cc:306] Processing Done. Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836931 1153 update_attempter.cc:310] Error event sent. Feb 9 11:50:24.838215 update_engine[1153]: I0209 11:50:24.836956 1153 update_check_scheduler.cc:74] Next update check in 47m51s Feb 9 11:50:24.838841 locksmithd[1176]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 11:50:24.838841 locksmithd[1176]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 11:51:44.193050 sshd[1958]: Timeout before authentication for 61.177.172.179 port 31337 Feb 9 11:51:44.194364 systemd[1]: sshd@61-86.109.11.101:22-61.177.172.179:31337.service: Deactivated successfully. Feb 9 11:51:44.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-61.177.172.179:31337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 11:51:44.288515 kernel: audit: type=1131 audit(1707479504.193:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-61.177.172.179:31337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'