Feb 13 00:28:35.572436 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 13 00:28:35.572449 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 00:28:35.572455 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 00:28:35.572459 kernel: BIOS-provided physical RAM map: Feb 13 00:28:35.572463 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 00:28:35.572466 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 00:28:35.572471 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 00:28:35.572476 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 00:28:35.572480 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 00:28:35.572483 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006dfbbfff] usable Feb 13 00:28:35.572487 kernel: BIOS-e820: [mem 0x000000006dfbc000-0x000000006dfbcfff] ACPI NVS Feb 13 00:28:35.572491 kernel: BIOS-e820: [mem 0x000000006dfbd000-0x000000006dfbdfff] reserved Feb 13 00:28:35.572495 kernel: BIOS-e820: [mem 0x000000006dfbe000-0x0000000077fc4fff] usable Feb 13 00:28:35.572499 kernel: BIOS-e820: [mem 0x0000000077fc5000-0x00000000790a7fff] reserved Feb 13 00:28:35.572504 kernel: BIOS-e820: [mem 0x00000000790a8000-0x0000000079230fff] usable Feb 13 00:28:35.572514 kernel: BIOS-e820: [mem 0x0000000079231000-0x0000000079662fff] ACPI NVS Feb 13 00:28:35.572520 kernel: BIOS-e820: [mem 0x0000000079663000-0x000000007befefff] reserved Feb 13 00:28:35.572525 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 13 00:28:35.572529 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 13 00:28:35.572533 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 00:28:35.572537 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 00:28:35.572541 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 00:28:35.572545 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 00:28:35.572550 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 00:28:35.572555 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 13 00:28:35.572559 kernel: NX (Execute Disable) protection: active Feb 13 00:28:35.572563 kernel: SMBIOS 3.2.1 present. Feb 13 00:28:35.572567 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 13 00:28:35.572572 kernel: tsc: Detected 3400.000 MHz processor Feb 13 00:28:35.572576 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 00:28:35.572580 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 00:28:35.572585 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 00:28:35.572589 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 13 00:28:35.572594 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 00:28:35.572599 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 13 00:28:35.572603 kernel: Using GB pages for direct mapping Feb 13 00:28:35.572607 kernel: ACPI: Early table checksum verification disabled Feb 13 00:28:35.572612 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 00:28:35.572616 kernel: ACPI: XSDT 0x00000000795440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 00:28:35.572621 kernel: ACPI: FACP 0x0000000079580620 000114 (v06 01072009 AMI 00010013) Feb 13 00:28:35.572627 kernel: ACPI: DSDT 0x0000000079544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 00:28:35.572632 kernel: ACPI: FACS 0x0000000079662F80 000040 Feb 13 00:28:35.572637 kernel: ACPI: APIC 0x0000000079580738 00012C (v04 01072009 AMI 00010013) Feb 13 00:28:35.572642 kernel: ACPI: FPDT 0x0000000079580868 000044 (v01 01072009 AMI 00010013) Feb 13 00:28:35.572646 kernel: ACPI: FIDT 0x00000000795808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 00:28:35.572651 kernel: ACPI: MCFG 0x0000000079580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 00:28:35.572656 kernel: ACPI: SPMI 0x0000000079580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 00:28:35.572662 kernel: ACPI: SSDT 0x00000000795809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 00:28:35.572667 kernel: ACPI: SSDT 0x00000000795824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 00:28:35.572671 kernel: ACPI: SSDT 0x00000000795856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 00:28:35.572676 kernel: ACPI: HPET 0x00000000795879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:28:35.572681 kernel: ACPI: SSDT 0x0000000079587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 00:28:35.572686 kernel: ACPI: SSDT 0x00000000795889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 00:28:35.572690 kernel: ACPI: UEFI 0x00000000795892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:28:35.572695 kernel: ACPI: LPIT 0x0000000079589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:28:35.572700 kernel: ACPI: SSDT 0x00000000795893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 00:28:35.572705 kernel: ACPI: SSDT 0x000000007958BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 00:28:35.572710 kernel: ACPI: DBGP 0x000000007958D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:28:35.572715 kernel: ACPI: DBG2 0x000000007958D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:28:35.572719 kernel: ACPI: SSDT 0x000000007958D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 00:28:35.572724 kernel: ACPI: DMAR 0x000000007958EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 13 00:28:35.572729 kernel: ACPI: SSDT 0x000000007958ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 00:28:35.572733 kernel: ACPI: TPM2 0x000000007958EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 00:28:35.572738 kernel: ACPI: SSDT 0x000000007958EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 00:28:35.572743 kernel: ACPI: WSMT 0x000000007958FC28 000028 (v01 \xf5m 01072009 AMI 00010013) Feb 13 00:28:35.572748 kernel: ACPI: EINJ 0x000000007958FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 00:28:35.572753 kernel: ACPI: ERST 0x000000007958FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 00:28:35.572758 kernel: ACPI: BERT 0x000000007958FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 00:28:35.572763 kernel: ACPI: HEST 0x000000007958FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 00:28:35.572767 kernel: ACPI: SSDT 0x0000000079590260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 00:28:35.572772 kernel: ACPI: Reserving FACP table memory at [mem 0x79580620-0x79580733] Feb 13 00:28:35.572777 kernel: ACPI: Reserving DSDT table memory at [mem 0x79544268-0x7958061e] Feb 13 00:28:35.572781 kernel: ACPI: Reserving FACS table memory at [mem 0x79662f80-0x79662fbf] Feb 13 00:28:35.572787 kernel: ACPI: Reserving APIC table memory at [mem 0x79580738-0x79580863] Feb 13 00:28:35.572791 kernel: ACPI: Reserving FPDT table memory at [mem 0x79580868-0x795808ab] Feb 13 00:28:35.572796 kernel: ACPI: Reserving FIDT table memory at [mem 0x795808b0-0x7958094b] Feb 13 00:28:35.572801 kernel: ACPI: Reserving MCFG table memory at [mem 0x79580950-0x7958098b] Feb 13 00:28:35.572805 kernel: ACPI: Reserving SPMI table memory at [mem 0x79580990-0x795809d0] Feb 13 00:28:35.572810 kernel: ACPI: Reserving SSDT table memory at [mem 0x795809d8-0x795824f3] Feb 13 00:28:35.572815 kernel: ACPI: Reserving SSDT table memory at [mem 0x795824f8-0x795856bd] Feb 13 00:28:35.572819 kernel: ACPI: Reserving SSDT table memory at [mem 0x795856c0-0x795879ea] Feb 13 00:28:35.572824 kernel: ACPI: Reserving HPET table memory at [mem 0x795879f0-0x79587a27] Feb 13 00:28:35.572829 kernel: ACPI: Reserving SSDT table memory at [mem 0x79587a28-0x795889d5] Feb 13 00:28:35.572834 kernel: ACPI: Reserving SSDT table memory at [mem 0x795889d8-0x795892ce] Feb 13 00:28:35.572839 kernel: ACPI: Reserving UEFI table memory at [mem 0x795892d0-0x79589311] Feb 13 00:28:35.572843 kernel: ACPI: Reserving LPIT table memory at [mem 0x79589318-0x795893ab] Feb 13 00:28:35.572848 kernel: ACPI: Reserving SSDT table memory at [mem 0x795893b0-0x7958bb8d] Feb 13 00:28:35.572853 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958bb90-0x7958d071] Feb 13 00:28:35.572857 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958d078-0x7958d0ab] Feb 13 00:28:35.572862 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958d0b0-0x7958d103] Feb 13 00:28:35.572867 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958d108-0x7958ec6e] Feb 13 00:28:35.572872 kernel: ACPI: Reserving DMAR table memory at [mem 0x7958ec70-0x7958ed17] Feb 13 00:28:35.572877 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ed18-0x7958ee5b] Feb 13 00:28:35.572882 kernel: ACPI: Reserving TPM2 table memory at [mem 0x7958ee60-0x7958ee93] Feb 13 00:28:35.572886 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ee98-0x7958fc26] Feb 13 00:28:35.572891 kernel: ACPI: Reserving WSMT table memory at [mem 0x7958fc28-0x7958fc4f] Feb 13 00:28:35.572896 kernel: ACPI: Reserving EINJ table memory at [mem 0x7958fc50-0x7958fd7f] Feb 13 00:28:35.572900 kernel: ACPI: Reserving ERST table memory at [mem 0x7958fd80-0x7958ffaf] Feb 13 00:28:35.572905 kernel: ACPI: Reserving BERT table memory at [mem 0x7958ffb0-0x7958ffdf] Feb 13 00:28:35.572910 kernel: ACPI: Reserving HEST table memory at [mem 0x7958ffe0-0x7959025b] Feb 13 00:28:35.572915 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590260-0x795903c1] Feb 13 00:28:35.572920 kernel: No NUMA configuration found Feb 13 00:28:35.572925 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 13 00:28:35.572929 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 13 00:28:35.572934 kernel: Zone ranges: Feb 13 00:28:35.572939 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 00:28:35.572944 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 00:28:35.572948 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 13 00:28:35.572953 kernel: Movable zone start for each node Feb 13 00:28:35.572958 kernel: Early memory node ranges Feb 13 00:28:35.572963 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 00:28:35.572968 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 00:28:35.572972 kernel: node 0: [mem 0x0000000040400000-0x000000006dfbbfff] Feb 13 00:28:35.572977 kernel: node 0: [mem 0x000000006dfbe000-0x0000000077fc4fff] Feb 13 00:28:35.572982 kernel: node 0: [mem 0x00000000790a8000-0x0000000079230fff] Feb 13 00:28:35.572986 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 13 00:28:35.572991 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 13 00:28:35.572996 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 13 00:28:35.573004 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 00:28:35.573009 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 00:28:35.573014 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 00:28:35.573019 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 00:28:35.573025 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 13 00:28:35.573030 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 13 00:28:35.573035 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 13 00:28:35.573040 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 13 00:28:35.573047 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 00:28:35.573052 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 00:28:35.573057 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 00:28:35.573062 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 00:28:35.573067 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 00:28:35.573072 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 00:28:35.573077 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 00:28:35.573082 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 00:28:35.573087 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 00:28:35.573092 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 00:28:35.573097 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 00:28:35.573102 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 00:28:35.573107 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 00:28:35.573112 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 00:28:35.573117 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 00:28:35.573122 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 00:28:35.573127 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 00:28:35.573132 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 00:28:35.573137 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 00:28:35.573143 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 00:28:35.573148 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 00:28:35.573153 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 00:28:35.573158 kernel: TSC deadline timer available Feb 13 00:28:35.573163 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 00:28:35.573168 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 13 00:28:35.573173 kernel: Booting paravirtualized kernel on bare hardware Feb 13 00:28:35.573178 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 00:28:35.573184 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 00:28:35.573189 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 00:28:35.573194 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 00:28:35.573199 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 00:28:35.573204 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222327 Feb 13 00:28:35.573209 kernel: Policy zone: Normal Feb 13 00:28:35.573215 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 00:28:35.573220 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 00:28:35.573225 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 00:28:35.573231 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 00:28:35.573236 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 00:28:35.573241 kernel: Memory: 32683728K/33411988K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 00:28:35.573246 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 00:28:35.573252 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 00:28:35.573257 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 00:28:35.573262 kernel: rcu: Hierarchical RCU implementation. Feb 13 00:28:35.573267 kernel: rcu: RCU event tracing is enabled. Feb 13 00:28:35.573272 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 00:28:35.573278 kernel: Rude variant of Tasks RCU enabled. Feb 13 00:28:35.573283 kernel: Tracing variant of Tasks RCU enabled. Feb 13 00:28:35.573288 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 00:28:35.573293 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 00:28:35.573298 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 00:28:35.573303 kernel: random: crng init done Feb 13 00:28:35.573308 kernel: Console: colour dummy device 80x25 Feb 13 00:28:35.573313 kernel: printk: console [tty0] enabled Feb 13 00:28:35.573318 kernel: printk: console [ttyS1] enabled Feb 13 00:28:35.573324 kernel: ACPI: Core revision 20210730 Feb 13 00:28:35.573329 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 13 00:28:35.573334 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 00:28:35.573339 kernel: DMAR: Host address width 39 Feb 13 00:28:35.573344 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 13 00:28:35.573349 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 13 00:28:35.573354 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 00:28:35.573359 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 00:28:35.573364 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 13 00:28:35.573370 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 13 00:28:35.573375 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 13 00:28:35.573380 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 00:28:35.573385 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 00:28:35.573390 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 00:28:35.573395 kernel: x2apic enabled Feb 13 00:28:35.573401 kernel: Switched APIC routing to cluster x2apic. Feb 13 00:28:35.573406 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 13 00:28:35.573411 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 00:28:35.573417 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 00:28:35.573422 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 00:28:35.573427 kernel: process: using mwait in idle threads Feb 13 00:28:35.573432 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 00:28:35.573437 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 00:28:35.573442 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 00:28:35.573447 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 00:28:35.573452 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 00:28:35.573458 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 00:28:35.573463 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 00:28:35.573468 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 00:28:35.573473 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 00:28:35.573478 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 00:28:35.573484 kernel: TAA: Mitigation: TSX disabled Feb 13 00:28:35.573489 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 00:28:35.573494 kernel: SRBDS: Mitigation: Microcode Feb 13 00:28:35.573498 kernel: GDS: Vulnerable: No microcode Feb 13 00:28:35.573504 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 00:28:35.573511 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 00:28:35.573516 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 00:28:35.573521 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 00:28:35.573527 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 00:28:35.573532 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 00:28:35.573537 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 00:28:35.573542 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 00:28:35.573547 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 00:28:35.573553 kernel: Freeing SMP alternatives memory: 32K Feb 13 00:28:35.573558 kernel: pid_max: default: 32768 minimum: 301 Feb 13 00:28:35.573563 kernel: LSM: Security Framework initializing Feb 13 00:28:35.573568 kernel: SELinux: Initializing. Feb 13 00:28:35.573573 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 00:28:35.573578 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 00:28:35.573583 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 00:28:35.573588 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 00:28:35.573593 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 00:28:35.573599 kernel: ... version: 4 Feb 13 00:28:35.573604 kernel: ... bit width: 48 Feb 13 00:28:35.573609 kernel: ... generic registers: 4 Feb 13 00:28:35.573614 kernel: ... value mask: 0000ffffffffffff Feb 13 00:28:35.573619 kernel: ... max period: 00007fffffffffff Feb 13 00:28:35.573624 kernel: ... fixed-purpose events: 3 Feb 13 00:28:35.573629 kernel: ... event mask: 000000070000000f Feb 13 00:28:35.573634 kernel: signal: max sigframe size: 2032 Feb 13 00:28:35.573639 kernel: rcu: Hierarchical SRCU implementation. Feb 13 00:28:35.573645 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 00:28:35.573650 kernel: smp: Bringing up secondary CPUs ... Feb 13 00:28:35.573655 kernel: x86: Booting SMP configuration: Feb 13 00:28:35.573660 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 00:28:35.573665 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 00:28:35.573670 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 00:28:35.573675 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 00:28:35.573680 kernel: smpboot: Max logical packages: 1 Feb 13 00:28:35.573685 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 00:28:35.573691 kernel: devtmpfs: initialized Feb 13 00:28:35.573696 kernel: x86/mm: Memory block size: 128MB Feb 13 00:28:35.573701 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6dfbc000-0x6dfbcfff] (4096 bytes) Feb 13 00:28:35.573706 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79231000-0x79662fff] (4399104 bytes) Feb 13 00:28:35.573711 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 00:28:35.573716 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 00:28:35.573721 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 00:28:35.573726 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 00:28:35.573731 kernel: audit: initializing netlink subsys (disabled) Feb 13 00:28:35.573737 kernel: audit: type=2000 audit(1707784110.120:1): state=initialized audit_enabled=0 res=1 Feb 13 00:28:35.573742 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 00:28:35.573747 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 00:28:35.573752 kernel: cpuidle: using governor menu Feb 13 00:28:35.573757 kernel: ACPI: bus type PCI registered Feb 13 00:28:35.573762 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 00:28:35.573767 kernel: dca service started, version 1.12.1 Feb 13 00:28:35.573772 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 00:28:35.573777 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 00:28:35.573783 kernel: PCI: Using configuration type 1 for base access Feb 13 00:28:35.573788 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 00:28:35.573793 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 00:28:35.573798 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 00:28:35.573803 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 00:28:35.573809 kernel: ACPI: Added _OSI(Module Device) Feb 13 00:28:35.573814 kernel: ACPI: Added _OSI(Processor Device) Feb 13 00:28:35.573819 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 00:28:35.573824 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 00:28:35.573829 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 00:28:35.573834 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 00:28:35.573839 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 00:28:35.573844 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 00:28:35.573849 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:28:35.573854 kernel: ACPI: SSDT 0xFFFF962B40214500 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 00:28:35.573859 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 00:28:35.573864 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:28:35.573869 kernel: ACPI: SSDT 0xFFFF962B41CEA400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 00:28:35.573875 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:28:35.573880 kernel: ACPI: SSDT 0xFFFF962B41C5E000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 00:28:35.573885 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:28:35.573890 kernel: ACPI: SSDT 0xFFFF962B41C5F000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 00:28:35.573895 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:28:35.573900 kernel: ACPI: SSDT 0xFFFF962B4014F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 00:28:35.573905 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:28:35.573910 kernel: ACPI: SSDT 0xFFFF962B41CEE800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 00:28:35.573915 kernel: ACPI: Interpreter enabled Feb 13 00:28:35.573921 kernel: ACPI: PM: (supports S0 S5) Feb 13 00:28:35.573926 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 00:28:35.573931 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 00:28:35.573936 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 00:28:35.573941 kernel: HEST: Table parsing has been initialized. Feb 13 00:28:35.573946 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 00:28:35.573951 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 00:28:35.573956 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 00:28:35.573961 kernel: ACPI: PM: Power Resource [USBC] Feb 13 00:28:35.573967 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 00:28:35.573972 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 00:28:35.573977 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 00:28:35.573982 kernel: ACPI: PM: Power Resource [WRST] Feb 13 00:28:35.573987 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 13 00:28:35.573992 kernel: ACPI: PM: Power Resource [FN00] Feb 13 00:28:35.573997 kernel: ACPI: PM: Power Resource [FN01] Feb 13 00:28:35.574002 kernel: ACPI: PM: Power Resource [FN02] Feb 13 00:28:35.574007 kernel: ACPI: PM: Power Resource [FN03] Feb 13 00:28:35.574012 kernel: ACPI: PM: Power Resource [FN04] Feb 13 00:28:35.574018 kernel: ACPI: PM: Power Resource [PIN] Feb 13 00:28:35.574023 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 00:28:35.574085 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 00:28:35.574129 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 00:28:35.574170 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 00:28:35.574177 kernel: PCI host bridge to bus 0000:00 Feb 13 00:28:35.574220 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 00:28:35.574258 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 00:28:35.574295 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 00:28:35.574331 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 13 00:28:35.574366 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 00:28:35.574401 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 00:28:35.574452 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 00:28:35.574502 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 00:28:35.574549 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.574595 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 13 00:28:35.574637 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.574682 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 13 00:28:35.574725 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 13 00:28:35.574770 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 13 00:28:35.574812 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 13 00:28:35.574855 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 00:28:35.574898 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 13 00:28:35.574942 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 00:28:35.574983 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 13 00:28:35.575027 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 00:28:35.575070 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 13 00:28:35.575111 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 00:28:35.575157 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 00:28:35.575198 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 13 00:28:35.575238 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 13 00:28:35.575281 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 00:28:35.575323 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 00:28:35.575367 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 00:28:35.575409 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 00:28:35.575452 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 00:28:35.575493 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 13 00:28:35.575543 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 00:28:35.575589 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 00:28:35.575631 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 13 00:28:35.575671 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 00:28:35.575715 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 00:28:35.575755 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 13 00:28:35.575797 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 00:28:35.575843 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 00:28:35.575887 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 13 00:28:35.575928 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 13 00:28:35.575969 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 13 00:28:35.576010 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 13 00:28:35.576050 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 13 00:28:35.576091 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 13 00:28:35.576131 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 00:28:35.576179 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 00:28:35.576221 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.576269 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 00:28:35.576313 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.576357 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 00:28:35.576400 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.576445 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 00:28:35.576487 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.576537 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 13 00:28:35.576580 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.576628 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 00:28:35.576670 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 00:28:35.576715 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 00:28:35.576760 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 00:28:35.576801 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 13 00:28:35.576841 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 00:28:35.576888 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 00:28:35.576930 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 00:28:35.576972 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 00:28:35.577018 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 00:28:35.577063 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 00:28:35.577105 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 13 00:28:35.577147 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 13 00:28:35.577191 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 00:28:35.577233 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 00:28:35.577280 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 00:28:35.577322 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 00:28:35.577364 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 13 00:28:35.577407 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 13 00:28:35.577449 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 00:28:35.577493 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 00:28:35.577538 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 00:28:35.577579 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 13 00:28:35.577621 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 00:28:35.577661 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 00:28:35.577711 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 00:28:35.577754 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 13 00:28:35.577798 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 00:28:35.577841 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 13 00:28:35.577882 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.577924 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 00:28:35.577966 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 00:28:35.578007 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 13 00:28:35.578053 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 13 00:28:35.578096 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 13 00:28:35.578140 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 00:28:35.578182 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 13 00:28:35.578224 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 13 00:28:35.578302 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 00:28:35.578365 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 00:28:35.578405 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 13 00:28:35.578447 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 00:28:35.578493 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 00:28:35.578543 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 13 00:28:35.578585 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 00:28:35.578628 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 00:28:35.578668 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 00:28:35.578709 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 00:28:35.578750 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 13 00:28:35.578795 kernel: pci_bus 0000:08: extended config space not accessible Feb 13 00:28:35.578849 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 00:28:35.578894 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 13 00:28:35.578940 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 13 00:28:35.578983 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 00:28:35.579028 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 00:28:35.579072 kernel: pci 0000:08:00.0: supports D1 D2 Feb 13 00:28:35.579117 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 00:28:35.579162 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 00:28:35.579205 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 00:28:35.579247 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 13 00:28:35.579255 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 00:28:35.579261 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 00:28:35.579266 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 00:28:35.579271 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 00:28:35.579277 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 00:28:35.579283 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 00:28:35.579289 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 00:28:35.579294 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 00:28:35.579300 kernel: iommu: Default domain type: Translated Feb 13 00:28:35.579305 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 00:28:35.579349 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 13 00:28:35.579394 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 00:28:35.579439 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 13 00:28:35.579447 kernel: vgaarb: loaded Feb 13 00:28:35.579454 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 00:28:35.579459 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 00:28:35.579465 kernel: PTP clock support registered Feb 13 00:28:35.579470 kernel: PCI: Using ACPI for IRQ routing Feb 13 00:28:35.579476 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 00:28:35.579481 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 00:28:35.579486 kernel: e820: reserve RAM buffer [mem 0x6dfbc000-0x6fffffff] Feb 13 00:28:35.579492 kernel: e820: reserve RAM buffer [mem 0x77fc5000-0x77ffffff] Feb 13 00:28:35.579497 kernel: e820: reserve RAM buffer [mem 0x79231000-0x7bffffff] Feb 13 00:28:35.579503 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 13 00:28:35.579512 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 13 00:28:35.579520 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 13 00:28:35.579526 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 13 00:28:35.579532 kernel: clocksource: Switched to clocksource tsc-early Feb 13 00:28:35.579537 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 00:28:35.579542 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 00:28:35.579548 kernel: pnp: PnP ACPI init Feb 13 00:28:35.579593 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 00:28:35.579640 kernel: pnp 00:02: [dma 0 disabled] Feb 13 00:28:35.579682 kernel: pnp 00:03: [dma 0 disabled] Feb 13 00:28:35.579723 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 00:28:35.579760 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 00:28:35.579801 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 00:28:35.579842 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 00:28:35.579882 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 00:28:35.579919 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 00:28:35.579956 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 00:28:35.579993 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 00:28:35.580029 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 00:28:35.580066 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 00:28:35.580103 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 00:28:35.580145 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 00:28:35.580183 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 00:28:35.580220 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 00:28:35.580257 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 00:28:35.580293 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 00:28:35.580332 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 00:28:35.580368 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 00:28:35.580411 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 00:28:35.580419 kernel: pnp: PnP ACPI: found 10 devices Feb 13 00:28:35.580426 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 00:28:35.580432 kernel: NET: Registered PF_INET protocol family Feb 13 00:28:35.580437 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 00:28:35.580442 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 00:28:35.580448 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 00:28:35.580453 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 00:28:35.580460 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 00:28:35.580465 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 00:28:35.580470 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 00:28:35.580476 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 00:28:35.580481 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 00:28:35.580487 kernel: NET: Registered PF_XDP protocol family Feb 13 00:28:35.580532 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 13 00:28:35.580574 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 13 00:28:35.580618 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 13 00:28:35.580659 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 00:28:35.580703 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 00:28:35.580746 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 00:28:35.580790 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 00:28:35.580835 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 00:28:35.580877 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 00:28:35.580920 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 13 00:28:35.580961 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 00:28:35.581004 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 00:28:35.581045 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 00:28:35.581087 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 00:28:35.581128 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 13 00:28:35.581172 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 00:28:35.581214 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 00:28:35.581254 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 13 00:28:35.581296 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 00:28:35.581339 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 00:28:35.581382 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 00:28:35.581424 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 13 00:28:35.581466 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 00:28:35.581508 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 00:28:35.581553 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 13 00:28:35.581590 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 00:28:35.581627 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 00:28:35.581663 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 00:28:35.581699 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 00:28:35.581735 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 13 00:28:35.581771 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 00:28:35.581812 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 13 00:28:35.581854 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 00:28:35.581896 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 13 00:28:35.581937 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 13 00:28:35.581978 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 13 00:28:35.582017 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 13 00:28:35.582058 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 00:28:35.582098 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 13 00:28:35.582138 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 13 00:28:35.582178 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 13 00:28:35.582185 kernel: PCI: CLS 64 bytes, default 64 Feb 13 00:28:35.582191 kernel: DMAR: No ATSR found Feb 13 00:28:35.582196 kernel: DMAR: No SATC found Feb 13 00:28:35.582202 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 13 00:28:35.582207 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 13 00:28:35.582214 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 13 00:28:35.582219 kernel: DMAR: IOMMU feature pasid inconsistent Feb 13 00:28:35.582225 kernel: DMAR: IOMMU feature eafs inconsistent Feb 13 00:28:35.582230 kernel: DMAR: IOMMU feature prs inconsistent Feb 13 00:28:35.582235 kernel: DMAR: IOMMU feature nest inconsistent Feb 13 00:28:35.582241 kernel: DMAR: IOMMU feature mts inconsistent Feb 13 00:28:35.582246 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 13 00:28:35.582252 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 13 00:28:35.582257 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 00:28:35.582263 kernel: DMAR: dmar1: Using Queued invalidation Feb 13 00:28:35.582305 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 00:28:35.582348 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 00:28:35.582390 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 13 00:28:35.582431 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 13 00:28:35.582472 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 13 00:28:35.582515 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 13 00:28:35.582557 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 13 00:28:35.582600 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 13 00:28:35.582641 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 13 00:28:35.582681 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 13 00:28:35.582722 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 13 00:28:35.582763 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 13 00:28:35.582804 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 13 00:28:35.582845 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 13 00:28:35.582887 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 13 00:28:35.582927 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 13 00:28:35.582971 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 13 00:28:35.583011 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 13 00:28:35.583053 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 13 00:28:35.583093 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 13 00:28:35.583135 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 13 00:28:35.583175 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 13 00:28:35.583216 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 13 00:28:35.583259 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 13 00:28:35.583302 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 13 00:28:35.583346 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 00:28:35.583388 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 13 00:28:35.583431 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 13 00:28:35.583476 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 13 00:28:35.583484 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 00:28:35.583489 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 00:28:35.583496 kernel: software IO TLB: mapped [mem 0x0000000073fc5000-0x0000000077fc5000] (64MB) Feb 13 00:28:35.583502 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 13 00:28:35.583510 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 00:28:35.583516 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 00:28:35.583521 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 00:28:35.583527 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 13 00:28:35.583576 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 00:28:35.583584 kernel: Initialise system trusted keyrings Feb 13 00:28:35.583591 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 00:28:35.583597 kernel: Key type asymmetric registered Feb 13 00:28:35.583602 kernel: Asymmetric key parser 'x509' registered Feb 13 00:28:35.583607 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 00:28:35.583613 kernel: io scheduler mq-deadline registered Feb 13 00:28:35.583618 kernel: io scheduler kyber registered Feb 13 00:28:35.583623 kernel: io scheduler bfq registered Feb 13 00:28:35.583663 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 13 00:28:35.583705 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 13 00:28:35.583748 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 13 00:28:35.583791 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 13 00:28:35.583831 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 13 00:28:35.583871 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 13 00:28:35.583913 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 13 00:28:35.583959 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 00:28:35.583967 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 00:28:35.583974 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 00:28:35.583979 kernel: pstore: Registered erst as persistent store backend Feb 13 00:28:35.583985 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 00:28:35.583990 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 00:28:35.583996 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 00:28:35.584001 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 00:28:35.584043 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 00:28:35.584051 kernel: i8042: PNP: No PS/2 controller found. Feb 13 00:28:35.584089 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 00:28:35.584128 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 00:28:35.584165 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T00:28:34 UTC (1707784114) Feb 13 00:28:35.584202 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 00:28:35.584210 kernel: fail to initialize ptp_kvm Feb 13 00:28:35.584215 kernel: intel_pstate: Intel P-state driver initializing Feb 13 00:28:35.584221 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 00:28:35.584226 kernel: intel_pstate: HWP enabled Feb 13 00:28:35.584231 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 00:28:35.584238 kernel: vesafb: scrolling: redraw Feb 13 00:28:35.584244 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 00:28:35.584249 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x0000000099299846, using 768k, total 768k Feb 13 00:28:35.584255 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 00:28:35.584260 kernel: fb0: VESA VGA frame buffer device Feb 13 00:28:35.584265 kernel: NET: Registered PF_INET6 protocol family Feb 13 00:28:35.584271 kernel: Segment Routing with IPv6 Feb 13 00:28:35.584277 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 00:28:35.584282 kernel: NET: Registered PF_PACKET protocol family Feb 13 00:28:35.584288 kernel: Key type dns_resolver registered Feb 13 00:28:35.584293 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 00:28:35.584299 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 00:28:35.584304 kernel: IPI shorthand broadcast: enabled Feb 13 00:28:35.584310 kernel: sched_clock: Marking stable (1848454695, 1355328629)->(4626945859, -1423162535) Feb 13 00:28:35.584315 kernel: registered taskstats version 1 Feb 13 00:28:35.584321 kernel: Loading compiled-in X.509 certificates Feb 13 00:28:35.584326 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 00:28:35.584332 kernel: Key type .fscrypt registered Feb 13 00:28:35.584338 kernel: Key type fscrypt-provisioning registered Feb 13 00:28:35.584343 kernel: pstore: Using crash dump compression: deflate Feb 13 00:28:35.584349 kernel: ima: Allocated hash algorithm: sha1 Feb 13 00:28:35.584354 kernel: ima: No architecture policies found Feb 13 00:28:35.584359 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 00:28:35.584365 kernel: Write protecting the kernel read-only data: 28672k Feb 13 00:28:35.584370 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 00:28:35.584376 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 00:28:35.584382 kernel: Run /init as init process Feb 13 00:28:35.584387 kernel: with arguments: Feb 13 00:28:35.584393 kernel: /init Feb 13 00:28:35.584398 kernel: with environment: Feb 13 00:28:35.584403 kernel: HOME=/ Feb 13 00:28:35.584408 kernel: TERM=linux Feb 13 00:28:35.584414 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 00:28:35.584420 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 00:28:35.584428 systemd[1]: Detected architecture x86-64. Feb 13 00:28:35.584434 systemd[1]: Running in initrd. Feb 13 00:28:35.584440 systemd[1]: No hostname configured, using default hostname. Feb 13 00:28:35.584445 systemd[1]: Hostname set to . Feb 13 00:28:35.584451 systemd[1]: Initializing machine ID from random generator. Feb 13 00:28:35.584457 systemd[1]: Queued start job for default target initrd.target. Feb 13 00:28:35.584462 systemd[1]: Started systemd-ask-password-console.path. Feb 13 00:28:35.584468 systemd[1]: Reached target cryptsetup.target. Feb 13 00:28:35.584474 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 13 00:28:35.584480 systemd[1]: Reached target paths.target. Feb 13 00:28:35.584486 systemd[1]: Reached target slices.target. Feb 13 00:28:35.584491 systemd[1]: Reached target swap.target. Feb 13 00:28:35.584497 systemd[1]: Reached target timers.target. Feb 13 00:28:35.584503 systemd[1]: Listening on iscsid.socket. Feb 13 00:28:35.584510 systemd[1]: Listening on iscsiuio.socket. Feb 13 00:28:35.584516 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 00:28:35.584523 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 00:28:35.584528 systemd[1]: Listening on systemd-journald.socket. Feb 13 00:28:35.584534 kernel: tsc: Refined TSC clocksource calibration: 3408.089 MHz Feb 13 00:28:35.584539 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 00:28:35.584545 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x312028a4a72, max_idle_ns: 440795370714 ns Feb 13 00:28:35.584551 kernel: clocksource: Switched to clocksource tsc Feb 13 00:28:35.584556 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 00:28:35.584562 systemd[1]: Reached target sockets.target. Feb 13 00:28:35.584568 systemd[1]: Starting iscsiuio.service... Feb 13 00:28:35.584574 systemd[1]: Starting kmod-static-nodes.service... Feb 13 00:28:35.584580 kernel: SCSI subsystem initialized Feb 13 00:28:35.584585 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 00:28:35.584591 kernel: Loading iSCSI transport class v2.0-870. Feb 13 00:28:35.584596 systemd[1]: Starting systemd-journald.service... Feb 13 00:28:35.584602 systemd[1]: Starting systemd-modules-load.service... Feb 13 00:28:35.584610 systemd-journald[268]: Journal started Feb 13 00:28:35.584637 systemd-journald[268]: Runtime Journal (/run/log/journal/2e89e1baa37848e990ff027d54981902) is 8.0M, max 639.3M, 631.3M free. Feb 13 00:28:35.587029 systemd-modules-load[269]: Inserted module 'overlay' Feb 13 00:28:35.611511 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 00:28:35.644511 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 00:28:35.644529 systemd[1]: Started iscsiuio.service. Feb 13 00:28:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.670573 kernel: Bridge firewalling registered Feb 13 00:28:35.670609 kernel: audit: type=1130 audit(1707784115.668:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.670627 systemd[1]: Started systemd-journald.service. Feb 13 00:28:35.729208 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 13 00:28:35.772024 kernel: audit: type=1130 audit(1707784115.727:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.729428 systemd[1]: Finished kmod-static-nodes.service. Feb 13 00:28:35.887051 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 00:28:35.887139 kernel: audit: type=1130 audit(1707784115.792:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.887148 kernel: device-mapper: uevent: version 1.0.3 Feb 13 00:28:35.887155 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 00:28:35.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.794671 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 00:28:35.938882 kernel: audit: type=1130 audit(1707784115.894:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.889210 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 13 00:28:35.993148 kernel: audit: type=1130 audit(1707784115.946:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.895769 systemd[1]: Finished systemd-modules-load.service. Feb 13 00:28:36.047815 kernel: audit: type=1130 audit(1707784116.000:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:35.947805 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 00:28:36.002067 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 00:28:36.048131 systemd[1]: Starting systemd-sysctl.service... Feb 13 00:28:36.048424 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 00:28:36.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.051212 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 00:28:36.100620 kernel: audit: type=1130 audit(1707784116.049:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.051591 systemd[1]: Finished systemd-sysctl.service. Feb 13 00:28:36.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.114858 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 00:28:36.220466 kernel: audit: type=1130 audit(1707784116.113:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.220480 kernel: audit: type=1130 audit(1707784116.169:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.171092 systemd[1]: Starting dracut-cmdline.service... Feb 13 00:28:36.251609 kernel: iscsi: registered transport (tcp) Feb 13 00:28:36.251620 dracut-cmdline[291]: dracut-dracut-053 Feb 13 00:28:36.251620 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 00:28:36.251620 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 00:28:36.324790 kernel: iscsi: registered transport (qla4xxx) Feb 13 00:28:36.324803 kernel: QLogic iSCSI HBA Driver Feb 13 00:28:36.312625 systemd[1]: Finished dracut-cmdline.service. Feb 13 00:28:36.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.351353 systemd[1]: Starting dracut-pre-udev.service... Feb 13 00:28:36.365947 systemd[1]: Starting iscsid.service... Feb 13 00:28:36.380700 systemd[1]: Started iscsid.service. Feb 13 00:28:36.418642 kernel: raid6: avx2x4 gen() 40334 MB/s Feb 13 00:28:36.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.418721 iscsid[451]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 00:28:36.418721 iscsid[451]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 00:28:36.418721 iscsid[451]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 00:28:36.418721 iscsid[451]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 00:28:36.418721 iscsid[451]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 00:28:36.418721 iscsid[451]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 00:28:36.418721 iscsid[451]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 00:28:36.585627 kernel: raid6: avx2x4 xor() 21574 MB/s Feb 13 00:28:36.585638 kernel: raid6: avx2x2 gen() 53838 MB/s Feb 13 00:28:36.585645 kernel: raid6: avx2x2 xor() 32121 MB/s Feb 13 00:28:36.585652 kernel: raid6: avx2x1 gen() 45279 MB/s Feb 13 00:28:36.585661 kernel: raid6: avx2x1 xor() 27893 MB/s Feb 13 00:28:36.627590 kernel: raid6: sse2x4 gen() 21369 MB/s Feb 13 00:28:36.662590 kernel: raid6: sse2x4 xor() 11981 MB/s Feb 13 00:28:36.697590 kernel: raid6: sse2x2 gen() 21685 MB/s Feb 13 00:28:36.732584 kernel: raid6: sse2x2 xor() 13451 MB/s Feb 13 00:28:36.765542 kernel: raid6: sse2x1 gen() 18304 MB/s Feb 13 00:28:36.818246 kernel: raid6: sse2x1 xor() 8932 MB/s Feb 13 00:28:36.818262 kernel: raid6: using algorithm avx2x2 gen() 53838 MB/s Feb 13 00:28:36.818270 kernel: raid6: .... xor() 32121 MB/s, rmw enabled Feb 13 00:28:36.836697 kernel: raid6: using avx2x2 recovery algorithm Feb 13 00:28:36.883553 kernel: xor: automatically using best checksumming function avx Feb 13 00:28:36.962517 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 00:28:36.967450 systemd[1]: Finished dracut-pre-udev.service. Feb 13 00:28:36.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.975000 audit: BPF prog-id=6 op=LOAD Feb 13 00:28:36.975000 audit: BPF prog-id=7 op=LOAD Feb 13 00:28:36.977401 systemd[1]: Starting systemd-udevd.service... Feb 13 00:28:36.984993 systemd-udevd[469]: Using default interface naming scheme 'v252'. Feb 13 00:28:37.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:36.991773 systemd[1]: Started systemd-udevd.service. Feb 13 00:28:37.032579 dracut-pre-trigger[480]: rd.md=0: removing MD RAID activation Feb 13 00:28:37.009131 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 00:28:37.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:37.037440 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 00:28:37.049751 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 00:28:37.130170 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 00:28:37.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:37.130677 systemd[1]: Starting dracut-initqueue.service... Feb 13 00:28:37.158544 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 00:28:37.160518 kernel: libata version 3.00 loaded. Feb 13 00:28:37.160540 kernel: ACPI: bus type USB registered Feb 13 00:28:37.196162 kernel: usbcore: registered new interface driver usbfs Feb 13 00:28:37.196192 kernel: usbcore: registered new interface driver hub Feb 13 00:28:37.232243 kernel: usbcore: registered new device driver usb Feb 13 00:28:37.239533 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 00:28:37.257541 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 00:28:37.257572 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 13 00:28:37.257650 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 13 00:28:37.295781 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 00:28:37.295853 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 00:28:37.338542 kernel: AES CTR mode by8 optimization enabled Feb 13 00:28:37.354512 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 00:28:37.385312 kernel: scsi host0: ahci Feb 13 00:28:37.385406 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 00:28:37.401923 kernel: scsi host1: ahci Feb 13 00:28:37.442521 kernel: scsi host2: ahci Feb 13 00:28:37.443020 kernel: scsi host3: ahci Feb 13 00:28:37.485349 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 00:28:37.485440 kernel: pps pps0: new PPS source ptp0 Feb 13 00:28:37.485530 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 13 00:28:37.485617 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 00:28:37.485699 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:2c Feb 13 00:28:37.485779 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 13 00:28:37.485860 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 00:28:37.485941 kernel: scsi host4: ahci Feb 13 00:28:37.485963 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 00:28:37.516958 kernel: scsi host5: ahci Feb 13 00:28:37.523553 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 00:28:37.523626 kernel: pps pps1: new PPS source ptp1 Feb 13 00:28:37.523697 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 13 00:28:37.523779 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 00:28:37.523833 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:2d Feb 13 00:28:37.523882 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 13 00:28:37.523932 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 00:28:37.547514 kernel: scsi host6: ahci Feb 13 00:28:37.547538 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 00:28:37.547601 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 13 00:28:37.571757 kernel: scsi host7: ahci Feb 13 00:28:37.571781 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 00:28:37.571845 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 00:28:37.576514 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 00:28:37.598435 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 129 Feb 13 00:28:37.609936 kernel: hub 1-0:1.0: USB hub found Feb 13 00:28:37.610018 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 129 Feb 13 00:28:37.636441 kernel: hub 1-0:1.0: 16 ports detected Feb 13 00:28:37.636520 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 129 Feb 13 00:28:37.679889 kernel: hub 2-0:1.0: USB hub found Feb 13 00:28:37.679969 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 129 Feb 13 00:28:37.690839 kernel: hub 2-0:1.0: 10 ports detected Feb 13 00:28:37.690918 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 129 Feb 13 00:28:37.717599 kernel: usb: port power management may be unreliable Feb 13 00:28:37.717615 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 129 Feb 13 00:28:37.919592 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 00:28:37.919619 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 129 Feb 13 00:28:38.012902 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 129 Feb 13 00:28:38.036718 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 13 00:28:38.079159 kernel: hub 1-14:1.0: USB hub found Feb 13 00:28:38.079241 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 00:28:38.079299 kernel: hub 1-14:1.0: 4 ports detected Feb 13 00:28:38.329544 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 00:28:38.329683 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 00:28:38.347546 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 13 00:28:38.347622 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 00:28:38.380381 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 00:28:38.380453 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 00:28:38.389552 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 00:28:38.436512 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 00:28:38.455548 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 13 00:28:38.472546 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 00:28:38.489549 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 00:28:38.506540 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 00:28:38.525548 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 00:28:38.542511 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 00:28:38.542527 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 00:28:38.559551 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 00:28:38.608685 kernel: ata1.00: Features: NCQ-prio Feb 13 00:28:38.643929 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 00:28:38.643946 kernel: ata2.00: Features: NCQ-prio Feb 13 00:28:38.661562 kernel: ata1.00: configured for UDMA/133 Feb 13 00:28:38.679557 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 00:28:38.679585 kernel: ata2.00: configured for UDMA/133 Feb 13 00:28:38.679595 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 00:28:38.697580 kernel: port_module: 9 callbacks suppressed Feb 13 00:28:38.697612 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 13 00:28:38.697679 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 00:28:38.733522 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 00:28:38.826457 kernel: usbcore: registered new interface driver usbhid Feb 13 00:28:38.826501 kernel: usbhid: USB HID core driver Feb 13 00:28:38.863513 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 00:28:38.863529 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 00:28:38.879978 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:28:38.915513 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 00:28:38.915598 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 00:28:38.915658 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 00:28:38.915723 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 00:28:38.915733 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 00:28:38.915800 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 13 00:28:38.934247 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 13 00:28:38.969143 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 13 00:28:38.971577 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 00:28:39.040820 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 13 00:28:39.040895 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 00:28:39.058358 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 00:28:39.092813 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 00:28:39.092892 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 00:28:39.191324 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 00:28:39.207969 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 00:28:39.207982 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:28:39.224256 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 13 00:28:39.240540 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 00:28:39.272943 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:28:39.272954 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 13 00:28:39.308514 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth0 Feb 13 00:28:39.322227 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 00:28:39.360610 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth1 Feb 13 00:28:39.360723 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sdb6 scanned by (udev-worker) (516) Feb 13 00:28:39.360561 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 00:28:39.378940 systemd[1]: Finished dracut-initqueue.service. Feb 13 00:28:39.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.394743 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 00:28:39.454604 kernel: audit: type=1130 audit(1707784119.390:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.452591 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 00:28:39.463984 systemd[1]: Reached target initrd-root-device.target. Feb 13 00:28:39.486718 systemd[1]: Reached target remote-fs-pre.target. Feb 13 00:28:39.494710 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 00:28:39.508730 systemd[1]: Reached target remote-fs.target. Feb 13 00:28:39.526344 systemd[1]: Starting disk-uuid.service... Feb 13 00:28:39.541176 systemd[1]: Starting dracut-pre-mount.service... Feb 13 00:28:39.555177 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 00:28:39.667377 kernel: audit: type=1130 audit(1707784119.568:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.667394 kernel: audit: type=1131 audit(1707784119.568:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.555370 systemd[1]: Finished disk-uuid.service. Feb 13 00:28:39.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.722527 kernel: audit: type=1130 audit(1707784119.674:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.570288 systemd[1]: Finished dracut-pre-mount.service. Feb 13 00:28:39.675806 systemd[1]: Reached target local-fs-pre.target. Feb 13 00:28:39.730730 systemd[1]: Reached target local-fs.target. Feb 13 00:28:39.739732 systemd[1]: Reached target sysinit.target. Feb 13 00:28:39.748725 systemd[1]: Reached target basic.target. Feb 13 00:28:39.749099 systemd[1]: Starting systemd-fsck-root.service... Feb 13 00:28:39.762332 systemd[1]: Starting verity-setup.service... Feb 13 00:28:39.773898 systemd-fsck[711]: ROOT: clean, 624/553520 files, 56032/553472 blocks Feb 13 00:28:39.837714 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 00:28:39.827027 systemd[1]: Finished systemd-fsck-root.service. Feb 13 00:28:39.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.848458 systemd[1]: Found device dev-mapper-usr.device. Feb 13 00:28:39.912715 kernel: audit: type=1130 audit(1707784119.845:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.904804 systemd[1]: Finished verity-setup.service. Feb 13 00:28:39.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.922131 systemd[1]: Mounting sysroot.mount... Feb 13 00:28:39.984625 kernel: audit: type=1130 audit(1707784119.920:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:39.977915 systemd[1]: Mounting sysusr-usr.mount... Feb 13 00:28:40.030322 systemd[1]: Mounted sysroot.mount. Feb 13 00:28:40.068766 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 00:28:40.068782 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 00:28:40.062167 systemd[1]: Mounted sysusr-usr.mount. Feb 13 00:28:40.076787 systemd[1]: Reached target initrd-root-fs.target. Feb 13 00:28:40.084663 systemd[1]: Mounting sysroot-usr.mount... Feb 13 00:28:40.098425 systemd[1]: Mounted sysroot-usr.mount. Feb 13 00:28:40.111713 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 00:28:40.219804 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 00:28:40.219820 kernel: BTRFS info (device sdb6): using free space tree Feb 13 00:28:40.219827 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 00:28:40.219834 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 00:28:40.136467 systemd[1]: Starting initrd-setup-root.service... Feb 13 00:28:40.228838 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 00:28:40.246795 systemd[1]: Finished initrd-setup-root.service. Feb 13 00:28:40.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.263363 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 00:28:40.329743 kernel: audit: type=1130 audit(1707784120.261:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.319830 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 00:28:40.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.390819 initrd-setup-root-after-ignition[805]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 00:28:40.413768 kernel: audit: type=1130 audit(1707784120.338:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.339806 systemd[1]: Reached target ignition-subsequent.target. Feb 13 00:28:40.400034 systemd[1]: Starting initrd-parse-etc.service... Feb 13 00:28:40.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.487556 kernel: audit: type=1130 audit(1707784120.435:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.426584 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 00:28:40.426634 systemd[1]: Finished initrd-parse-etc.service. Feb 13 00:28:40.436773 systemd[1]: Reached target initrd-fs.target. Feb 13 00:28:40.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.495744 systemd[1]: Reached target initrd.target. Feb 13 00:28:40.495801 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 00:28:40.496145 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 00:28:40.516860 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 00:28:40.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.533358 systemd[1]: Starting initrd-cleanup.service... Feb 13 00:28:40.550185 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 00:28:40.561807 systemd[1]: Stopped target timers.target. Feb 13 00:28:40.579899 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 00:28:40.580131 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 00:28:40.597331 systemd[1]: Stopped target initrd.target. Feb 13 00:28:40.611056 systemd[1]: Stopped target basic.target. Feb 13 00:28:40.626222 systemd[1]: Stopped target ignition-subsequent.target. Feb 13 00:28:40.643082 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 13 00:28:40.660063 systemd[1]: Stopped target initrd-root-device.target. Feb 13 00:28:40.678054 systemd[1]: Stopped target paths.target. Feb 13 00:28:40.692199 systemd[1]: Stopped target remote-fs.target. Feb 13 00:28:40.708044 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 00:28:40.724190 systemd[1]: Stopped target slices.target. Feb 13 00:28:40.740182 systemd[1]: Stopped target sockets.target. Feb 13 00:28:40.758053 systemd[1]: Stopped target sysinit.target. Feb 13 00:28:40.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.776068 systemd[1]: Stopped target local-fs.target. Feb 13 00:28:40.791065 systemd[1]: Stopped target local-fs-pre.target. Feb 13 00:28:40.806063 systemd[1]: Stopped target swap.target. Feb 13 00:28:40.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.822024 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 00:28:40.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.822258 systemd[1]: Closed iscsid.socket. Feb 13 00:28:40.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.836076 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 00:28:40.836392 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 00:28:40.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.851268 systemd[1]: Stopped target cryptsetup.target. Feb 13 00:28:40.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.867071 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 00:28:40.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.870880 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 00:28:41.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.881919 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 00:28:41.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.882247 systemd[1]: Stopped dracut-initqueue.service. Feb 13 00:28:40.898164 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 00:28:40.898491 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 00:28:41.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.915142 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 00:28:41.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.915450 systemd[1]: Stopped initrd-setup-root.service. Feb 13 00:28:40.933481 systemd[1]: Stopping iscsiuio.service... Feb 13 00:28:40.946709 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 00:28:40.947048 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 00:28:41.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.964265 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 00:28:41.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.964597 systemd[1]: Stopped systemd-sysctl.service. Feb 13 00:28:41.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.980229 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 00:28:40.980565 systemd[1]: Stopped systemd-modules-load.service. Feb 13 00:28:41.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.996238 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 00:28:41.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:41.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:40.996566 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 00:28:41.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:41.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:41.014273 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 00:28:41.014604 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 00:28:41.030495 systemd[1]: Stopping systemd-udevd.service... Feb 13 00:28:41.039321 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 00:28:41.039658 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 00:28:41.039701 systemd[1]: Stopped iscsiuio.service. Feb 13 00:28:41.067153 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 00:28:41.067244 systemd[1]: Stopped systemd-udevd.service. Feb 13 00:28:41.358352 iscsid[451]: iscsid shutting down. Feb 13 00:28:41.085123 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 00:28:41.085201 systemd[1]: Closed iscsiuio.socket. Feb 13 00:28:41.100799 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 00:28:41.100893 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 00:28:41.117003 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 00:28:41.117104 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 00:28:41.358517 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 13 00:28:41.131932 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 00:28:41.132073 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 00:28:41.151019 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 00:28:41.151153 systemd[1]: Stopped dracut-cmdline.service. Feb 13 00:28:41.165984 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 00:28:41.166120 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 00:28:41.184680 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 00:28:41.197693 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 00:28:41.197921 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 00:28:41.216725 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 00:28:41.216921 systemd[1]: Finished initrd-cleanup.service. Feb 13 00:28:41.232591 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 00:28:41.232798 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 00:28:41.251911 systemd[1]: Reached target initrd-switch-root.target. Feb 13 00:28:41.267388 systemd[1]: Starting initrd-switch-root.service... Feb 13 00:28:41.303041 systemd[1]: Switching root. Feb 13 00:28:41.358824 systemd-journald[268]: Journal stopped Feb 13 00:28:45.412018 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 00:28:45.412032 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 00:28:45.412039 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 00:28:45.412044 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 00:28:45.412049 kernel: SELinux: policy capability open_perms=1 Feb 13 00:28:45.412054 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 00:28:45.412060 kernel: SELinux: policy capability always_check_network=0 Feb 13 00:28:45.412066 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 00:28:45.412072 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 00:28:45.412077 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 00:28:45.412082 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 00:28:45.412087 systemd[1]: Successfully loaded SELinux policy in 262.549ms. Feb 13 00:28:45.412094 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.976ms. Feb 13 00:28:45.412100 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 00:28:45.412108 systemd[1]: Detected architecture x86-64. Feb 13 00:28:45.412114 systemd[1]: Detected first boot. Feb 13 00:28:45.412120 systemd[1]: Hostname set to . Feb 13 00:28:45.412126 systemd[1]: Initializing machine ID from random generator. Feb 13 00:28:45.412132 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 00:28:45.412138 systemd[1]: Populated /etc with preset unit settings. Feb 13 00:28:45.412144 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 00:28:45.412151 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 00:28:45.412157 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 00:28:45.412163 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 00:28:45.412169 systemd[1]: Stopped iscsid.service. Feb 13 00:28:45.412175 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 00:28:45.412182 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 13 00:28:45.412188 kernel: audit: type=1334 audit(1707784123.701:74): prog-id=13 op=UNLOAD Feb 13 00:28:45.412194 systemd[1]: Stopped initrd-switch-root.service. Feb 13 00:28:45.412200 kernel: audit: type=1130 audit(1707784123.771:75): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.412205 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 00:28:45.412211 kernel: audit: type=1131 audit(1707784123.771:76): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.412218 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 00:28:45.412224 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 00:28:45.412230 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 00:28:45.412236 systemd[1]: Created slice system-getty.slice. Feb 13 00:28:45.412242 systemd[1]: Created slice system-modprobe.slice. Feb 13 00:28:45.412247 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 00:28:45.412253 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 00:28:45.412259 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 00:28:45.412267 systemd[1]: Created slice user.slice. Feb 13 00:28:45.412275 systemd[1]: Started systemd-ask-password-console.path. Feb 13 00:28:45.412281 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 00:28:45.412287 systemd[1]: Set up automount boot.automount. Feb 13 00:28:45.412293 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 00:28:45.412299 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 00:28:45.412306 systemd[1]: Stopped target initrd-fs.target. Feb 13 00:28:45.412312 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 00:28:45.412318 systemd[1]: Reached target integritysetup.target. Feb 13 00:28:45.412325 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 00:28:45.412331 systemd[1]: Reached target remote-fs.target. Feb 13 00:28:45.412337 systemd[1]: Reached target slices.target. Feb 13 00:28:45.412343 systemd[1]: Reached target swap.target. Feb 13 00:28:45.412349 systemd[1]: Reached target torcx.target. Feb 13 00:28:45.412355 systemd[1]: Reached target veritysetup.target. Feb 13 00:28:45.412361 systemd[1]: Listening on systemd-coredump.socket. Feb 13 00:28:45.412369 systemd[1]: Listening on systemd-initctl.socket. Feb 13 00:28:45.412375 systemd[1]: Listening on systemd-networkd.socket. Feb 13 00:28:45.412381 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 00:28:45.412388 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 00:28:45.412394 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 00:28:45.412400 systemd[1]: Mounting dev-hugepages.mount... Feb 13 00:28:45.412406 systemd[1]: Mounting dev-mqueue.mount... Feb 13 00:28:45.412413 systemd[1]: Mounting media.mount... Feb 13 00:28:45.412420 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 00:28:45.412426 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 00:28:45.412432 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 00:28:45.412439 systemd[1]: Mounting tmp.mount... Feb 13 00:28:45.412445 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 00:28:45.412451 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 00:28:45.412458 systemd[1]: Starting kmod-static-nodes.service... Feb 13 00:28:45.412465 systemd[1]: Starting modprobe@configfs.service... Feb 13 00:28:45.412471 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 00:28:45.412477 systemd[1]: Starting modprobe@drm.service... Feb 13 00:28:45.412483 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 00:28:45.412490 systemd[1]: Starting modprobe@fuse.service... Feb 13 00:28:45.412496 kernel: fuse: init (API version 7.34) Feb 13 00:28:45.412502 systemd[1]: Starting modprobe@loop.service... Feb 13 00:28:45.412510 kernel: loop: module loaded Feb 13 00:28:45.412516 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 00:28:45.412523 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 00:28:45.412554 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 00:28:45.412561 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 00:28:45.412567 kernel: audit: type=1131 audit(1707784125.102:77): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.412588 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 00:28:45.412595 kernel: audit: type=1131 audit(1707784125.177:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.412601 systemd[1]: Stopped systemd-journald.service. Feb 13 00:28:45.412607 kernel: audit: type=1130 audit(1707784125.241:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.412614 kernel: audit: type=1131 audit(1707784125.241:80): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.412620 kernel: audit: type=1334 audit(1707784125.326:81): prog-id=16 op=LOAD Feb 13 00:28:45.412625 kernel: audit: type=1334 audit(1707784125.344:82): prog-id=17 op=LOAD Feb 13 00:28:45.412631 kernel: audit: type=1334 audit(1707784125.362:83): prog-id=18 op=LOAD Feb 13 00:28:45.412637 systemd[1]: Starting systemd-journald.service... Feb 13 00:28:45.412643 systemd[1]: Starting systemd-modules-load.service... Feb 13 00:28:45.412651 systemd-journald[945]: Journal started Feb 13 00:28:45.412676 systemd-journald[945]: Runtime Journal (/run/log/journal/8533586b68aa4e31ba49a0043695c5f0) is 8.0M, max 639.3M, 631.3M free. Feb 13 00:28:41.759000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 00:28:42.026000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 00:28:42.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 00:28:42.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 00:28:42.028000 audit: BPF prog-id=8 op=LOAD Feb 13 00:28:42.028000 audit: BPF prog-id=8 op=UNLOAD Feb 13 00:28:42.028000 audit: BPF prog-id=9 op=LOAD Feb 13 00:28:42.028000 audit: BPF prog-id=9 op=UNLOAD Feb 13 00:28:42.095000 audit[838]: AVC avc: denied { associate } for pid=838 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 00:28:42.095000 audit[838]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=820 pid=838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:28:42.095000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 00:28:42.120000 audit[838]: AVC avc: denied { associate } for pid=838 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 00:28:42.120000 audit[838]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b5 a2=1ed a3=0 items=2 ppid=820 pid=838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:28:42.120000 audit: CWD cwd="/" Feb 13 00:28:42.120000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:42.120000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:42.120000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 00:28:43.629000 audit: BPF prog-id=10 op=LOAD Feb 13 00:28:43.629000 audit: BPF prog-id=3 op=UNLOAD Feb 13 00:28:43.629000 audit: BPF prog-id=11 op=LOAD Feb 13 00:28:43.629000 audit: BPF prog-id=12 op=LOAD Feb 13 00:28:43.629000 audit: BPF prog-id=4 op=UNLOAD Feb 13 00:28:43.630000 audit: BPF prog-id=5 op=UNLOAD Feb 13 00:28:43.630000 audit: BPF prog-id=13 op=LOAD Feb 13 00:28:43.630000 audit: BPF prog-id=10 op=UNLOAD Feb 13 00:28:43.630000 audit: BPF prog-id=14 op=LOAD Feb 13 00:28:43.631000 audit: BPF prog-id=15 op=LOAD Feb 13 00:28:43.631000 audit: BPF prog-id=11 op=UNLOAD Feb 13 00:28:43.631000 audit: BPF prog-id=12 op=UNLOAD Feb 13 00:28:43.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:43.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:43.701000 audit: BPF prog-id=13 op=UNLOAD Feb 13 00:28:43.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:43.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.326000 audit: BPF prog-id=16 op=LOAD Feb 13 00:28:45.344000 audit: BPF prog-id=17 op=LOAD Feb 13 00:28:45.362000 audit: BPF prog-id=18 op=LOAD Feb 13 00:28:45.380000 audit: BPF prog-id=14 op=UNLOAD Feb 13 00:28:45.380000 audit: BPF prog-id=15 op=UNLOAD Feb 13 00:28:45.408000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 00:28:45.408000 audit[945]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd98bb3260 a2=4000 a3=7ffd98bb32fc items=0 ppid=1 pid=945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:28:45.408000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 00:28:42.094349 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 00:28:43.629444 systemd[1]: Queued start job for default target multi-user.target. Feb 13 00:28:42.094812 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 00:28:43.629451 systemd[1]: Unnecessary job was removed for dev-sdb6.device. Feb 13 00:28:42.094827 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 00:28:43.633000 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 00:28:42.094849 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 00:28:42.094856 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 00:28:42.094878 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 00:28:42.094887 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 00:28:42.095014 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 00:28:42.095039 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 00:28:42.095048 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 00:28:42.095538 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 00:28:42.095560 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 00:28:42.095572 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 00:28:42.095581 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 00:28:42.095592 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 00:28:42.095600 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 00:28:43.284354 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:43Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:28:43.284495 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:43Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:28:43.284560 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:43Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:28:43.284657 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:43Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:28:43.284687 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:43Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 00:28:43.284721 /usr/lib/systemd/system-generators/torcx-generator[838]: time="2024-02-13T00:28:43Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 00:28:45.451727 systemd[1]: Starting systemd-network-generator.service... Feb 13 00:28:45.478561 systemd[1]: Starting systemd-remount-fs.service... Feb 13 00:28:45.503561 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 00:28:45.544807 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 00:28:45.544830 systemd[1]: Stopped verity-setup.service. Feb 13 00:28:45.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.587560 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 00:28:45.605556 systemd[1]: Started systemd-journald.service. Feb 13 00:28:45.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.614032 systemd[1]: Mounted dev-hugepages.mount. Feb 13 00:28:45.621770 systemd[1]: Mounted dev-mqueue.mount. Feb 13 00:28:45.628756 systemd[1]: Mounted media.mount. Feb 13 00:28:45.635767 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 00:28:45.644748 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 00:28:45.652768 systemd[1]: Mounted tmp.mount. Feb 13 00:28:45.659828 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 00:28:45.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.668846 systemd[1]: Finished kmod-static-nodes.service. Feb 13 00:28:45.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.677891 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 00:28:45.678012 systemd[1]: Finished modprobe@configfs.service. Feb 13 00:28:45.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.686992 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 00:28:45.687127 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 00:28:45.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.696045 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 00:28:45.696237 systemd[1]: Finished modprobe@drm.service. Feb 13 00:28:45.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.705341 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 00:28:45.705666 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 00:28:45.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.714348 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 00:28:45.714675 systemd[1]: Finished modprobe@fuse.service. Feb 13 00:28:45.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.723323 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 00:28:45.723695 systemd[1]: Finished modprobe@loop.service. Feb 13 00:28:45.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.732451 systemd[1]: Finished systemd-modules-load.service. Feb 13 00:28:45.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.741312 systemd[1]: Finished systemd-network-generator.service. Feb 13 00:28:45.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.750316 systemd[1]: Finished systemd-remount-fs.service. Feb 13 00:28:45.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.759423 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 00:28:45.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.768917 systemd[1]: Reached target network-pre.target. Feb 13 00:28:45.780231 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 00:28:45.791157 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 00:28:45.797782 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 00:28:45.800975 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 00:28:45.810028 systemd[1]: Starting systemd-journal-flush.service... Feb 13 00:28:45.818791 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 00:28:45.821164 systemd[1]: Starting systemd-random-seed.service... Feb 13 00:28:45.822196 systemd-journald[945]: Time spent on flushing to /var/log/journal/8533586b68aa4e31ba49a0043695c5f0 is 10.813ms for 1301 entries. Feb 13 00:28:45.822196 systemd-journald[945]: System Journal (/var/log/journal/8533586b68aa4e31ba49a0043695c5f0) is 8.0M, max 195.6M, 187.6M free. Feb 13 00:28:45.856073 systemd-journald[945]: Received client request to flush runtime journal. Feb 13 00:28:45.835657 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 00:28:45.836131 systemd[1]: Starting systemd-sysctl.service... Feb 13 00:28:45.850261 systemd[1]: Starting systemd-sysusers.service... Feb 13 00:28:45.857093 systemd[1]: Starting systemd-udev-settle.service... Feb 13 00:28:45.864644 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 00:28:45.873677 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 00:28:45.882730 systemd[1]: Finished systemd-journal-flush.service. Feb 13 00:28:45.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.891750 systemd[1]: Finished systemd-random-seed.service. Feb 13 00:28:45.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.900695 systemd[1]: Finished systemd-sysctl.service. Feb 13 00:28:45.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.908694 systemd[1]: Finished systemd-sysusers.service. Feb 13 00:28:45.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:45.918099 systemd[1]: Reached target first-boot-complete.target. Feb 13 00:28:45.926783 udevadm[961]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 00:28:46.121204 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 00:28:46.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:46.128000 audit: BPF prog-id=19 op=LOAD Feb 13 00:28:46.128000 audit: BPF prog-id=20 op=LOAD Feb 13 00:28:46.128000 audit: BPF prog-id=6 op=UNLOAD Feb 13 00:28:46.128000 audit: BPF prog-id=7 op=UNLOAD Feb 13 00:28:46.130827 systemd[1]: Starting systemd-udevd.service... Feb 13 00:28:46.142488 systemd-udevd[962]: Using default interface naming scheme 'v252'. Feb 13 00:28:46.160141 systemd[1]: Started systemd-udevd.service. Feb 13 00:28:46.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:46.170792 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 00:28:46.170000 audit: BPF prog-id=21 op=LOAD Feb 13 00:28:46.171980 systemd[1]: Starting systemd-networkd.service... Feb 13 00:28:46.192000 audit: BPF prog-id=22 op=LOAD Feb 13 00:28:46.211440 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 00:28:46.211535 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 00:28:46.210000 audit: BPF prog-id=23 op=LOAD Feb 13 00:28:46.230000 audit: BPF prog-id=24 op=LOAD Feb 13 00:28:46.232594 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 00:28:46.232614 kernel: IPMI message handler: version 39.2 Feb 13 00:28:46.232824 systemd[1]: Starting systemd-userdbd.service... Feb 13 00:28:46.250621 kernel: ACPI: button: Power Button [PWRF] Feb 13 00:28:46.284170 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 00:28:46.204000 audit[1035]: AVC avc: denied { confidentiality } for pid=1035 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 00:28:46.297432 systemd[1]: Started systemd-userdbd.service. Feb 13 00:28:46.310523 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 00:28:46.310598 kernel: ipmi device interface Feb 13 00:28:46.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:46.204000 audit[1035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fcb444cc010 a1=4d8bc a2=7fcb46179bc5 a3=5 items=42 ppid=962 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:28:46.204000 audit: CWD cwd="/" Feb 13 00:28:46.204000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=1 name=(null) inode=25704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=2 name=(null) inode=25704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=3 name=(null) inode=25705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=4 name=(null) inode=25704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=5 name=(null) inode=25706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=6 name=(null) inode=25704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=7 name=(null) inode=25707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=8 name=(null) inode=25707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=9 name=(null) inode=25708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=10 name=(null) inode=25707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=11 name=(null) inode=25709 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=12 name=(null) inode=25707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=13 name=(null) inode=25710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=14 name=(null) inode=25707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=15 name=(null) inode=25711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=16 name=(null) inode=25707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=17 name=(null) inode=25712 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=18 name=(null) inode=25704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=19 name=(null) inode=25713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=20 name=(null) inode=25713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=21 name=(null) inode=25714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=22 name=(null) inode=25713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=23 name=(null) inode=25715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=24 name=(null) inode=25713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=25 name=(null) inode=25716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=26 name=(null) inode=25713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=27 name=(null) inode=25717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=28 name=(null) inode=25713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=29 name=(null) inode=25718 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=30 name=(null) inode=25704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=31 name=(null) inode=25719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=32 name=(null) inode=25719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=33 name=(null) inode=25720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=34 name=(null) inode=25719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=35 name=(null) inode=25721 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=36 name=(null) inode=25719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=37 name=(null) inode=25722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=38 name=(null) inode=25719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=39 name=(null) inode=25723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=40 name=(null) inode=25719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PATH item=41 name=(null) inode=25724 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:28:46.204000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 00:28:46.380701 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 00:28:46.380885 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 00:28:46.382515 kernel: ipmi_si: IPMI System Interface driver Feb 13 00:28:46.382549 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 00:28:46.382633 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 00:28:46.382702 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 00:28:46.417797 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 00:28:46.494205 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 00:28:46.494228 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 00:28:46.512919 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 00:28:46.552523 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 00:28:46.598343 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 00:28:46.598496 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 00:28:46.598519 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 00:28:46.598531 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 00:28:46.600235 systemd-networkd[1010]: bond0: netdev ready Feb 13 00:28:46.602310 systemd-networkd[1010]: lo: Link UP Feb 13 00:28:46.602313 systemd-networkd[1010]: lo: Gained carrier Feb 13 00:28:46.602667 systemd-networkd[1010]: Enumeration completed Feb 13 00:28:46.602742 systemd[1]: Started systemd-networkd.service. Feb 13 00:28:46.603020 systemd-networkd[1010]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 00:28:46.603632 systemd-networkd[1010]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d7:77:67.network. Feb 13 00:28:46.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:46.654742 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 00:28:46.667512 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 13 00:28:46.667607 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 00:28:46.750855 kernel: intel_rapl_common: Found RAPL domain package Feb 13 00:28:46.750905 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 13 00:28:46.750986 kernel: intel_rapl_common: Found RAPL domain core Feb 13 00:28:46.785202 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 00:28:46.785296 kernel: intel_rapl_common: Found RAPL domain uncore Feb 13 00:28:46.802512 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 13 00:28:46.802535 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 00:28:46.821958 systemd-networkd[1010]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d7:77:66.network. Feb 13 00:28:46.822514 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 00:28:46.822605 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 00:28:46.895587 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 00:28:47.009581 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 00:28:47.076595 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 00:28:47.101584 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 13 00:28:47.125515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 00:28:47.126970 systemd-networkd[1010]: bond0: Link UP Feb 13 00:28:47.127245 systemd-networkd[1010]: enp2s0f1np1: Link UP Feb 13 00:28:47.127454 systemd-networkd[1010]: enp2s0f0np0: Link UP Feb 13 00:28:47.127634 systemd-networkd[1010]: enp2s0f1np1: Gained carrier Feb 13 00:28:47.128916 systemd-networkd[1010]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d7:77:66.network. Feb 13 00:28:47.184570 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 00:28:47.184639 kernel: bond0: active interface up! Feb 13 00:28:47.210512 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 13 00:28:47.238540 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 00:28:47.289349 systemd-networkd[1010]: bond0: Gained carrier Feb 13 00:28:47.289445 systemd-networkd[1010]: enp2s0f0np0: Gained carrier Feb 13 00:28:47.302819 systemd-networkd[1010]: enp2s0f1np1: Link DOWN Feb 13 00:28:47.302822 systemd-networkd[1010]: enp2s0f1np1: Lost carrier Feb 13 00:28:47.306815 systemd[1]: Finished systemd-udev-settle.service. Feb 13 00:28:47.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.322896 systemd[1]: Starting lvm2-activation-early.service... Feb 13 00:28:47.335559 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.339091 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 00:28:47.359512 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.381518 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.404512 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.426552 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.427981 systemd[1]: Finished lvm2-activation-early.service. Feb 13 00:28:47.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.445740 systemd[1]: Reached target cryptsetup.target. Feb 13 00:28:47.449556 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.466230 systemd[1]: Starting lvm2-activation.service... Feb 13 00:28:47.468423 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 00:28:47.471554 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.493559 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.514514 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.535513 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.541021 systemd[1]: Finished lvm2-activation.service. Feb 13 00:28:47.556511 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.573614 systemd[1]: Reached target local-fs-pre.target. Feb 13 00:28:47.577513 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.593606 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 00:28:47.593649 systemd[1]: Reached target local-fs.target. Feb 13 00:28:47.598557 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.616555 systemd[1]: Reached target machines.target. Feb 13 00:28:47.619545 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.638053 systemd[1]: Starting ldconfig.service... Feb 13 00:28:47.641513 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.657084 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 00:28:47.657129 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 00:28:47.657754 systemd[1]: Starting systemd-boot-update.service... Feb 13 00:28:47.663551 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.663576 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 00:28:47.676021 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 00:28:47.679566 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:28:47.684243 systemd-networkd[1010]: enp2s0f1np1: Link UP Feb 13 00:28:47.684246 systemd-networkd[1010]: enp2s0f1np1: Gained carrier Feb 13 00:28:47.697513 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 13 00:28:47.713821 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 00:28:47.713914 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 00:28:47.713943 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 00:28:47.714545 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 00:28:47.714752 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1072 (bootctl) Feb 13 00:28:47.715453 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 00:28:47.727312 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 00:28:47.727642 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 00:28:47.731676 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 00:28:47.736574 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 00:28:47.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.740832 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 00:28:47.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.741639 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 00:28:47.797956 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) Feb 13 00:28:47.797956 systemd-fsck[1080]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 13 00:28:47.798645 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 00:28:47.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.817363 systemd[1]: Mounting boot.mount... Feb 13 00:28:47.817511 kernel: bond0: (slave enp2s0f1np1): link status up again after 100 ms Feb 13 00:28:47.836513 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 00:28:47.842843 systemd[1]: Mounted boot.mount. Feb 13 00:28:47.860654 systemd[1]: Finished systemd-boot-update.service. Feb 13 00:28:47.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.890319 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 00:28:47.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:28:47.899366 systemd[1]: Starting audit-rules.service... Feb 13 00:28:47.906109 systemd[1]: Starting clean-ca-certificates.service... Feb 13 00:28:47.915084 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 00:28:47.918370 augenrules[1104]: No rules Feb 13 00:28:47.916000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 00:28:47.916000 audit[1104]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffedfc5db10 a2=420 a3=0 items=0 ppid=1087 pid=1104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:28:47.916000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 00:28:47.924486 systemd[1]: Starting systemd-resolved.service... Feb 13 00:28:47.926713 ldconfig[1071]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 00:28:47.932526 systemd[1]: Starting systemd-timesyncd.service... Feb 13 00:28:47.940078 systemd[1]: Starting systemd-update-utmp.service... Feb 13 00:28:47.946852 systemd[1]: Finished ldconfig.service. Feb 13 00:28:47.953731 systemd[1]: Finished audit-rules.service. Feb 13 00:28:47.960686 systemd[1]: Finished clean-ca-certificates.service. Feb 13 00:28:47.968714 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 00:28:47.980211 systemd[1]: Finished systemd-update-utmp.service. Feb 13 00:28:47.989149 systemd[1]: Starting systemd-update-done.service... Feb 13 00:28:47.995632 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 00:28:47.995794 systemd[1]: Finished systemd-update-done.service. Feb 13 00:28:48.005981 systemd[1]: Started systemd-timesyncd.service. Feb 13 00:28:48.007173 systemd-resolved[1109]: Positive Trust Anchors: Feb 13 00:28:48.007181 systemd-resolved[1109]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 00:28:48.007210 systemd-resolved[1109]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 00:28:48.014772 systemd[1]: Reached target time-set.target. Feb 13 00:28:48.024706 systemd-resolved[1109]: Using system hostname 'ci-3510.3.2-a-e30f696a50'. Feb 13 00:28:48.025813 systemd[1]: Started systemd-resolved.service. Feb 13 00:28:48.033615 systemd[1]: Reached target network.target. Feb 13 00:28:48.042590 systemd[1]: Reached target nss-lookup.target. Feb 13 00:28:48.051591 systemd[1]: Reached target sysinit.target. Feb 13 00:28:48.059628 systemd[1]: Started motdgen.path. Feb 13 00:28:48.066604 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 00:28:48.076647 systemd[1]: Started logrotate.timer. Feb 13 00:28:48.083639 systemd[1]: Started mdadm.timer. Feb 13 00:28:48.090579 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 00:28:48.098589 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 00:28:48.098604 systemd[1]: Reached target paths.target. Feb 13 00:28:48.105587 systemd[1]: Reached target timers.target. Feb 13 00:28:48.112703 systemd[1]: Listening on dbus.socket. Feb 13 00:28:48.120110 systemd[1]: Starting docker.socket... Feb 13 00:28:48.127979 systemd[1]: Listening on sshd.socket. Feb 13 00:28:48.134652 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 00:28:48.134863 systemd[1]: Listening on docker.socket. Feb 13 00:28:48.141665 systemd[1]: Reached target sockets.target. Feb 13 00:28:48.149624 systemd[1]: Reached target basic.target. Feb 13 00:28:48.156632 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 00:28:48.156645 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 00:28:48.157072 systemd[1]: Starting containerd.service... Feb 13 00:28:48.164007 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 00:28:48.173057 systemd[1]: Starting coreos-metadata.service... Feb 13 00:28:48.180061 systemd[1]: Starting dbus.service... Feb 13 00:28:48.186152 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 00:28:48.192486 jq[1125]: false Feb 13 00:28:48.193289 systemd[1]: Starting extend-filesystems.service... Feb 13 00:28:48.200570 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 00:28:48.201212 systemd[1]: Starting motdgen.service... Feb 13 00:28:48.201431 extend-filesystems[1126]: Found sda Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb1 Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb2 Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb3 Feb 13 00:28:48.228832 extend-filesystems[1126]: Found usr Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb4 Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb6 Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb7 Feb 13 00:28:48.228832 extend-filesystems[1126]: Found sdb9 Feb 13 00:28:48.228832 extend-filesystems[1126]: Checking size of /dev/sdb9 Feb 13 00:28:48.228832 extend-filesystems[1126]: Resized partition /dev/sdb9 Feb 13 00:28:48.339598 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 13 00:28:48.208389 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 00:28:48.201492 dbus-daemon[1122]: [system] SELinux support is enabled Feb 13 00:28:48.339815 coreos-metadata[1118]: Feb 13 00:28:48.219 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 00:28:48.339911 coreos-metadata[1119]: Feb 13 00:28:48.219 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 00:28:48.340018 extend-filesystems[1140]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 00:28:48.236258 systemd[1]: Starting sshd-keygen.service... Feb 13 00:28:48.251898 systemd[1]: Starting systemd-logind.service... Feb 13 00:28:48.264549 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 00:28:48.265099 systemd[1]: Starting tcsd.service... Feb 13 00:28:48.361845 update_engine[1154]: I0213 00:28:48.326227 1154 main.cc:92] Flatcar Update Engine starting Feb 13 00:28:48.361845 update_engine[1154]: I0213 00:28:48.329476 1154 update_check_scheduler.cc:74] Next update check in 8m53s Feb 13 00:28:48.272594 systemd-logind[1152]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 00:28:48.362069 jq[1155]: true Feb 13 00:28:48.272603 systemd-logind[1152]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 00:28:48.272614 systemd-logind[1152]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 00:28:48.272778 systemd-logind[1152]: New seat seat0. Feb 13 00:28:48.276775 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 00:28:48.277128 systemd[1]: Starting update-engine.service... Feb 13 00:28:48.295094 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 00:28:48.313883 systemd[1]: Started dbus.service. Feb 13 00:28:48.333168 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 00:28:48.333252 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 00:28:48.333395 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 00:28:48.333473 systemd[1]: Finished motdgen.service. Feb 13 00:28:48.353713 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 00:28:48.353788 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 00:28:48.372221 jq[1157]: false Feb 13 00:28:48.372723 dbus-daemon[1122]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 00:28:48.373489 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 13 00:28:48.373586 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 13 00:28:48.376858 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 00:28:48.376939 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 00:28:48.380355 systemd[1]: Started systemd-logind.service. Feb 13 00:28:48.382180 env[1158]: time="2024-02-13T00:28:48.382157223Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 00:28:48.393589 systemd[1]: Started update-engine.service. Feb 13 00:28:48.394653 env[1158]: time="2024-02-13T00:28:48.394601096Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 00:28:48.394686 env[1158]: time="2024-02-13T00:28:48.394673777Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395295 env[1158]: time="2024-02-13T00:28:48.395275015Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395326 env[1158]: time="2024-02-13T00:28:48.395295487Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395442 env[1158]: time="2024-02-13T00:28:48.395429132Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395464 env[1158]: time="2024-02-13T00:28:48.395443568Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395464 env[1158]: time="2024-02-13T00:28:48.395454318Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 00:28:48.395494 env[1158]: time="2024-02-13T00:28:48.395463184Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395571 env[1158]: time="2024-02-13T00:28:48.395520267Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395722 env[1158]: time="2024-02-13T00:28:48.395682726Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395819 env[1158]: time="2024-02-13T00:28:48.395777429Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 00:28:48.395819 env[1158]: time="2024-02-13T00:28:48.395791083Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 00:28:48.395866 env[1158]: time="2024-02-13T00:28:48.395825047Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 00:28:48.395866 env[1158]: time="2024-02-13T00:28:48.395839547Z" level=info msg="metadata content store policy set" policy=shared Feb 13 00:28:48.403267 systemd[1]: Started locksmithd.service. Feb 13 00:28:48.406678 env[1158]: time="2024-02-13T00:28:48.406627976Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 00:28:48.406678 env[1158]: time="2024-02-13T00:28:48.406649085Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 00:28:48.406678 env[1158]: time="2024-02-13T00:28:48.406660164Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 00:28:48.406749 env[1158]: time="2024-02-13T00:28:48.406682485Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406749 env[1158]: time="2024-02-13T00:28:48.406699023Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406749 env[1158]: time="2024-02-13T00:28:48.406710794Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406749 env[1158]: time="2024-02-13T00:28:48.406722340Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406749 env[1158]: time="2024-02-13T00:28:48.406734010Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406749 env[1158]: time="2024-02-13T00:28:48.406745539Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406848 env[1158]: time="2024-02-13T00:28:48.406757413Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406848 env[1158]: time="2024-02-13T00:28:48.406768647Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.406848 env[1158]: time="2024-02-13T00:28:48.406779100Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 00:28:48.406848 env[1158]: time="2024-02-13T00:28:48.406840464Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 00:28:48.406908 env[1158]: time="2024-02-13T00:28:48.406897790Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 00:28:48.407372 env[1158]: time="2024-02-13T00:28:48.407352776Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 00:28:48.407413 env[1158]: time="2024-02-13T00:28:48.407380148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407413 env[1158]: time="2024-02-13T00:28:48.407389521Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 00:28:48.407453 env[1158]: time="2024-02-13T00:28:48.407420365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407453 env[1158]: time="2024-02-13T00:28:48.407429591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407453 env[1158]: time="2024-02-13T00:28:48.407437203Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407453 env[1158]: time="2024-02-13T00:28:48.407443309Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407453 env[1158]: time="2024-02-13T00:28:48.407449848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407549 env[1158]: time="2024-02-13T00:28:48.407456565Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407549 env[1158]: time="2024-02-13T00:28:48.407465680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407549 env[1158]: time="2024-02-13T00:28:48.407471942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407549 env[1158]: time="2024-02-13T00:28:48.407479598Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407554580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407564083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407570390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407576667Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407584147Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407591202Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 00:28:48.407615 env[1158]: time="2024-02-13T00:28:48.407600880Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 00:28:48.407721 env[1158]: time="2024-02-13T00:28:48.407621288Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 00:28:48.407759 env[1158]: time="2024-02-13T00:28:48.407734349Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.407765692Z" level=info msg="Connect containerd service" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.407784922Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408057281Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408145999Z" level=info msg="Start subscribing containerd event" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408179740Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408183026Z" level=info msg="Start recovering state" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408200514Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408214058Z" level=info msg="Start event monitor" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408222690Z" level=info msg="Start snapshots syncer" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408235395Z" level=info msg="Start cni network conf syncer for default" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408222480Z" level=info msg="containerd successfully booted in 0.026393s" Feb 13 00:28:48.409486 env[1158]: time="2024-02-13T00:28:48.408253520Z" level=info msg="Start streaming server" Feb 13 00:28:48.409634 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 00:28:48.409715 systemd[1]: Reached target system-config.target. Feb 13 00:28:48.417599 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 00:28:48.417670 systemd[1]: Reached target user-config.target. Feb 13 00:28:48.427366 systemd[1]: Started containerd.service. Feb 13 00:28:48.460869 locksmithd[1176]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 00:28:48.507969 sshd_keygen[1151]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 00:28:48.519314 systemd[1]: Finished sshd-keygen.service. Feb 13 00:28:48.527360 systemd[1]: Starting issuegen.service... Feb 13 00:28:48.534720 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 00:28:48.534796 systemd[1]: Finished issuegen.service. Feb 13 00:28:48.543564 systemd[1]: Starting systemd-user-sessions.service... Feb 13 00:28:48.552771 systemd[1]: Finished systemd-user-sessions.service. Feb 13 00:28:48.562190 systemd[1]: Started getty@tty1.service. Feb 13 00:28:48.570113 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 00:28:48.579672 systemd[1]: Reached target getty.target. Feb 13 00:28:48.710561 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 13 00:28:48.737966 extend-filesystems[1140]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 13 00:28:48.737966 extend-filesystems[1140]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 00:28:48.737966 extend-filesystems[1140]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 13 00:28:48.774554 extend-filesystems[1126]: Resized filesystem in /dev/sdb9 Feb 13 00:28:48.738331 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 00:28:48.738429 systemd[1]: Finished extend-filesystems.service. Feb 13 00:28:48.776775 systemd-networkd[1010]: bond0: Gained IPv6LL Feb 13 00:28:48.777598 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:49.272683 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 00:28:49.288869 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:49.288982 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:49.289721 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 00:28:49.299927 systemd[1]: Reached target network-online.target. Feb 13 00:28:49.371600 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:1 Feb 13 00:28:49.480513 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 13 00:28:53.606627 login[1200]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 13 00:28:53.608014 login[1201]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 00:28:53.614907 systemd[1]: Created slice user-500.slice. Feb 13 00:28:53.615510 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 00:28:53.616484 systemd-logind[1152]: New session 1 of user core. Feb 13 00:28:53.620862 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 00:28:53.621620 systemd[1]: Starting user@500.service... Feb 13 00:28:53.623533 (systemd)[1206]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:28:53.690668 systemd[1206]: Queued start job for default target default.target. Feb 13 00:28:53.690893 systemd[1206]: Reached target paths.target. Feb 13 00:28:53.690905 systemd[1206]: Reached target sockets.target. Feb 13 00:28:53.690913 systemd[1206]: Reached target timers.target. Feb 13 00:28:53.690920 systemd[1206]: Reached target basic.target. Feb 13 00:28:53.690938 systemd[1206]: Reached target default.target. Feb 13 00:28:53.690952 systemd[1206]: Startup finished in 64ms. Feb 13 00:28:53.690976 systemd[1]: Started user@500.service. Feb 13 00:28:53.691597 systemd[1]: Started session-1.scope. Feb 13 00:28:54.409633 coreos-metadata[1118]: Feb 13 00:28:54.409 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 00:28:54.410379 coreos-metadata[1119]: Feb 13 00:28:54.409 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 00:28:54.607476 login[1200]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 00:28:54.618201 systemd-logind[1152]: New session 2 of user core. Feb 13 00:28:54.620647 systemd[1]: Started session-2.scope. Feb 13 00:28:55.191546 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 13 00:28:55.198551 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 13 00:28:55.409769 coreos-metadata[1119]: Feb 13 00:28:55.409 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 00:28:55.410062 coreos-metadata[1118]: Feb 13 00:28:55.409 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 00:28:55.439058 coreos-metadata[1118]: Feb 13 00:28:55.439 INFO Fetch successful Feb 13 00:28:55.439965 coreos-metadata[1119]: Feb 13 00:28:55.439 INFO Fetch successful Feb 13 00:28:55.461344 systemd[1]: Finished coreos-metadata.service. Feb 13 00:28:55.461583 unknown[1118]: wrote ssh authorized keys file for user: core Feb 13 00:28:55.462633 systemd[1]: Starting etcd-member.service... Feb 13 00:28:55.463289 systemd[1]: Started packet-phone-home.service. Feb 13 00:28:55.469489 curl[1229]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 00:28:55.469647 curl[1229]: Dload Upload Total Spent Left Speed Feb 13 00:28:55.478967 update-ssh-keys[1230]: Updated "/home/core/.ssh/authorized_keys" Feb 13 00:28:55.479519 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 00:28:55.480333 systemd[1]: Starting docker.service... Feb 13 00:28:55.496754 env[1244]: time="2024-02-13T00:28:55.496696338Z" level=info msg="Starting up" Feb 13 00:28:55.497331 env[1244]: time="2024-02-13T00:28:55.497290626Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 00:28:55.497331 env[1244]: time="2024-02-13T00:28:55.497301879Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 00:28:55.497331 env[1244]: time="2024-02-13T00:28:55.497312730Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 00:28:55.497331 env[1244]: time="2024-02-13T00:28:55.497318465Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 00:28:55.498124 env[1244]: time="2024-02-13T00:28:55.498084990Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 00:28:55.498124 env[1244]: time="2024-02-13T00:28:55.498092480Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 00:28:55.498124 env[1244]: time="2024-02-13T00:28:55.498099853Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 00:28:55.498124 env[1244]: time="2024-02-13T00:28:55.498104880Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 00:28:55.510699 env[1244]: time="2024-02-13T00:28:55.510660143Z" level=info msg="Loading containers: start." Feb 13 00:28:55.654589 curl[1229]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 00:28:55.656999 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 00:28:55.661589 kernel: Initializing XFRM netlink socket Feb 13 00:28:55.724053 env[1244]: time="2024-02-13T00:28:55.723980660Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 00:28:55.724797 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:55.724882 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:55.728560 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:55.728699 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:55.818057 systemd-networkd[1010]: docker0: Link UP Feb 13 00:28:55.818614 systemd-timesyncd[1110]: Network configuration changed, trying to establish connection. Feb 13 00:28:55.836159 env[1244]: time="2024-02-13T00:28:55.836071179Z" level=info msg="Loading containers: done." Feb 13 00:28:55.854592 env[1244]: time="2024-02-13T00:28:55.854493942Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 00:28:55.854996 env[1244]: time="2024-02-13T00:28:55.854863152Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 00:28:55.855177 env[1244]: time="2024-02-13T00:28:55.855073762Z" level=info msg="Daemon has completed initialization" Feb 13 00:28:55.858098 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4255537546-merged.mount: Deactivated successfully. Feb 13 00:28:55.877187 systemd[1]: Started docker.service. Feb 13 00:28:55.892092 env[1244]: time="2024-02-13T00:28:55.891961356Z" level=info msg="API listen on /run/docker.sock" Feb 13 00:28:55.894174 etcd-wrapper[1234]: Error response from daemon: No such container: etcd-member Feb 13 00:28:55.939417 etcd-wrapper[1368]: Error: No such container: etcd-member Feb 13 00:28:55.992123 etcd-wrapper[1391]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 00:28:57.077110 systemd[1]: Created slice system-sshd.slice. Feb 13 00:28:57.077701 systemd[1]: Started sshd@0-136.144.54.113:22-139.178.68.195:60556.service. Feb 13 00:28:57.125179 sshd[1402]: Accepted publickey for core from 139.178.68.195 port 60556 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:28:57.126666 sshd[1402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:28:57.131327 systemd-logind[1152]: New session 3 of user core. Feb 13 00:28:57.132831 systemd[1]: Started session-3.scope. Feb 13 00:28:57.193744 systemd[1]: Started sshd@1-136.144.54.113:22-139.178.68.195:60560.service. Feb 13 00:28:57.230417 sshd[1407]: Accepted publickey for core from 139.178.68.195 port 60560 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:28:57.231118 sshd[1407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:28:57.233396 systemd-logind[1152]: New session 4 of user core. Feb 13 00:28:57.233931 systemd[1]: Started session-4.scope. Feb 13 00:28:57.286343 sshd[1407]: pam_unix(sshd:session): session closed for user core Feb 13 00:28:57.287813 systemd[1]: sshd@1-136.144.54.113:22-139.178.68.195:60560.service: Deactivated successfully. Feb 13 00:28:57.288124 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 00:28:57.288417 systemd-logind[1152]: Session 4 logged out. Waiting for processes to exit. Feb 13 00:28:57.288975 systemd[1]: Started sshd@2-136.144.54.113:22-139.178.68.195:60564.service. Feb 13 00:28:57.289388 systemd-logind[1152]: Removed session 4. Feb 13 00:28:57.306456 etcd-wrapper[1391]: v3.5.0: Pulling from coreos/etcd Feb 13 00:28:57.325706 sshd[1413]: Accepted publickey for core from 139.178.68.195 port 60564 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:28:57.326889 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:28:57.330827 systemd-logind[1152]: New session 5 of user core. Feb 13 00:28:57.331832 systemd[1]: Started session-5.scope. Feb 13 00:28:57.400344 sshd[1413]: pam_unix(sshd:session): session closed for user core Feb 13 00:28:57.405942 systemd[1]: sshd@2-136.144.54.113:22-139.178.68.195:60564.service: Deactivated successfully. Feb 13 00:28:57.407607 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 00:28:57.409297 systemd-logind[1152]: Session 5 logged out. Waiting for processes to exit. Feb 13 00:28:57.411534 systemd-logind[1152]: Removed session 5. Feb 13 00:28:57.611619 etcd-wrapper[1391]: 1813d21adc01: Pulling fs layer Feb 13 00:28:57.611619 etcd-wrapper[1391]: 6e96907ab677: Pulling fs layer Feb 13 00:28:57.611619 etcd-wrapper[1391]: 444ed0ea8673: Pulling fs layer Feb 13 00:28:57.611619 etcd-wrapper[1391]: 0fd2df5633f0: Pulling fs layer Feb 13 00:28:57.611619 etcd-wrapper[1391]: 8cc22b9456bb: Pulling fs layer Feb 13 00:28:57.611619 etcd-wrapper[1391]: 7ac70aecd290: Pulling fs layer Feb 13 00:28:57.611619 etcd-wrapper[1391]: 4b376c64dfe4: Pulling fs layer Feb 13 00:28:57.612400 etcd-wrapper[1391]: 0fd2df5633f0: Waiting Feb 13 00:28:57.612400 etcd-wrapper[1391]: 8cc22b9456bb: Waiting Feb 13 00:28:57.994192 etcd-wrapper[1391]: 444ed0ea8673: Verifying Checksum Feb 13 00:28:57.994192 etcd-wrapper[1391]: 444ed0ea8673: Download complete Feb 13 00:28:58.024083 etcd-wrapper[1391]: 6e96907ab677: Verifying Checksum Feb 13 00:28:58.024083 etcd-wrapper[1391]: 6e96907ab677: Download complete Feb 13 00:28:58.058391 etcd-wrapper[1391]: 1813d21adc01: Verifying Checksum Feb 13 00:28:58.058391 etcd-wrapper[1391]: 1813d21adc01: Download complete Feb 13 00:28:58.315118 etcd-wrapper[1391]: 0fd2df5633f0: Verifying Checksum Feb 13 00:28:58.315118 etcd-wrapper[1391]: 0fd2df5633f0: Download complete Feb 13 00:28:58.330623 etcd-wrapper[1391]: 8cc22b9456bb: Verifying Checksum Feb 13 00:28:58.330623 etcd-wrapper[1391]: 8cc22b9456bb: Download complete Feb 13 00:28:58.358725 etcd-wrapper[1391]: 7ac70aecd290: Verifying Checksum Feb 13 00:28:58.358725 etcd-wrapper[1391]: 7ac70aecd290: Download complete Feb 13 00:28:58.557828 etcd-wrapper[1391]: 1813d21adc01: Pull complete Feb 13 00:28:58.669792 etcd-wrapper[1391]: 4b376c64dfe4: Verifying Checksum Feb 13 00:28:58.669792 etcd-wrapper[1391]: 4b376c64dfe4: Download complete Feb 13 00:28:58.746064 systemd[1]: var-lib-docker-overlay2-92a03bcdff686171c5b65c8997fc7b872a77ab3aa2ad39739ab34af9e37d5519-merged.mount: Deactivated successfully. Feb 13 00:28:58.999976 etcd-wrapper[1391]: 6e96907ab677: Pull complete Feb 13 00:28:59.152785 systemd[1]: var-lib-docker-overlay2-cecf40e8bab854b2288166b277f14c8dddacbc62ac6bb05830cf619989d7b430-merged.mount: Deactivated successfully. Feb 13 00:28:59.215063 etcd-wrapper[1391]: 444ed0ea8673: Pull complete Feb 13 00:28:59.438152 etcd-wrapper[1391]: 0fd2df5633f0: Pull complete Feb 13 00:28:59.537370 etcd-wrapper[1391]: 8cc22b9456bb: Pull complete Feb 13 00:28:59.561639 systemd[1]: var-lib-docker-overlay2-73b75c6126d7954b3fe3198880e41db01bb98ffefb0e163e1ece6de696d82d62-merged.mount: Deactivated successfully. Feb 13 00:28:59.577202 systemd[1]: var-lib-docker-overlay2-328717e430ce7adb999c87acbd11c68705ee94f038454758fd571fe3a00530b2-merged.mount: Deactivated successfully. Feb 13 00:28:59.579986 etcd-wrapper[1391]: 7ac70aecd290: Pull complete Feb 13 00:28:59.602617 systemd[1]: var-lib-docker-overlay2-1d3040eaf93271c55c460eea66b2967935e3d4b30a6f04059ca84cb0ad3a85ff-merged.mount: Deactivated successfully. Feb 13 00:28:59.605280 etcd-wrapper[1391]: 4b376c64dfe4: Pull complete Feb 13 00:28:59.607912 etcd-wrapper[1391]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 00:28:59.608679 etcd-wrapper[1391]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 00:28:59.708053 env[1158]: time="2024-02-13T00:28:59.707989241Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 00:28:59.708053 env[1158]: time="2024-02-13T00:28:59.708018167Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 00:28:59.708053 env[1158]: time="2024-02-13T00:28:59.708027770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 00:28:59.708372 env[1158]: time="2024-02-13T00:28:59.708152389Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/2ee900221aeb63c1253f38faa32aa22002244a5605319904d1d9c6b33d5d1c12 pid=1587 runtime=io.containerd.runc.v2 Feb 13 00:28:59.715036 systemd[1]: Started docker-2ee900221aeb63c1253f38faa32aa22002244a5605319904d1d9c6b33d5d1c12.scope. Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"info","ts":1707784139.7539136,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"info","ts":1707784139.7539635,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"8533586b68aa4e31ba49a0043695c5f0"} Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"warn","ts":1707784139.7539864,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"warn","ts":1707784139.7539918,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"warn","ts":1707784139.7539968,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"warn","ts":1707784139.7540011,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 00:28:59.754122 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.754Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.35:2379"]} Feb 13 00:28:59.754373 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.754Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 00:28:59.754518 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.754Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 00:28:59.754623 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.754Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"8533586b68aa4e31ba49a0043695c5f0","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"8533586b68aa4e31ba49a0043695c5f0=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 00:28:59.755280 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.755Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"521.627µs"} Feb 13 00:28:59.756892 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.756Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 00:28:59.756892 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.756Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 00:28:59.756892 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.756Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 00:28:59.756892 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.756Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 00:28:59.756892 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.756Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 00:28:59.756892 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.756Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 00:28:59.757447 etcd-wrapper[1391]: {"level":"warn","ts":"2024-02-13T00:28:59.757Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 00:28:59.758310 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.758Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 00:28:59.758721 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.758Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 00:28:59.758947 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.758Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 00:28:59.759006 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.758Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 00:28:59.759214 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.759Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 00:28:59.759253 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.759Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 00:28:59.760425 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.760Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 00:28:59.760425 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.760Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 00:28:59.760425 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:28:59.760Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.256Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 00:29:00.257452 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 00:29:00.258412 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.257Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 00:29:00.258634 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 00:29:00.258634 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 00:29:00.258976 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 00:29:00.258976 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 00:29:00.258976 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:8533586b68aa4e31ba49a0043695c5f0 ClientURLs:[http://10.67.80.35:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 00:29:00.259323 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 00:29:00.259323 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.258Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 00:29:00.259292 systemd[1]: Started etcd-member.service. Feb 13 00:29:00.260107 systemd[1]: Reached target multi-user.target. Feb 13 00:29:00.260709 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:29:00.260Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 00:29:00.263576 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 00:29:00.268250 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 00:29:00.268331 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 00:29:00.268409 systemd[1]: Startup finished in 2.012s (kernel) + 6.651s (initrd) + 18.791s (userspace) = 27.455s. Feb 13 00:29:00.564658 systemd[1]: var-lib-docker-overlay2-acfa412f1de2f60de9f659d1414f87ad34f4ead2be16adbcdfb7bc9e3c5a879d\x2dinit-merged.mount: Deactivated successfully. Feb 13 00:29:07.409657 systemd[1]: Started sshd@3-136.144.54.113:22-139.178.68.195:53672.service. Feb 13 00:29:07.446898 sshd[1636]: Accepted publickey for core from 139.178.68.195 port 53672 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:29:07.448090 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:29:07.451822 systemd-logind[1152]: New session 6 of user core. Feb 13 00:29:07.452589 systemd[1]: Started session-6.scope. Feb 13 00:29:07.508583 sshd[1636]: pam_unix(sshd:session): session closed for user core Feb 13 00:29:07.510162 systemd[1]: sshd@3-136.144.54.113:22-139.178.68.195:53672.service: Deactivated successfully. Feb 13 00:29:07.510502 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 00:29:07.510869 systemd-logind[1152]: Session 6 logged out. Waiting for processes to exit. Feb 13 00:29:07.511338 systemd[1]: Started sshd@4-136.144.54.113:22-139.178.68.195:53682.service. Feb 13 00:29:07.511861 systemd-logind[1152]: Removed session 6. Feb 13 00:29:07.548238 sshd[1642]: Accepted publickey for core from 139.178.68.195 port 53682 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:29:07.549148 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:29:07.552344 systemd-logind[1152]: New session 7 of user core. Feb 13 00:29:07.553055 systemd[1]: Started session-7.scope. Feb 13 00:29:07.606041 sshd[1642]: pam_unix(sshd:session): session closed for user core Feb 13 00:29:07.607572 systemd[1]: sshd@4-136.144.54.113:22-139.178.68.195:53682.service: Deactivated successfully. Feb 13 00:29:07.607870 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 00:29:07.608148 systemd-logind[1152]: Session 7 logged out. Waiting for processes to exit. Feb 13 00:29:07.608701 systemd[1]: Started sshd@5-136.144.54.113:22-139.178.68.195:53694.service. Feb 13 00:29:07.609214 systemd-logind[1152]: Removed session 7. Feb 13 00:29:07.645909 sshd[1648]: Accepted publickey for core from 139.178.68.195 port 53694 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:29:07.647082 sshd[1648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:29:07.651338 systemd-logind[1152]: New session 8 of user core. Feb 13 00:29:07.652260 systemd[1]: Started session-8.scope. Feb 13 00:29:07.721378 sshd[1648]: pam_unix(sshd:session): session closed for user core Feb 13 00:29:07.727715 systemd[1]: sshd@5-136.144.54.113:22-139.178.68.195:53694.service: Deactivated successfully. Feb 13 00:29:07.728534 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 00:29:07.728949 systemd-logind[1152]: Session 8 logged out. Waiting for processes to exit. Feb 13 00:29:07.729372 systemd[1]: Started sshd@6-136.144.54.113:22-139.178.68.195:53698.service. Feb 13 00:29:07.729862 systemd-logind[1152]: Removed session 8. Feb 13 00:29:07.766674 sshd[1654]: Accepted publickey for core from 139.178.68.195 port 53698 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:29:07.767833 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:29:07.771825 systemd-logind[1152]: New session 9 of user core. Feb 13 00:29:07.772768 systemd[1]: Started session-9.scope. Feb 13 00:29:07.832107 sshd[1654]: pam_unix(sshd:session): session closed for user core Feb 13 00:29:07.838622 systemd[1]: sshd@6-136.144.54.113:22-139.178.68.195:53698.service: Deactivated successfully. Feb 13 00:29:07.840158 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 00:29:07.841857 systemd-logind[1152]: Session 9 logged out. Waiting for processes to exit. Feb 13 00:29:07.844305 systemd[1]: Started sshd@7-136.144.54.113:22-139.178.68.195:53702.service. Feb 13 00:29:07.846756 systemd-logind[1152]: Removed session 9. Feb 13 00:29:07.919720 sshd[1663]: Accepted publickey for core from 139.178.68.195 port 53702 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:29:07.922969 sshd[1663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:29:07.933254 systemd-logind[1152]: New session 10 of user core. Feb 13 00:29:07.935592 systemd[1]: Started session-10.scope. Feb 13 00:29:08.334308 sshd[1663]: pam_unix(sshd:session): session closed for user core Feb 13 00:29:08.335654 systemd[1]: sshd@7-136.144.54.113:22-139.178.68.195:53702.service: Deactivated successfully. Feb 13 00:29:08.336016 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 00:29:08.336344 systemd-logind[1152]: Session 10 logged out. Waiting for processes to exit. Feb 13 00:29:08.336950 systemd-logind[1152]: Removed session 10. Feb 13 00:29:26.245758 systemd-timesyncd[1110]: Contacted time server [2607:7c80:54:3::56]:123 (2.flatcar.pool.ntp.org). Feb 13 00:29:26.245893 systemd-timesyncd[1110]: Initial clock synchronization to Tue 2024-02-13 00:29:26.242834 UTC. Feb 13 00:29:33.838697 update_engine[1154]: I0213 00:29:33.838582 1154 update_attempter.cc:509] Updating boot flags... Feb 13 00:34:07.986031 systemd[1]: Started sshd@8-136.144.54.113:22-141.98.11.90:53414.service. Feb 13 00:34:09.252993 sshd[1717]: Invalid user mysql from 141.98.11.90 port 53414 Feb 13 00:34:09.491354 sshd[1717]: Failed none for invalid user mysql from 141.98.11.90 port 53414 ssh2 Feb 13 00:34:09.715064 sshd[1717]: Connection closed by invalid user mysql 141.98.11.90 port 53414 [preauth] Feb 13 00:34:09.717874 systemd[1]: sshd@8-136.144.54.113:22-141.98.11.90:53414.service: Deactivated successfully. Feb 13 00:37:41.913728 update_engine[1154]: I0213 00:37:41.913611 1154 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 00:37:41.913728 update_engine[1154]: I0213 00:37:41.913691 1154 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 00:37:41.915398 update_engine[1154]: I0213 00:37:41.915325 1154 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 00:37:41.916253 update_engine[1154]: I0213 00:37:41.916179 1154 omaha_request_params.cc:62] Current group set to lts Feb 13 00:37:41.916525 update_engine[1154]: I0213 00:37:41.916481 1154 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 00:37:41.916525 update_engine[1154]: I0213 00:37:41.916501 1154 update_attempter.cc:643] Scheduling an action processor start. Feb 13 00:37:41.916780 update_engine[1154]: I0213 00:37:41.916551 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 00:37:41.916780 update_engine[1154]: I0213 00:37:41.916616 1154 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 00:37:41.916780 update_engine[1154]: I0213 00:37:41.916764 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 00:37:41.917059 update_engine[1154]: I0213 00:37:41.916783 1154 omaha_request_action.cc:271] Request: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: Feb 13 00:37:41.917059 update_engine[1154]: I0213 00:37:41.916800 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:37:41.918091 locksmithd[1176]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 00:37:41.920011 update_engine[1154]: I0213 00:37:41.919929 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:37:41.920191 update_engine[1154]: E0213 00:37:41.920166 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:37:41.920395 update_engine[1154]: I0213 00:37:41.920357 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 00:37:51.823820 update_engine[1154]: I0213 00:37:51.823619 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:37:51.824751 update_engine[1154]: I0213 00:37:51.824091 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:37:51.824751 update_engine[1154]: E0213 00:37:51.824294 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:37:51.824751 update_engine[1154]: I0213 00:37:51.824466 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 00:38:01.823932 update_engine[1154]: I0213 00:38:01.823812 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:38:01.824904 update_engine[1154]: I0213 00:38:01.824288 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:38:01.824904 update_engine[1154]: E0213 00:38:01.824488 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:38:01.824904 update_engine[1154]: I0213 00:38:01.824694 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 00:38:11.823161 update_engine[1154]: I0213 00:38:11.823041 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:38:11.824108 update_engine[1154]: I0213 00:38:11.823551 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:38:11.824108 update_engine[1154]: E0213 00:38:11.823762 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:38:11.824108 update_engine[1154]: I0213 00:38:11.823911 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 00:38:11.824108 update_engine[1154]: I0213 00:38:11.823927 1154 omaha_request_action.cc:621] Omaha request response: Feb 13 00:38:11.824108 update_engine[1154]: E0213 00:38:11.824069 1154 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 00:38:11.824108 update_engine[1154]: I0213 00:38:11.824095 1154 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 00:38:11.824108 update_engine[1154]: I0213 00:38:11.824105 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 00:38:11.824108 update_engine[1154]: I0213 00:38:11.824115 1154 update_attempter.cc:306] Processing Done. Feb 13 00:38:11.824933 update_engine[1154]: E0213 00:38:11.824141 1154 update_attempter.cc:619] Update failed. Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824151 1154 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824158 1154 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824167 1154 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824318 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824369 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824379 1154 omaha_request_action.cc:271] Request: Feb 13 00:38:11.824933 update_engine[1154]: Feb 13 00:38:11.824933 update_engine[1154]: Feb 13 00:38:11.824933 update_engine[1154]: Feb 13 00:38:11.824933 update_engine[1154]: Feb 13 00:38:11.824933 update_engine[1154]: Feb 13 00:38:11.824933 update_engine[1154]: Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824389 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:38:11.824933 update_engine[1154]: I0213 00:38:11.824770 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:38:11.826277 update_engine[1154]: E0213 00:38:11.824999 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825189 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825208 1154 omaha_request_action.cc:621] Omaha request response: Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825218 1154 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825227 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825234 1154 update_attempter.cc:306] Processing Done. Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825241 1154 update_attempter.cc:310] Error event sent. Feb 13 00:38:11.826277 update_engine[1154]: I0213 00:38:11.825268 1154 update_check_scheduler.cc:74] Next update check in 48m55s Feb 13 00:38:11.827017 locksmithd[1176]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 00:38:11.827017 locksmithd[1176]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 00:41:06.229633 systemd[1]: Started sshd@9-136.144.54.113:22-193.122.166.253:41714.service. Feb 13 00:41:06.721423 sshd[1735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 user=root Feb 13 00:41:08.561053 sshd[1735]: Failed password for root from 193.122.166.253 port 41714 ssh2 Feb 13 00:41:10.769547 sshd[1735]: Failed password for root from 193.122.166.253 port 41714 ssh2 Feb 13 00:41:14.437912 sshd[1735]: Failed password for root from 193.122.166.253 port 41714 ssh2 Feb 13 00:41:18.769204 sshd[1735]: Failed password for root from 193.122.166.253 port 41714 ssh2 Feb 13 00:41:20.006411 sshd[1735]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 00:41:22.101912 sshd[1735]: Failed password for root from 193.122.166.253 port 41714 ssh2 Feb 13 00:41:25.966923 sshd[1735]: Failed password for root from 193.122.166.253 port 41714 ssh2 Feb 13 00:41:27.499614 sshd[1735]: maximum authentication attempts exceeded for root from 193.122.166.253 port 41714 ssh2 [preauth] Feb 13 00:41:27.499614 sshd[1735]: Disconnecting authenticating user root 193.122.166.253 port 41714: Too many authentication failures [preauth] Feb 13 00:41:27.500379 sshd[1735]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 user=root Feb 13 00:41:27.500390 sshd[1735]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:41:27.502421 systemd[1]: sshd@9-136.144.54.113:22-193.122.166.253:41714.service: Deactivated successfully. Feb 13 00:41:27.659763 systemd[1]: Started sshd@10-136.144.54.113:22-193.122.166.253:35688.service. Feb 13 00:41:28.397382 sshd[1740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 user=root Feb 13 00:41:30.593095 sshd[1740]: Failed password for root from 193.122.166.253 port 35688 ssh2 Feb 13 00:41:34.588700 sshd[1740]: Failed password for root from 193.122.166.253 port 35688 ssh2 Feb 13 00:41:38.117251 sshd[1740]: Failed password for root from 193.122.166.253 port 35688 ssh2 Feb 13 00:41:42.117455 sshd[1740]: Failed password for root from 193.122.166.253 port 35688 ssh2 Feb 13 00:41:45.786280 sshd[1740]: Failed password for root from 193.122.166.253 port 35688 ssh2 Feb 13 00:41:49.119115 sshd[1740]: Failed password for root from 193.122.166.253 port 35688 ssh2 Feb 13 00:41:49.168798 sshd[1740]: maximum authentication attempts exceeded for root from 193.122.166.253 port 35688 ssh2 [preauth] Feb 13 00:41:49.168798 sshd[1740]: Disconnecting authenticating user root 193.122.166.253 port 35688: Too many authentication failures [preauth] Feb 13 00:41:49.169455 sshd[1740]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 user=root Feb 13 00:41:49.169469 sshd[1740]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:41:49.171497 systemd[1]: sshd@10-136.144.54.113:22-193.122.166.253:35688.service: Deactivated successfully. Feb 13 00:41:49.328193 systemd[1]: Started sshd@11-136.144.54.113:22-193.122.166.253:49626.service. Feb 13 00:41:49.968450 sshd[1744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 user=root Feb 13 00:41:51.712738 sshd[1744]: Failed password for root from 193.122.166.253 port 49626 ssh2 Feb 13 00:41:54.242991 sshd[1744]: Failed password for root from 193.122.166.253 port 49626 ssh2 Feb 13 00:41:57.911446 sshd[1744]: Failed password for root from 193.122.166.253 port 49626 ssh2 Feb 13 00:42:01.243841 sshd[1744]: Failed password for root from 193.122.166.253 port 49626 ssh2 Feb 13 00:42:03.113923 sshd[1744]: Failed password for root from 193.122.166.253 port 49626 ssh2 Feb 13 00:42:03.325375 sshd[1744]: Received disconnect from 193.122.166.253 port 49626:11: disconnected by user [preauth] Feb 13 00:42:03.325375 sshd[1744]: Disconnected from authenticating user root 193.122.166.253 port 49626 [preauth] Feb 13 00:42:03.325907 sshd[1744]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 user=root Feb 13 00:42:03.325920 sshd[1744]: PAM service(sshd) ignoring max retries; 5 > 3 Feb 13 00:42:03.327983 systemd[1]: sshd@11-136.144.54.113:22-193.122.166.253:49626.service: Deactivated successfully. Feb 13 00:42:03.409363 systemd[1]: Started sshd@12-136.144.54.113:22-193.122.166.253:37662.service. Feb 13 00:42:04.130962 sshd[1748]: Invalid user admin from 193.122.166.253 port 37662 Feb 13 00:42:04.136994 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:04.138121 sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:04.138210 sshd[1748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:04.139127 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:06.274599 sshd[1748]: Failed password for invalid user admin from 193.122.166.253 port 37662 ssh2 Feb 13 00:42:06.559103 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:06.560234 sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:06.561192 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:08.641148 sshd[1748]: Failed password for invalid user admin from 193.122.166.253 port 37662 ssh2 Feb 13 00:42:08.988962 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:08.989951 sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:08.990884 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:11.010813 sshd[1748]: Failed password for invalid user admin from 193.122.166.253 port 37662 ssh2 Feb 13 00:42:11.420272 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:11.421383 sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:11.422359 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:13.186545 sshd[1748]: Failed password for invalid user admin from 193.122.166.253 port 37662 ssh2 Feb 13 00:42:13.850579 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:13.851557 sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:13.852500 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:16.222727 sshd[1748]: Failed password for invalid user admin from 193.122.166.253 port 37662 ssh2 Feb 13 00:42:18.634227 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:18.635325 sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:18.636270 sshd[1748]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:20.696210 sshd[1748]: Failed password for invalid user admin from 193.122.166.253 port 37662 ssh2 Feb 13 00:42:20.986891 sshd[1748]: maximum authentication attempts exceeded for invalid user admin from 193.122.166.253 port 37662 ssh2 [preauth] Feb 13 00:42:20.986891 sshd[1748]: Disconnecting invalid user admin 193.122.166.253 port 37662: Too many authentication failures [preauth] Feb 13 00:42:20.987486 sshd[1748]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:20.987501 sshd[1748]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:42:20.989501 systemd[1]: sshd@12-136.144.54.113:22-193.122.166.253:37662.service: Deactivated successfully. Feb 13 00:42:21.145228 systemd[1]: Started sshd@13-136.144.54.113:22-193.122.166.253:46114.service. Feb 13 00:42:21.811934 sshd[1753]: Invalid user admin from 193.122.166.253 port 46114 Feb 13 00:42:21.818037 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:21.819002 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:21.819094 sshd[1753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:21.819985 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:24.291664 sshd[1753]: Failed password for invalid user admin from 193.122.166.253 port 46114 ssh2 Feb 13 00:42:26.587911 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:26.588906 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:26.589868 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:28.745616 sshd[1753]: Failed password for invalid user admin from 193.122.166.253 port 46114 ssh2 Feb 13 00:42:29.014991 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:29.015973 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:29.016913 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:31.252723 sshd[1753]: Failed password for invalid user admin from 193.122.166.253 port 46114 ssh2 Feb 13 00:42:31.452425 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:31.453397 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:31.454408 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:33.966035 sshd[1753]: Failed password for invalid user admin from 193.122.166.253 port 46114 ssh2 Feb 13 00:42:36.231395 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:36.232417 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:36.233407 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:38.429204 sshd[1753]: Failed password for invalid user admin from 193.122.166.253 port 46114 ssh2 Feb 13 00:42:38.657973 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:38.658974 sshd[1753]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:38.659920 sshd[1753]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:40.464185 sshd[1753]: Failed password for invalid user admin from 193.122.166.253 port 46114 ssh2 Feb 13 00:42:41.010676 sshd[1753]: maximum authentication attempts exceeded for invalid user admin from 193.122.166.253 port 46114 ssh2 [preauth] Feb 13 00:42:41.010676 sshd[1753]: Disconnecting invalid user admin 193.122.166.253 port 46114: Too many authentication failures [preauth] Feb 13 00:42:41.011372 sshd[1753]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:41.011387 sshd[1753]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:42:41.013422 systemd[1]: sshd@13-136.144.54.113:22-193.122.166.253:46114.service: Deactivated successfully. Feb 13 00:42:41.161311 systemd[1]: Started sshd@14-136.144.54.113:22-193.122.166.253:52734.service. Feb 13 00:42:42.013305 sshd[1757]: Invalid user admin from 193.122.166.253 port 52734 Feb 13 00:42:42.019432 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:42.020395 sshd[1757]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:42.020483 sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:42.021405 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:44.041564 sshd[1757]: Failed password for invalid user admin from 193.122.166.253 port 52734 ssh2 Feb 13 00:42:44.435329 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:44.436320 sshd[1757]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:44.437274 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:46.733148 sshd[1757]: Failed password for invalid user admin from 193.122.166.253 port 52734 ssh2 Feb 13 00:42:46.860117 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:46.861206 sshd[1757]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:46.862325 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:49.098164 sshd[1757]: Failed password for invalid user admin from 193.122.166.253 port 52734 ssh2 Feb 13 00:42:49.286896 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:49.287900 sshd[1757]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:49.288848 sshd[1757]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:50.937413 sshd[1757]: Failed password for invalid user admin from 193.122.166.253 port 52734 ssh2 Feb 13 00:42:51.710786 sshd[1757]: Received disconnect from 193.122.166.253 port 52734:11: disconnected by user [preauth] Feb 13 00:42:51.710786 sshd[1757]: Disconnected from invalid user admin 193.122.166.253 port 52734 [preauth] Feb 13 00:42:51.711279 sshd[1757]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:51.711293 sshd[1757]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:42:51.713308 systemd[1]: sshd@14-136.144.54.113:22-193.122.166.253:52734.service: Deactivated successfully. Feb 13 00:42:51.790154 systemd[1]: Started sshd@15-136.144.54.113:22-193.122.166.253:43860.service. Feb 13 00:42:52.551848 sshd[1761]: Invalid user oracle from 193.122.166.253 port 43860 Feb 13 00:42:52.557888 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:52.558901 sshd[1761]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:52.558990 sshd[1761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:42:52.559885 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:55.287389 sshd[1761]: Failed password for invalid user oracle from 193.122.166.253 port 43860 ssh2 Feb 13 00:42:55.981383 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:55.982424 sshd[1761]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:55.983382 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:58.455064 sshd[1761]: Failed password for invalid user oracle from 193.122.166.253 port 43860 ssh2 Feb 13 00:42:59.413393 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:42:59.414384 sshd[1761]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:42:59.415331 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:01.435438 sshd[1761]: Failed password for invalid user oracle from 193.122.166.253 port 43860 ssh2 Feb 13 00:43:02.843460 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:02.844432 sshd[1761]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:02.845382 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:04.945564 sshd[1761]: Failed password for invalid user oracle from 193.122.166.253 port 43860 ssh2 Feb 13 00:43:06.273759 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:06.274819 sshd[1761]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:06.275869 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:08.591827 sshd[1761]: Failed password for invalid user oracle from 193.122.166.253 port 43860 ssh2 Feb 13 00:43:09.705420 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:09.706405 sshd[1761]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:09.707353 sshd[1761]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:11.767565 sshd[1761]: Failed password for invalid user oracle from 193.122.166.253 port 43860 ssh2 Feb 13 00:43:13.062915 sshd[1761]: maximum authentication attempts exceeded for invalid user oracle from 193.122.166.253 port 43860 ssh2 [preauth] Feb 13 00:43:13.062915 sshd[1761]: Disconnecting invalid user oracle 193.122.166.253 port 43860: Too many authentication failures [preauth] Feb 13 00:43:13.063594 sshd[1761]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:43:13.063606 sshd[1761]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:43:13.065627 systemd[1]: sshd@15-136.144.54.113:22-193.122.166.253:43860.service: Deactivated successfully. Feb 13 00:43:13.226276 systemd[1]: Started sshd@16-136.144.54.113:22-193.122.166.253:41664.service. Feb 13 00:43:13.838486 sshd[1766]: Invalid user oracle from 193.122.166.253 port 41664 Feb 13 00:43:13.844586 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:13.845552 sshd[1766]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:13.845643 sshd[1766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:43:13.846568 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:15.455070 sshd[1766]: Failed password for invalid user oracle from 193.122.166.253 port 41664 ssh2 Feb 13 00:43:15.594081 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:15.595175 sshd[1766]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:15.596147 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:18.147922 sshd[1766]: Failed password for invalid user oracle from 193.122.166.253 port 41664 ssh2 Feb 13 00:43:19.035056 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:19.036028 sshd[1766]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:19.036967 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:21.137189 sshd[1766]: Failed password for invalid user oracle from 193.122.166.253 port 41664 ssh2 Feb 13 00:43:22.475903 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:22.476902 sshd[1766]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:22.477846 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:24.656801 sshd[1766]: Failed password for invalid user oracle from 193.122.166.253 port 41664 ssh2 Feb 13 00:43:25.913768 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:25.914830 sshd[1766]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:25.915894 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:27.840196 sshd[1766]: Failed password for invalid user oracle from 193.122.166.253 port 41664 ssh2 Feb 13 00:43:29.356340 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:29.357309 sshd[1766]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:29.358254 sshd[1766]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:31.162655 sshd[1766]: Failed password for invalid user oracle from 193.122.166.253 port 41664 ssh2 Feb 13 00:43:32.713862 sshd[1766]: maximum authentication attempts exceeded for invalid user oracle from 193.122.166.253 port 41664 ssh2 [preauth] Feb 13 00:43:32.713862 sshd[1766]: Disconnecting invalid user oracle 193.122.166.253 port 41664: Too many authentication failures [preauth] Feb 13 00:43:32.714558 sshd[1766]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:43:32.714571 sshd[1766]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:43:32.716591 systemd[1]: sshd@16-136.144.54.113:22-193.122.166.253:41664.service: Deactivated successfully. Feb 13 00:43:32.869976 systemd[1]: Started sshd@17-136.144.54.113:22-193.122.166.253:57938.service. Feb 13 00:43:32.870715 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 00:43:32.876118 systemd-tmpfiles[1771]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 00:43:32.876373 systemd-tmpfiles[1771]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 00:43:32.877119 systemd-tmpfiles[1771]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 00:43:32.887591 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 00:43:32.887675 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 00:43:32.888457 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 00:43:33.556162 sshd[1770]: Invalid user oracle from 193.122.166.253 port 57938 Feb 13 00:43:33.562424 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:33.563404 sshd[1770]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:33.563496 sshd[1770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:43:33.564409 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:35.253271 sshd[1770]: Failed password for invalid user oracle from 193.122.166.253 port 57938 ssh2 Feb 13 00:43:36.985418 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:36.986485 sshd[1770]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:36.987460 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:38.420258 sshd[1770]: Failed password for invalid user oracle from 193.122.166.253 port 57938 ssh2 Feb 13 00:43:38.738618 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:38.739579 sshd[1770]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:38.740536 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:41.116677 sshd[1770]: Failed password for invalid user oracle from 193.122.166.253 port 57938 ssh2 Feb 13 00:43:42.173980 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:42.174957 sshd[1770]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:42.175941 sshd[1770]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:44.432002 sshd[1770]: Failed password for invalid user oracle from 193.122.166.253 port 57938 ssh2 Feb 13 00:43:45.606700 sshd[1770]: Received disconnect from 193.122.166.253 port 57938:11: disconnected by user [preauth] Feb 13 00:43:45.606700 sshd[1770]: Disconnected from invalid user oracle 193.122.166.253 port 57938 [preauth] Feb 13 00:43:45.607179 sshd[1770]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:43:45.607190 sshd[1770]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:43:45.609272 systemd[1]: sshd@17-136.144.54.113:22-193.122.166.253:57938.service: Deactivated successfully. Feb 13 00:43:45.688725 systemd[1]: Started sshd@18-136.144.54.113:22-193.122.166.253:39802.service. Feb 13 00:43:46.222835 sshd[1776]: Invalid user usuario from 193.122.166.253 port 39802 Feb 13 00:43:46.229039 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:46.230145 sshd[1776]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:46.230234 sshd[1776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:43:46.231254 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:48.370753 sshd[1776]: Failed password for invalid user usuario from 193.122.166.253 port 39802 ssh2 Feb 13 00:43:50.315844 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:50.316873 sshd[1776]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:50.317845 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:52.673741 sshd[1776]: Failed password for invalid user usuario from 193.122.166.253 port 39802 ssh2 Feb 13 00:43:54.411851 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:54.412929 sshd[1776]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:54.413850 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:56.649697 sshd[1776]: Failed password for invalid user usuario from 193.122.166.253 port 39802 ssh2 Feb 13 00:43:58.510971 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:43:58.511942 sshd[1776]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:43:58.512886 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:00.633262 sshd[1776]: Failed password for invalid user usuario from 193.122.166.253 port 39802 ssh2 Feb 13 00:44:02.606626 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:02.607621 sshd[1776]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:02.608572 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:04.944746 sshd[1776]: Failed password for invalid user usuario from 193.122.166.253 port 39802 ssh2 Feb 13 00:44:06.702994 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:06.703949 sshd[1776]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:06.704921 sshd[1776]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:08.257975 sshd[1776]: Failed password for invalid user usuario from 193.122.166.253 port 39802 ssh2 Feb 13 00:44:08.713992 sshd[1776]: maximum authentication attempts exceeded for invalid user usuario from 193.122.166.253 port 39802 ssh2 [preauth] Feb 13 00:44:08.713992 sshd[1776]: Disconnecting invalid user usuario 193.122.166.253 port 39802: Too many authentication failures [preauth] Feb 13 00:44:08.714685 sshd[1776]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:08.714701 sshd[1776]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:44:08.716751 systemd[1]: sshd@18-136.144.54.113:22-193.122.166.253:39802.service: Deactivated successfully. Feb 13 00:44:08.870971 systemd[1]: Started sshd@19-136.144.54.113:22-193.122.166.253:36340.service. Feb 13 00:44:09.500032 sshd[1783]: Invalid user usuario from 193.122.166.253 port 36340 Feb 13 00:44:09.506016 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:09.506982 sshd[1783]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:09.507072 sshd[1783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:09.507967 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:11.472725 sshd[1783]: Failed password for invalid user usuario from 193.122.166.253 port 36340 ssh2 Feb 13 00:44:11.586323 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:11.587490 sshd[1783]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:11.588454 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:12.825799 sshd[1783]: Failed password for invalid user usuario from 193.122.166.253 port 36340 ssh2 Feb 13 00:44:13.675568 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:13.676618 sshd[1783]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:13.677721 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:16.189637 sshd[1783]: Failed password for invalid user usuario from 193.122.166.253 port 36340 ssh2 Feb 13 00:44:17.777303 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:17.778397 sshd[1783]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:17.779354 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:19.508278 sshd[1783]: Failed password for invalid user usuario from 193.122.166.253 port 36340 ssh2 Feb 13 00:44:19.866452 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:19.867598 sshd[1783]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:19.868549 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:21.873295 sshd[1783]: Failed password for invalid user usuario from 193.122.166.253 port 36340 ssh2 Feb 13 00:44:21.955598 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:21.956593 sshd[1783]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:21.957568 sshd[1783]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:23.902274 sshd[1783]: Failed password for invalid user usuario from 193.122.166.253 port 36340 ssh2 Feb 13 00:44:23.966844 sshd[1783]: maximum authentication attempts exceeded for invalid user usuario from 193.122.166.253 port 36340 ssh2 [preauth] Feb 13 00:44:23.966844 sshd[1783]: Disconnecting invalid user usuario 193.122.166.253 port 36340: Too many authentication failures [preauth] Feb 13 00:44:23.967551 sshd[1783]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:23.967565 sshd[1783]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:44:23.969593 systemd[1]: sshd@19-136.144.54.113:22-193.122.166.253:36340.service: Deactivated successfully. Feb 13 00:44:24.121200 systemd[1]: Started sshd@20-136.144.54.113:22-193.122.166.253:49346.service. Feb 13 00:44:24.857112 sshd[1791]: Invalid user usuario from 193.122.166.253 port 49346 Feb 13 00:44:24.863345 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:24.864350 sshd[1791]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:24.864439 sshd[1791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:24.865352 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:27.221720 sshd[1791]: Failed password for invalid user usuario from 193.122.166.253 port 49346 ssh2 Feb 13 00:44:28.951045 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:28.952137 sshd[1791]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:28.953112 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:31.193651 sshd[1791]: Failed password for invalid user usuario from 193.122.166.253 port 49346 ssh2 Feb 13 00:44:33.046119 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:33.047202 sshd[1791]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:33.048307 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:34.973045 sshd[1791]: Failed password for invalid user usuario from 193.122.166.253 port 49346 ssh2 Feb 13 00:44:35.127814 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:35.128884 sshd[1791]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:35.129928 sshd[1791]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:36.663170 sshd[1791]: Failed password for invalid user usuario from 193.122.166.253 port 49346 ssh2 Feb 13 00:44:37.208807 sshd[1791]: Received disconnect from 193.122.166.253 port 49346:11: disconnected by user [preauth] Feb 13 00:44:37.208807 sshd[1791]: Disconnected from invalid user usuario 193.122.166.253 port 49346 [preauth] Feb 13 00:44:37.209312 sshd[1791]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:37.209326 sshd[1791]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:44:37.211340 systemd[1]: sshd@20-136.144.54.113:22-193.122.166.253:49346.service: Deactivated successfully. Feb 13 00:44:37.295191 systemd[1]: Started sshd@21-136.144.54.113:22-193.122.166.253:40676.service. Feb 13 00:44:38.159574 sshd[1795]: Invalid user test from 193.122.166.253 port 40676 Feb 13 00:44:38.165614 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:38.166606 sshd[1795]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:38.166694 sshd[1795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:38.167581 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:40.778694 sshd[1795]: Failed password for invalid user test from 193.122.166.253 port 40676 ssh2 Feb 13 00:44:41.914366 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:41.915414 sshd[1795]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:41.916375 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:43.273893 sshd[1795]: Failed password for invalid user test from 193.122.166.253 port 40676 ssh2 Feb 13 00:44:43.831414 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:43.832447 sshd[1795]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:43.833394 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:45.797741 sshd[1795]: Failed password for invalid user test from 193.122.166.253 port 40676 ssh2 Feb 13 00:44:47.588969 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:47.590060 sshd[1795]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:47.591025 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:49.771619 sshd[1795]: Failed password for invalid user test from 193.122.166.253 port 40676 ssh2 Feb 13 00:44:51.349876 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:51.350969 sshd[1795]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:51.351940 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:53.416840 sshd[1795]: Failed password for invalid user test from 193.122.166.253 port 40676 ssh2 Feb 13 00:44:55.107256 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:55.108244 sshd[1795]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:55.109216 sshd[1795]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:57.054046 sshd[1795]: Failed password for invalid user test from 193.122.166.253 port 40676 ssh2 Feb 13 00:44:58.787307 sshd[1795]: maximum authentication attempts exceeded for invalid user test from 193.122.166.253 port 40676 ssh2 [preauth] Feb 13 00:44:58.787307 sshd[1795]: Disconnecting invalid user test 193.122.166.253 port 40676: Too many authentication failures [preauth] Feb 13 00:44:58.788022 sshd[1795]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:58.788033 sshd[1795]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:44:58.790130 systemd[1]: sshd@21-136.144.54.113:22-193.122.166.253:40676.service: Deactivated successfully. Feb 13 00:44:58.948366 systemd[1]: Started sshd@22-136.144.54.113:22-193.122.166.253:49862.service. Feb 13 00:44:59.603228 sshd[1799]: Invalid user test from 193.122.166.253 port 49862 Feb 13 00:44:59.609380 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:44:59.610347 sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:44:59.610435 sshd[1799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:44:59.611338 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:01.772053 sshd[1799]: Failed password for invalid user test from 193.122.166.253 port 49862 ssh2 Feb 13 00:45:03.357704 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:03.358721 sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:03.359820 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:05.404751 sshd[1799]: Failed password for invalid user test from 193.122.166.253 port 49862 ssh2 Feb 13 00:45:07.115202 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:07.116294 sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:07.117250 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:09.041913 sshd[1799]: Failed password for invalid user test from 193.122.166.253 port 49862 ssh2 Feb 13 00:45:10.874911 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:10.875995 sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:10.876943 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:12.881699 sshd[1799]: Failed password for invalid user test from 193.122.166.253 port 49862 ssh2 Feb 13 00:45:14.632348 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:14.633356 sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:14.634336 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:16.855125 sshd[1799]: Failed password for invalid user test from 193.122.166.253 port 49862 ssh2 Feb 13 00:45:18.389612 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:18.390587 sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:18.391534 sshd[1799]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:20.160727 sshd[1799]: Failed password for invalid user test from 193.122.166.253 port 49862 ssh2 Feb 13 00:45:20.229323 sshd[1799]: maximum authentication attempts exceeded for invalid user test from 193.122.166.253 port 49862 ssh2 [preauth] Feb 13 00:45:20.229323 sshd[1799]: Disconnecting invalid user test 193.122.166.253 port 49862: Too many authentication failures [preauth] Feb 13 00:45:20.229992 sshd[1799]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:45:20.230006 sshd[1799]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:45:20.232070 systemd[1]: sshd@22-136.144.54.113:22-193.122.166.253:49862.service: Deactivated successfully. Feb 13 00:45:20.389283 systemd[1]: Started sshd@23-136.144.54.113:22-193.122.166.253:52886.service. Feb 13 00:45:20.866140 sshd[1803]: Invalid user test from 193.122.166.253 port 52886 Feb 13 00:45:20.872183 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:20.873245 sshd[1803]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:20.873334 sshd[1803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:45:20.874265 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:22.583469 sshd[1803]: Failed password for invalid user test from 193.122.166.253 port 52886 ssh2 Feb 13 00:45:22.779745 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:22.780819 sshd[1803]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:22.781823 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:24.765920 sshd[1803]: Failed password for invalid user test from 193.122.166.253 port 52886 ssh2 Feb 13 00:45:26.536221 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:26.537213 sshd[1803]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:26.538176 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:28.738914 sshd[1803]: Failed password for invalid user test from 193.122.166.253 port 52886 ssh2 Feb 13 00:45:30.295006 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:30.296097 sshd[1803]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:30.297092 sshd[1803]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:32.046282 sshd[1803]: Failed password for invalid user test from 193.122.166.253 port 52886 ssh2 Feb 13 00:45:32.213536 sshd[1803]: Received disconnect from 193.122.166.253 port 52886:11: disconnected by user [preauth] Feb 13 00:45:32.213536 sshd[1803]: Disconnected from invalid user test 193.122.166.253 port 52886 [preauth] Feb 13 00:45:32.214053 sshd[1803]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:45:32.214069 sshd[1803]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:45:32.216122 systemd[1]: sshd@23-136.144.54.113:22-193.122.166.253:52886.service: Deactivated successfully. Feb 13 00:45:32.293172 systemd[1]: Started sshd@24-136.144.54.113:22-193.122.166.253:51898.service. Feb 13 00:45:32.911091 sshd[1808]: Invalid user user from 193.122.166.253 port 51898 Feb 13 00:45:32.917032 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:32.917989 sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:32.918074 sshd[1808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:45:32.918978 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:34.944053 sshd[1808]: Failed password for invalid user user from 193.122.166.253 port 51898 ssh2 Feb 13 00:45:35.072846 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:35.073809 sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:35.074895 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:36.512672 sshd[1808]: Failed password for invalid user user from 193.122.166.253 port 51898 ssh2 Feb 13 00:45:37.240348 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:37.241369 sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:37.242368 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:39.287431 sshd[1808]: Failed password for invalid user user from 193.122.166.253 port 51898 ssh2 Feb 13 00:45:39.405302 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:39.406375 sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:39.407365 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:41.392390 sshd[1808]: Failed password for invalid user user from 193.122.166.253 port 51898 ssh2 Feb 13 00:45:41.569950 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:41.571036 sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:41.571964 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:43.165456 sshd[1808]: Failed password for invalid user user from 193.122.166.253 port 51898 ssh2 Feb 13 00:45:43.736248 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:43.737268 sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:43.738224 sshd[1808]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:45.271705 sshd[1808]: Failed password for invalid user user from 193.122.166.253 port 51898 ssh2 Feb 13 00:45:45.828405 sshd[1808]: maximum authentication attempts exceeded for invalid user user from 193.122.166.253 port 51898 ssh2 [preauth] Feb 13 00:45:45.828405 sshd[1808]: Disconnecting invalid user user 193.122.166.253 port 51898: Too many authentication failures [preauth] Feb 13 00:45:45.829100 sshd[1808]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:45:45.829114 sshd[1808]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:45:45.831158 systemd[1]: sshd@24-136.144.54.113:22-193.122.166.253:51898.service: Deactivated successfully. Feb 13 00:45:45.975612 systemd[1]: Started sshd@25-136.144.54.113:22-193.122.166.253:50238.service. Feb 13 00:45:46.586552 sshd[1812]: Invalid user user from 193.122.166.253 port 50238 Feb 13 00:45:46.592607 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:46.593591 sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:46.593679 sshd[1812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:45:46.594580 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:48.874929 sshd[1812]: Failed password for invalid user user from 193.122.166.253 port 50238 ssh2 Feb 13 00:45:50.839139 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:50.840183 sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:50.841210 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:52.670553 sshd[1812]: Failed password for invalid user user from 193.122.166.253 port 50238 ssh2 Feb 13 00:45:53.002006 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:53.003098 sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:53.004076 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:54.577617 sshd[1812]: Failed password for invalid user user from 193.122.166.253 port 50238 ssh2 Feb 13 00:45:55.164871 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:55.165967 sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:55.166911 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:56.680394 sshd[1812]: Failed password for invalid user user from 193.122.166.253 port 50238 ssh2 Feb 13 00:45:57.329225 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:57.330222 sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:45:57.331179 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:45:59.456346 sshd[1812]: Failed password for invalid user user from 193.122.166.253 port 50238 ssh2 Feb 13 00:46:01.586533 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:01.587505 sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:01.588454 sshd[1812]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:03.593014 sshd[1812]: Failed password for invalid user user from 193.122.166.253 port 50238 ssh2 Feb 13 00:46:03.678652 sshd[1812]: maximum authentication attempts exceeded for invalid user user from 193.122.166.253 port 50238 ssh2 [preauth] Feb 13 00:46:03.678652 sshd[1812]: Disconnecting invalid user user 193.122.166.253 port 50238: Too many authentication failures [preauth] Feb 13 00:46:03.679367 sshd[1812]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:03.679383 sshd[1812]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:46:03.681415 systemd[1]: sshd@25-136.144.54.113:22-193.122.166.253:50238.service: Deactivated successfully. Feb 13 00:46:03.836577 systemd[1]: Started sshd@26-136.144.54.113:22-193.122.166.253:57598.service. Feb 13 00:46:04.365259 sshd[1816]: Invalid user user from 193.122.166.253 port 57598 Feb 13 00:46:04.371431 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:04.372443 sshd[1816]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:04.372556 sshd[1816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:04.373466 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:06.790159 sshd[1816]: Failed password for invalid user user from 193.122.166.253 port 57598 ssh2 Feb 13 00:46:08.624952 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:08.625906 sshd[1816]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:08.626877 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:10.927826 sshd[1816]: Failed password for invalid user user from 193.122.166.253 port 57598 ssh2 Feb 13 00:46:12.887588 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:12.888553 sshd[1816]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:12.889487 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:14.738928 sshd[1816]: Failed password for invalid user user from 193.122.166.253 port 57598 ssh2 Feb 13 00:46:15.057549 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:15.058641 sshd[1816]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:15.059795 sshd[1816]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:17.320692 sshd[1816]: Failed password for invalid user user from 193.122.166.253 port 57598 ssh2 Feb 13 00:46:19.319209 sshd[1816]: Received disconnect from 193.122.166.253 port 57598:11: disconnected by user [preauth] Feb 13 00:46:19.319209 sshd[1816]: Disconnected from invalid user user 193.122.166.253 port 57598 [preauth] Feb 13 00:46:19.319719 sshd[1816]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:19.319729 sshd[1816]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:46:19.321732 systemd[1]: sshd@26-136.144.54.113:22-193.122.166.253:57598.service: Deactivated successfully. Feb 13 00:46:19.397953 systemd[1]: Started sshd@27-136.144.54.113:22-193.122.166.253:54818.service. Feb 13 00:46:20.111420 sshd[1821]: Invalid user ftpuser from 193.122.166.253 port 54818 Feb 13 00:46:20.117416 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:20.118560 sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:20.118650 sshd[1821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:20.119569 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:22.400420 sshd[1821]: Failed password for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 Feb 13 00:46:23.508900 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:23.510084 sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:23.511076 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:24.868931 sshd[1821]: Failed password for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 Feb 13 00:46:25.246186 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:25.247374 sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:25.248371 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:26.882055 sshd[1821]: Failed password for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 Feb 13 00:46:26.983619 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:26.984796 sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:26.985860 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:29.090920 sshd[1821]: Failed password for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 Feb 13 00:46:30.384270 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:30.385421 sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:30.386421 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:32.040149 sshd[1821]: Failed password for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 Feb 13 00:46:32.122892 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:32.124039 sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:32.125007 sshd[1821]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:34.054554 sshd[1821]: Failed password for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 Feb 13 00:46:35.448237 sshd[1821]: maximum authentication attempts exceeded for invalid user ftpuser from 193.122.166.253 port 54818 ssh2 [preauth] Feb 13 00:46:35.448237 sshd[1821]: Disconnecting invalid user ftpuser 193.122.166.253 port 54818: Too many authentication failures [preauth] Feb 13 00:46:35.448937 sshd[1821]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:35.448949 sshd[1821]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:46:35.450947 systemd[1]: sshd@27-136.144.54.113:22-193.122.166.253:54818.service: Deactivated successfully. Feb 13 00:46:35.608034 systemd[1]: Started sshd@28-136.144.54.113:22-193.122.166.253:52096.service. Feb 13 00:46:36.261882 sshd[1825]: Invalid user ftpuser from 193.122.166.253 port 52096 Feb 13 00:46:36.268012 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:36.268980 sshd[1825]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:36.269069 sshd[1825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:36.269965 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:38.079503 sshd[1825]: Failed password for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 Feb 13 00:46:39.661402 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:39.662455 sshd[1825]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:39.663408 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:41.884451 sshd[1825]: Failed password for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 Feb 13 00:46:43.063497 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:43.064488 sshd[1825]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:43.065419 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:45.170737 sshd[1825]: Failed password for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 Feb 13 00:46:46.464008 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:46.464968 sshd[1825]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:46.465965 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:48.982827 sshd[1825]: Failed password for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 Feb 13 00:46:49.864370 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:49.865416 sshd[1825]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:49.866356 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:51.459920 sshd[1825]: Failed password for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 Feb 13 00:46:51.604818 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:51.605899 sshd[1825]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:51.606852 sshd[1825]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:53.812264 sshd[1825]: Failed password for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 Feb 13 00:46:54.930035 sshd[1825]: maximum authentication attempts exceeded for invalid user ftpuser from 193.122.166.253 port 52096 ssh2 [preauth] Feb 13 00:46:54.930035 sshd[1825]: Disconnecting invalid user ftpuser 193.122.166.253 port 52096: Too many authentication failures [preauth] Feb 13 00:46:54.930762 sshd[1825]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:54.930773 sshd[1825]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:46:54.932786 systemd[1]: sshd@28-136.144.54.113:22-193.122.166.253:52096.service: Deactivated successfully. Feb 13 00:46:55.087310 systemd[1]: Started sshd@29-136.144.54.113:22-193.122.166.253:47828.service. Feb 13 00:46:55.644360 sshd[1829]: Invalid user ftpuser from 193.122.166.253 port 47828 Feb 13 00:46:55.650293 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:55.651293 sshd[1829]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:55.651382 sshd[1829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:46:55.652369 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:57.737729 sshd[1829]: Failed password for invalid user ftpuser from 193.122.166.253 port 47828 ssh2 Feb 13 00:46:59.040743 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:46:59.041789 sshd[1829]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:46:59.042848 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:00.676659 sshd[1829]: Failed password for invalid user ftpuser from 193.122.166.253 port 47828 ssh2 Feb 13 00:47:00.775745 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:00.776818 sshd[1829]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:00.777871 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:02.215908 sshd[1829]: Failed password for invalid user ftpuser from 193.122.166.253 port 47828 ssh2 Feb 13 00:47:02.512304 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:02.513308 sshd[1829]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:02.514257 sshd[1829]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:04.895446 sshd[1829]: Failed password for invalid user ftpuser from 193.122.166.253 port 47828 ssh2 Feb 13 00:47:05.909157 sshd[1829]: Received disconnect from 193.122.166.253 port 47828:11: disconnected by user [preauth] Feb 13 00:47:05.909157 sshd[1829]: Disconnected from invalid user ftpuser 193.122.166.253 port 47828 [preauth] Feb 13 00:47:05.909676 sshd[1829]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:47:05.909687 sshd[1829]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:47:05.911723 systemd[1]: sshd@29-136.144.54.113:22-193.122.166.253:47828.service: Deactivated successfully. Feb 13 00:47:05.993645 systemd[1]: Started sshd@30-136.144.54.113:22-193.122.166.253:56178.service. Feb 13 00:47:06.731872 sshd[1833]: Invalid user test1 from 193.122.166.253 port 56178 Feb 13 00:47:06.738003 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:06.738991 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:06.739080 sshd[1833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:47:06.739967 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:08.669716 sshd[1833]: Failed password for invalid user test1 from 193.122.166.253 port 56178 ssh2 Feb 13 00:47:10.109230 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:10.110243 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:10.111211 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:12.256666 sshd[1833]: Failed password for invalid user test1 from 193.122.166.253 port 56178 ssh2 Feb 13 00:47:13.492533 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:13.493483 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:13.494463 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:15.719921 sshd[1833]: Failed password for invalid user test1 from 193.122.166.253 port 56178 ssh2 Feb 13 00:47:16.872909 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:16.873888 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:16.874866 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:19.511899 sshd[1833]: Failed password for invalid user test1 from 193.122.166.253 port 56178 ssh2 Feb 13 00:47:20.253441 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:20.254429 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:20.255419 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:22.440928 sshd[1833]: Failed password for invalid user test1 from 193.122.166.253 port 56178 ssh2 Feb 13 00:47:23.636992 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:23.638121 sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:23.639185 sshd[1833]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:25.568854 sshd[1833]: Failed password for invalid user test1 from 193.122.166.253 port 56178 ssh2 Feb 13 00:47:26.939983 sshd[1833]: maximum authentication attempts exceeded for invalid user test1 from 193.122.166.253 port 56178 ssh2 [preauth] Feb 13 00:47:26.939983 sshd[1833]: Disconnecting invalid user test1 193.122.166.253 port 56178: Too many authentication failures [preauth] Feb 13 00:47:26.940670 sshd[1833]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:47:26.940681 sshd[1833]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:47:26.942737 systemd[1]: sshd@30-136.144.54.113:22-193.122.166.253:56178.service: Deactivated successfully. Feb 13 00:47:27.104754 systemd[1]: Started sshd@31-136.144.54.113:22-193.122.166.253:44578.service. Feb 13 00:47:27.716965 sshd[1840]: Invalid user test1 from 193.122.166.253 port 44578 Feb 13 00:47:27.723068 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:27.724227 sshd[1840]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:27.724320 sshd[1840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:47:27.725243 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:29.870814 sshd[1840]: Failed password for invalid user test1 from 193.122.166.253 port 44578 ssh2 Feb 13 00:47:31.094036 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:31.095136 sshd[1840]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:31.096127 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:32.790077 sshd[1840]: Failed password for invalid user test1 from 193.122.166.253 port 44578 ssh2 Feb 13 00:47:34.474299 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:34.475313 sshd[1840]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:34.476268 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:36.581759 sshd[1840]: Failed password for invalid user test1 from 193.122.166.253 port 44578 ssh2 Feb 13 00:47:37.855944 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:37.856948 sshd[1840]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:37.857927 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:40.043481 sshd[1840]: Failed password for invalid user test1 from 193.122.166.253 port 44578 ssh2 Feb 13 00:47:41.235824 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:41.236860 sshd[1840]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:41.237812 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:42.971798 sshd[1840]: Failed password for invalid user test1 from 193.122.166.253 port 44578 ssh2 Feb 13 00:47:44.617709 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:44.618716 sshd[1840]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:44.619766 sshd[1840]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:46.765311 sshd[1840]: Failed password for invalid user test1 from 193.122.166.253 port 44578 ssh2 Feb 13 00:47:47.920637 sshd[1840]: maximum authentication attempts exceeded for invalid user test1 from 193.122.166.253 port 44578 ssh2 [preauth] Feb 13 00:47:47.920637 sshd[1840]: Disconnecting invalid user test1 193.122.166.253 port 44578: Too many authentication failures [preauth] Feb 13 00:47:47.921360 sshd[1840]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:47:47.921372 sshd[1840]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:47:47.923404 systemd[1]: sshd@31-136.144.54.113:22-193.122.166.253:44578.service: Deactivated successfully. Feb 13 00:47:48.076899 systemd[1]: Started sshd@32-136.144.54.113:22-193.122.166.253:53552.service. Feb 13 00:47:48.693358 sshd[1844]: Invalid user test1 from 193.122.166.253 port 53552 Feb 13 00:47:48.699342 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:48.700319 sshd[1844]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:48.700409 sshd[1844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:47:48.701316 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:50.730908 sshd[1844]: Failed password for invalid user test1 from 193.122.166.253 port 53552 ssh2 Feb 13 00:47:52.065936 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:52.066928 sshd[1844]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:52.067882 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:54.645021 sshd[1844]: Failed password for invalid user test1 from 193.122.166.253 port 53552 ssh2 Feb 13 00:47:55.441280 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:55.442380 sshd[1844]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:55.443366 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:57.097135 sshd[1844]: Failed password for invalid user test1 from 193.122.166.253 port 53552 ssh2 Feb 13 00:47:58.816899 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:47:58.817877 sshd[1844]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:47:58.818847 sshd[1844]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:01.556082 sshd[1844]: Failed password for invalid user test1 from 193.122.166.253 port 53552 ssh2 Feb 13 00:48:02.191540 sshd[1844]: Received disconnect from 193.122.166.253 port 53552:11: disconnected by user [preauth] Feb 13 00:48:02.191540 sshd[1844]: Disconnected from invalid user test1 193.122.166.253 port 53552 [preauth] Feb 13 00:48:02.192115 sshd[1844]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:02.192130 sshd[1844]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:48:02.194354 systemd[1]: sshd@32-136.144.54.113:22-193.122.166.253:53552.service: Deactivated successfully. Feb 13 00:48:02.281148 systemd[1]: Started sshd@33-136.144.54.113:22-193.122.166.253:40528.service. Feb 13 00:48:02.897624 sshd[1848]: Invalid user test2 from 193.122.166.253 port 40528 Feb 13 00:48:02.903755 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:02.904804 sshd[1848]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:02.904893 sshd[1848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:02.905917 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:04.855834 sshd[1848]: Failed password for invalid user test2 from 193.122.166.253 port 40528 ssh2 Feb 13 00:48:06.815993 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:06.817136 sshd[1848]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:06.818148 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:08.316448 sshd[1848]: Failed password for invalid user test2 from 193.122.166.253 port 40528 ssh2 Feb 13 00:48:08.816217 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:08.817222 sshd[1848]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:08.818180 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:10.923789 sshd[1848]: Failed password for invalid user test2 from 193.122.166.253 port 40528 ssh2 Feb 13 00:48:12.737465 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:12.738451 sshd[1848]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:12.739414 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:14.728716 sshd[1848]: Failed password for invalid user test2 from 193.122.166.253 port 40528 ssh2 Feb 13 00:48:16.658980 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:16.659971 sshd[1848]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:16.661042 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:18.866743 sshd[1848]: Failed password for invalid user test2 from 193.122.166.253 port 40528 ssh2 Feb 13 00:48:20.580324 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:20.581330 sshd[1848]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:20.582272 sshd[1848]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:22.672279 sshd[1848]: Failed password for invalid user test2 from 193.122.166.253 port 40528 ssh2 Feb 13 00:48:24.421455 sshd[1848]: maximum authentication attempts exceeded for invalid user test2 from 193.122.166.253 port 40528 ssh2 [preauth] Feb 13 00:48:24.421455 sshd[1848]: Disconnecting invalid user test2 193.122.166.253 port 40528: Too many authentication failures [preauth] Feb 13 00:48:24.422164 sshd[1848]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:24.422175 sshd[1848]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:48:24.424257 systemd[1]: sshd@33-136.144.54.113:22-193.122.166.253:40528.service: Deactivated successfully. Feb 13 00:48:24.578570 systemd[1]: Started sshd@34-136.144.54.113:22-193.122.166.253:37248.service. Feb 13 00:48:25.159408 sshd[1852]: Invalid user test2 from 193.122.166.253 port 37248 Feb 13 00:48:25.165470 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:25.166417 sshd[1852]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:25.166505 sshd[1852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:25.167558 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:26.941798 sshd[1852]: Failed password for invalid user test2 from 193.122.166.253 port 37248 ssh2 Feb 13 00:48:27.149257 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:27.150324 sshd[1852]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:27.151422 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:29.532745 sshd[1852]: Failed password for invalid user test2 from 193.122.166.253 port 37248 ssh2 Feb 13 00:48:31.063213 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:31.064183 sshd[1852]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:31.065348 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:33.328985 sshd[1852]: Failed password for invalid user test2 from 193.122.166.253 port 37248 ssh2 Feb 13 00:48:34.977226 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:34.978203 sshd[1852]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:34.979351 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:37.656679 sshd[1852]: Failed password for invalid user test2 from 193.122.166.253 port 37248 ssh2 Feb 13 00:48:38.891213 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:38.892192 sshd[1852]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:38.893269 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:41.119030 sshd[1852]: Failed password for invalid user test2 from 193.122.166.253 port 37248 ssh2 Feb 13 00:48:42.805633 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:42.806585 sshd[1852]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:42.807670 sshd[1852]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:44.917717 sshd[1852]: Failed password for invalid user test2 from 193.122.166.253 port 37248 ssh2 Feb 13 00:48:46.646836 sshd[1852]: maximum authentication attempts exceeded for invalid user test2 from 193.122.166.253 port 37248 ssh2 [preauth] Feb 13 00:48:46.646836 sshd[1852]: Disconnecting invalid user test2 193.122.166.253 port 37248: Too many authentication failures [preauth] Feb 13 00:48:46.647780 sshd[1852]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:46.647792 sshd[1852]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:48:46.649848 systemd[1]: sshd@34-136.144.54.113:22-193.122.166.253:37248.service: Deactivated successfully. Feb 13 00:48:46.803424 systemd[1]: Started sshd@35-136.144.54.113:22-193.122.166.253:60628.service. Feb 13 00:48:47.357845 sshd[1856]: Invalid user test2 from 193.122.166.253 port 60628 Feb 13 00:48:47.363896 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:47.365053 sshd[1856]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:47.365142 sshd[1856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:47.366081 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:49.160331 sshd[1856]: Failed password for invalid user test2 from 193.122.166.253 port 60628 ssh2 Feb 13 00:48:49.354624 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:49.355797 sshd[1856]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:49.356852 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:51.091125 sshd[1856]: Failed password for invalid user test2 from 193.122.166.253 port 60628 ssh2 Feb 13 00:48:51.352603 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:51.353753 sshd[1856]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:51.354839 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:53.364907 sshd[1856]: Failed password for invalid user test2 from 193.122.166.253 port 60628 ssh2 Feb 13 00:48:55.271463 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:55.272609 sshd[1856]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:55.273537 sshd[1856]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:57.167901 sshd[1856]: Failed password for invalid user test2 from 193.122.166.253 port 60628 ssh2 Feb 13 00:48:57.268167 sshd[1856]: Received disconnect from 193.122.166.253 port 60628:11: disconnected by user [preauth] Feb 13 00:48:57.268167 sshd[1856]: Disconnected from invalid user test2 193.122.166.253 port 60628 [preauth] Feb 13 00:48:57.268682 sshd[1856]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:57.268696 sshd[1856]: PAM service(sshd) ignoring max retries; 4 > 3 Feb 13 00:48:57.270685 systemd[1]: sshd@35-136.144.54.113:22-193.122.166.253:60628.service: Deactivated successfully. Feb 13 00:48:57.347244 systemd[1]: Started sshd@36-136.144.54.113:22-193.122.166.253:43416.service. Feb 13 00:48:57.928410 sshd[1860]: Invalid user contador from 193.122.166.253 port 43416 Feb 13 00:48:57.934445 sshd[1860]: pam_faillock(sshd:auth): User unknown Feb 13 00:48:57.935420 sshd[1860]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:48:57.935528 sshd[1860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:48:57.936426 sshd[1860]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:00.438170 sshd[1860]: Failed password for invalid user contador from 193.122.166.253 port 43416 ssh2 Feb 13 00:49:02.101494 sshd[1860]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:02.102528 sshd[1860]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:02.103481 sshd[1860]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:04.289161 sshd[1860]: Failed password for invalid user contador from 193.122.166.253 port 43416 ssh2 Feb 13 00:49:06.278924 sshd[1860]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:06.279924 sshd[1860]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:06.280889 sshd[1860]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:08.350789 sshd[1860]: Failed password for invalid user contador from 193.122.166.253 port 43416 ssh2 Feb 13 00:49:10.455352 sshd[1860]: Received disconnect from 193.122.166.253 port 43416:11: disconnected by user [preauth] Feb 13 00:49:10.455352 sshd[1860]: Disconnected from invalid user contador 193.122.166.253 port 43416 [preauth] Feb 13 00:49:10.455852 sshd[1860]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:10.457903 systemd[1]: sshd@36-136.144.54.113:22-193.122.166.253:43416.service: Deactivated successfully. Feb 13 00:49:10.531364 systemd[1]: Started sshd@37-136.144.54.113:22-193.122.166.253:59980.service. Feb 13 00:49:11.089235 sshd[1864]: Invalid user ubuntu from 193.122.166.253 port 59980 Feb 13 00:49:11.095359 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:11.096321 sshd[1864]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:11.096410 sshd[1864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:11.097458 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:13.187728 sshd[1864]: Failed password for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 Feb 13 00:49:13.439729 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:13.440890 sshd[1864]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:13.442001 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:15.472171 sshd[1864]: Failed password for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 Feb 13 00:49:15.793983 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:15.795020 sshd[1864]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:15.796091 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:17.434751 sshd[1864]: Failed password for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 Feb 13 00:49:18.147375 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:18.148403 sshd[1864]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:18.149524 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:20.199714 sshd[1864]: Failed password for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 Feb 13 00:49:20.500818 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:20.501968 sshd[1864]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:20.503059 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:22.829070 sshd[1864]: Failed password for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 Feb 13 00:49:25.137701 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:25.138758 sshd[1864]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:25.139859 sshd[1864]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:27.150067 sshd[1864]: Failed password for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 Feb 13 00:49:27.420623 sshd[1864]: maximum authentication attempts exceeded for invalid user ubuntu from 193.122.166.253 port 59980 ssh2 [preauth] Feb 13 00:49:27.420623 sshd[1864]: Disconnecting invalid user ubuntu 193.122.166.253 port 59980: Too many authentication failures [preauth] Feb 13 00:49:27.421214 sshd[1864]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:27.421228 sshd[1864]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:49:27.423286 systemd[1]: sshd@37-136.144.54.113:22-193.122.166.253:59980.service: Deactivated successfully. Feb 13 00:49:27.581404 systemd[1]: Started sshd@38-136.144.54.113:22-193.122.166.253:34428.service. Feb 13 00:49:28.222883 sshd[1869]: Invalid user ubuntu from 193.122.166.253 port 34428 Feb 13 00:49:28.229029 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:28.229774 sshd[1869]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:28.229811 sshd[1869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:28.229988 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:30.987452 sshd[1869]: Failed password for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 Feb 13 00:49:32.863484 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:32.864442 sshd[1869]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:32.865412 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:35.171457 sshd[1869]: Failed password for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 Feb 13 00:49:37.507321 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:37.508299 sshd[1869]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:37.509268 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:39.167992 sshd[1869]: Failed password for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 Feb 13 00:49:39.867350 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:39.868322 sshd[1869]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:39.869433 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:41.803746 sshd[1869]: Failed password for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 Feb 13 00:49:42.229570 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:42.230542 sshd[1869]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:42.231480 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:44.577352 sshd[1869]: Failed password for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 Feb 13 00:49:46.876264 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:46.877253 sshd[1869]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:46.878212 sshd[1869]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:49.104028 sshd[1869]: Failed password for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 Feb 13 00:49:49.158843 sshd[1869]: maximum authentication attempts exceeded for invalid user ubuntu from 193.122.166.253 port 34428 ssh2 [preauth] Feb 13 00:49:49.158843 sshd[1869]: Disconnecting invalid user ubuntu 193.122.166.253 port 34428: Too many authentication failures [preauth] Feb 13 00:49:49.159506 sshd[1869]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:49.159542 sshd[1869]: PAM service(sshd) ignoring max retries; 6 > 3 Feb 13 00:49:49.161572 systemd[1]: sshd@38-136.144.54.113:22-193.122.166.253:34428.service: Deactivated successfully. Feb 13 00:49:49.312893 systemd[1]: Started sshd@39-136.144.54.113:22-193.122.166.253:49792.service. Feb 13 00:49:49.923991 sshd[1874]: Invalid user ubuntu from 193.122.166.253 port 49792 Feb 13 00:49:49.929995 sshd[1874]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:49.930957 sshd[1874]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:49.931045 sshd[1874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:49.931945 sshd[1874]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:51.906638 sshd[1874]: Failed password for invalid user ubuntu from 193.122.166.253 port 49792 ssh2 Feb 13 00:49:52.274372 sshd[1874]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:52.275391 sshd[1874]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:52.276384 sshd[1874]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:54.661932 sshd[1874]: Failed password for invalid user ubuntu from 193.122.166.253 port 49792 ssh2 Feb 13 00:49:56.911579 sshd[1874]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:56.912570 sshd[1874]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:49:56.913560 sshd[1874]: pam_faillock(sshd:auth): User unknown Feb 13 00:49:59.179673 sshd[1874]: Failed password for invalid user ubuntu from 193.122.166.253 port 49792 ssh2 Feb 13 00:49:59.266877 sshd[1874]: Received disconnect from 193.122.166.253 port 49792:11: disconnected by user [preauth] Feb 13 00:49:59.266877 sshd[1874]: Disconnected from invalid user ubuntu 193.122.166.253 port 49792 [preauth] Feb 13 00:49:59.267311 sshd[1874]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:49:59.269346 systemd[1]: sshd@39-136.144.54.113:22-193.122.166.253:49792.service: Deactivated successfully. Feb 13 00:49:59.345012 systemd[1]: Started sshd@40-136.144.54.113:22-193.122.166.253:40442.service. Feb 13 00:50:00.141185 sshd[1878]: Invalid user pi from 193.122.166.253 port 40442 Feb 13 00:50:00.147353 sshd[1878]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:00.148368 sshd[1878]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:50:00.148458 sshd[1878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:50:00.149380 sshd[1878]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:01.632447 sshd[1878]: Failed password for invalid user pi from 193.122.166.253 port 40442 ssh2 Feb 13 00:50:02.863122 sshd[1878]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:02.864289 sshd[1878]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:50:02.865234 sshd[1878]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:04.288255 sshd[1878]: Failed password for invalid user pi from 193.122.166.253 port 40442 ssh2 Feb 13 00:50:05.587762 sshd[1878]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:05.588827 sshd[1878]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:50:05.589880 sshd[1878]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:07.760061 sshd[1878]: Failed password for invalid user pi from 193.122.166.253 port 40442 ssh2 Feb 13 00:50:08.312504 sshd[1878]: Received disconnect from 193.122.166.253 port 40442:11: disconnected by user [preauth] Feb 13 00:50:08.312504 sshd[1878]: Disconnected from invalid user pi 193.122.166.253 port 40442 [preauth] Feb 13 00:50:08.313023 sshd[1878]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:50:08.315131 systemd[1]: sshd@40-136.144.54.113:22-193.122.166.253:40442.service: Deactivated successfully. Feb 13 00:50:08.398474 systemd[1]: Started sshd@41-136.144.54.113:22-193.122.166.253:36694.service. Feb 13 00:50:08.962938 sshd[1882]: Invalid user baikal from 193.122.166.253 port 36694 Feb 13 00:50:08.969186 sshd[1882]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:08.970292 sshd[1882]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:50:08.970386 sshd[1882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.166.253 Feb 13 00:50:08.971311 sshd[1882]: pam_faillock(sshd:auth): User unknown Feb 13 00:50:10.886033 sshd[1882]: Failed password for invalid user baikal from 193.122.166.253 port 36694 ssh2 Feb 13 00:50:11.800463 sshd[1882]: Received disconnect from 193.122.166.253 port 36694:11: disconnected by user [preauth] Feb 13 00:50:11.800463 sshd[1882]: Disconnected from invalid user baikal 193.122.166.253 port 36694 [preauth] Feb 13 00:50:11.803027 systemd[1]: sshd@41-136.144.54.113:22-193.122.166.253:36694.service: Deactivated successfully. Feb 13 00:51:23.564968 systemd[1]: Started sshd@42-136.144.54.113:22-141.98.11.90:43082.service. Feb 13 00:51:24.652323 sshd[1887]: Invalid user support from 141.98.11.90 port 43082 Feb 13 00:51:24.861624 sshd[1887]: pam_faillock(sshd:auth): User unknown Feb 13 00:51:24.862614 sshd[1887]: pam_unix(sshd:auth): check pass; user unknown Feb 13 00:51:24.862705 sshd[1887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.90 Feb 13 00:51:24.863601 sshd[1887]: pam_faillock(sshd:auth): User unknown Feb 13 00:51:26.211305 sshd[1887]: Failed password for invalid user support from 141.98.11.90 port 43082 ssh2 Feb 13 00:51:26.450844 sshd[1887]: Connection closed by invalid user support 141.98.11.90 port 43082 [preauth] Feb 13 00:51:26.453350 systemd[1]: sshd@42-136.144.54.113:22-141.98.11.90:43082.service: Deactivated successfully. Feb 13 00:53:45.718318 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:53:45.717Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":795} Feb 13 00:53:45.721166 etcd-wrapper[1391]: {"level":"info","ts":"2024-02-13T00:53:45.720Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":795,"took":"2.511597ms"}