Feb 13 02:26:33.552966 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 02:26:33.552979 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 02:26:33.552986 kernel: BIOS-provided physical RAM map: Feb 13 02:26:33.552990 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 02:26:33.552994 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 02:26:33.552997 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 02:26:33.553002 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 02:26:33.553006 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 02:26:33.553009 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820dcfff] usable Feb 13 02:26:33.553013 kernel: BIOS-e820: [mem 0x00000000820dd000-0x00000000820ddfff] ACPI NVS Feb 13 02:26:33.553018 kernel: BIOS-e820: [mem 0x00000000820de000-0x00000000820defff] reserved Feb 13 02:26:33.553021 kernel: BIOS-e820: [mem 0x00000000820df000-0x000000008afccfff] usable Feb 13 02:26:33.553025 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 02:26:33.553029 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 02:26:33.553034 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 02:26:33.553039 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 02:26:33.553043 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 02:26:33.553047 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 02:26:33.553051 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 02:26:33.553055 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 02:26:33.553059 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 02:26:33.553063 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 02:26:33.553068 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 02:26:33.553072 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 02:26:33.553076 kernel: NX (Execute Disable) protection: active Feb 13 02:26:33.553080 kernel: SMBIOS 3.2.1 present. Feb 13 02:26:33.553085 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 02:26:33.553089 kernel: tsc: Detected 3400.000 MHz processor Feb 13 02:26:33.553093 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 02:26:33.553097 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 02:26:33.553102 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 02:26:33.553106 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 02:26:33.553110 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 02:26:33.553115 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 02:26:33.553119 kernel: Using GB pages for direct mapping Feb 13 02:26:33.553123 kernel: ACPI: Early table checksum verification disabled Feb 13 02:26:33.553128 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 02:26:33.553132 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 02:26:33.553137 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 02:26:33.553141 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 02:26:33.553147 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 02:26:33.553152 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 02:26:33.553157 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 02:26:33.553162 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 02:26:33.553166 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 02:26:33.553171 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 02:26:33.553175 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 02:26:33.553180 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 02:26:33.553185 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 02:26:33.553189 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:26:33.553195 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 02:26:33.553199 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 02:26:33.553204 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:26:33.553208 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:26:33.553213 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 02:26:33.553217 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 02:26:33.553222 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:26:33.553227 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:26:33.553232 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 02:26:33.553236 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 02:26:33.553241 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 02:26:33.553246 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 02:26:33.553250 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 02:26:33.553255 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 02:26:33.553259 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 02:26:33.553264 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 02:26:33.553268 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 02:26:33.553274 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 02:26:33.553278 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 02:26:33.553283 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 02:26:33.553288 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 02:26:33.553292 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 02:26:33.553297 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 02:26:33.553301 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 02:26:33.553306 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 02:26:33.553311 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 02:26:33.553316 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 02:26:33.553321 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 02:26:33.553325 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 02:26:33.553330 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 02:26:33.553334 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 02:26:33.553339 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 02:26:33.553343 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 02:26:33.553348 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 02:26:33.553353 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 02:26:33.553358 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 02:26:33.553362 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 02:26:33.553367 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 02:26:33.553371 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 02:26:33.553376 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 02:26:33.553381 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 02:26:33.553385 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 02:26:33.553390 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 02:26:33.553395 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 02:26:33.553399 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 02:26:33.553404 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 02:26:33.553409 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 02:26:33.553413 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 02:26:33.553418 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 02:26:33.553422 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 02:26:33.553427 kernel: No NUMA configuration found Feb 13 02:26:33.553431 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 02:26:33.553437 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 02:26:33.553441 kernel: Zone ranges: Feb 13 02:26:33.553446 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 02:26:33.553451 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 02:26:33.553455 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 02:26:33.553460 kernel: Movable zone start for each node Feb 13 02:26:33.553464 kernel: Early memory node ranges Feb 13 02:26:33.553469 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 02:26:33.553473 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 02:26:33.553478 kernel: node 0: [mem 0x0000000040400000-0x00000000820dcfff] Feb 13 02:26:33.553483 kernel: node 0: [mem 0x00000000820df000-0x000000008afccfff] Feb 13 02:26:33.553488 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 02:26:33.553492 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 02:26:33.553497 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 02:26:33.553502 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 02:26:33.553506 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 02:26:33.553514 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 02:26:33.553520 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 02:26:33.553525 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 02:26:33.553530 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 02:26:33.553535 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 02:26:33.553540 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 02:26:33.553545 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 02:26:33.553550 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 02:26:33.553555 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 02:26:33.553560 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 02:26:33.553565 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 02:26:33.553571 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 02:26:33.553575 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 02:26:33.553580 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 02:26:33.553585 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 02:26:33.553596 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 02:26:33.553601 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 02:26:33.553606 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 02:26:33.553611 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 02:26:33.553616 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 02:26:33.553622 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 02:26:33.553626 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 02:26:33.553631 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 02:26:33.553636 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 02:26:33.553641 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 02:26:33.553646 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 02:26:33.553651 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 02:26:33.553655 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 02:26:33.553660 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 02:26:33.553666 kernel: TSC deadline timer available Feb 13 02:26:33.553671 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 02:26:33.553676 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 02:26:33.553681 kernel: Booting paravirtualized kernel on bare hardware Feb 13 02:26:33.553685 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 02:26:33.553690 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 02:26:33.553695 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 02:26:33.553700 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 02:26:33.553705 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 02:26:33.553710 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 02:26:33.553715 kernel: Policy zone: Normal Feb 13 02:26:33.553721 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 02:26:33.553726 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 02:26:33.553731 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 02:26:33.553736 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 02:26:33.553741 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 02:26:33.553746 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 02:26:33.553752 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 02:26:33.553757 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 02:26:33.553761 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 02:26:33.553766 kernel: rcu: Hierarchical RCU implementation. Feb 13 02:26:33.553771 kernel: rcu: RCU event tracing is enabled. Feb 13 02:26:33.553776 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 02:26:33.553781 kernel: Rude variant of Tasks RCU enabled. Feb 13 02:26:33.553786 kernel: Tracing variant of Tasks RCU enabled. Feb 13 02:26:33.553792 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 02:26:33.553797 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 02:26:33.553802 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 02:26:33.553807 kernel: random: crng init done Feb 13 02:26:33.553811 kernel: Console: colour dummy device 80x25 Feb 13 02:26:33.553816 kernel: printk: console [tty0] enabled Feb 13 02:26:33.553821 kernel: printk: console [ttyS1] enabled Feb 13 02:26:33.553826 kernel: ACPI: Core revision 20210730 Feb 13 02:26:33.553831 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 02:26:33.553836 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 02:26:33.553842 kernel: DMAR: Host address width 39 Feb 13 02:26:33.553846 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 02:26:33.553851 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 02:26:33.553856 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 02:26:33.553861 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 02:26:33.553866 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 02:26:33.553871 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 02:26:33.553876 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 02:26:33.553881 kernel: x2apic enabled Feb 13 02:26:33.553886 kernel: Switched APIC routing to cluster x2apic. Feb 13 02:26:33.553891 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 02:26:33.553896 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 02:26:33.553901 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 02:26:33.553906 kernel: process: using mwait in idle threads Feb 13 02:26:33.553911 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 02:26:33.553916 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 02:26:33.553920 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 02:26:33.553925 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 02:26:33.553931 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 02:26:33.553936 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 02:26:33.553941 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 02:26:33.553945 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 02:26:33.553950 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 02:26:33.553955 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 02:26:33.553960 kernel: TAA: Mitigation: TSX disabled Feb 13 02:26:33.553964 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 02:26:33.553969 kernel: SRBDS: Mitigation: Microcode Feb 13 02:26:33.553974 kernel: GDS: Vulnerable: No microcode Feb 13 02:26:33.553979 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 02:26:33.553984 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 02:26:33.553989 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 02:26:33.553994 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 02:26:33.553999 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 02:26:33.554004 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 02:26:33.554009 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 02:26:33.554013 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 02:26:33.554018 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 02:26:33.554023 kernel: Freeing SMP alternatives memory: 32K Feb 13 02:26:33.554028 kernel: pid_max: default: 32768 minimum: 301 Feb 13 02:26:33.554032 kernel: LSM: Security Framework initializing Feb 13 02:26:33.554037 kernel: SELinux: Initializing. Feb 13 02:26:33.554043 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 02:26:33.554047 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 02:26:33.554052 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 02:26:33.554057 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 02:26:33.554062 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 02:26:33.554067 kernel: ... version: 4 Feb 13 02:26:33.554072 kernel: ... bit width: 48 Feb 13 02:26:33.554077 kernel: ... generic registers: 4 Feb 13 02:26:33.554081 kernel: ... value mask: 0000ffffffffffff Feb 13 02:26:33.554086 kernel: ... max period: 00007fffffffffff Feb 13 02:26:33.554092 kernel: ... fixed-purpose events: 3 Feb 13 02:26:33.554097 kernel: ... event mask: 000000070000000f Feb 13 02:26:33.554102 kernel: signal: max sigframe size: 2032 Feb 13 02:26:33.554107 kernel: rcu: Hierarchical SRCU implementation. Feb 13 02:26:33.554111 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 02:26:33.554116 kernel: smp: Bringing up secondary CPUs ... Feb 13 02:26:33.554121 kernel: x86: Booting SMP configuration: Feb 13 02:26:33.554126 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 02:26:33.554131 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 02:26:33.554137 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 02:26:33.554142 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 02:26:33.554146 kernel: smpboot: Max logical packages: 1 Feb 13 02:26:33.554151 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 02:26:33.554156 kernel: devtmpfs: initialized Feb 13 02:26:33.554161 kernel: x86/mm: Memory block size: 128MB Feb 13 02:26:33.554166 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820dd000-0x820ddfff] (4096 bytes) Feb 13 02:26:33.554171 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 02:26:33.554177 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 02:26:33.554182 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 02:26:33.554186 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 02:26:33.554191 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 02:26:33.554196 kernel: audit: initializing netlink subsys (disabled) Feb 13 02:26:33.554201 kernel: audit: type=2000 audit(1707791188.040:1): state=initialized audit_enabled=0 res=1 Feb 13 02:26:33.554206 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 02:26:33.554211 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 02:26:33.554216 kernel: cpuidle: using governor menu Feb 13 02:26:33.554221 kernel: ACPI: bus type PCI registered Feb 13 02:26:33.554226 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 02:26:33.554231 kernel: dca service started, version 1.12.1 Feb 13 02:26:33.554236 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 02:26:33.554241 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 02:26:33.554246 kernel: PCI: Using configuration type 1 for base access Feb 13 02:26:33.554251 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 02:26:33.554256 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 02:26:33.554260 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 02:26:33.554266 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 02:26:33.554271 kernel: ACPI: Added _OSI(Module Device) Feb 13 02:26:33.554276 kernel: ACPI: Added _OSI(Processor Device) Feb 13 02:26:33.554281 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 02:26:33.554286 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 02:26:33.554290 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 02:26:33.554295 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 02:26:33.554300 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 02:26:33.554305 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 02:26:33.554311 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:26:33.554315 kernel: ACPI: SSDT 0xFFFF8B1DC0212000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 02:26:33.554321 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 02:26:33.554325 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:26:33.554330 kernel: ACPI: SSDT 0xFFFF8B1DC1AE3400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 02:26:33.554335 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:26:33.554340 kernel: ACPI: SSDT 0xFFFF8B1DC1A51800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 02:26:33.554345 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:26:33.554350 kernel: ACPI: SSDT 0xFFFF8B1DC1A56000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 02:26:33.554354 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:26:33.554360 kernel: ACPI: SSDT 0xFFFF8B1DC014C000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 02:26:33.554365 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:26:33.554370 kernel: ACPI: SSDT 0xFFFF8B1DC1AE2400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 02:26:33.554374 kernel: ACPI: Interpreter enabled Feb 13 02:26:33.554379 kernel: ACPI: PM: (supports S0 S5) Feb 13 02:26:33.554384 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 02:26:33.554389 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 02:26:33.554394 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 02:26:33.554399 kernel: HEST: Table parsing has been initialized. Feb 13 02:26:33.554404 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 02:26:33.554409 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 02:26:33.554414 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 02:26:33.554419 kernel: ACPI: PM: Power Resource [USBC] Feb 13 02:26:33.554424 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 02:26:33.554429 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 02:26:33.554433 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 02:26:33.554438 kernel: ACPI: PM: Power Resource [WRST] Feb 13 02:26:33.554443 kernel: ACPI: PM: Power Resource [FN00] Feb 13 02:26:33.554448 kernel: ACPI: PM: Power Resource [FN01] Feb 13 02:26:33.554453 kernel: ACPI: PM: Power Resource [FN02] Feb 13 02:26:33.554458 kernel: ACPI: PM: Power Resource [FN03] Feb 13 02:26:33.554463 kernel: ACPI: PM: Power Resource [FN04] Feb 13 02:26:33.554468 kernel: ACPI: PM: Power Resource [PIN] Feb 13 02:26:33.554473 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 02:26:33.554537 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 02:26:33.554585 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 02:26:33.554634 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 02:26:33.554641 kernel: PCI host bridge to bus 0000:00 Feb 13 02:26:33.554684 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 02:26:33.554722 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 02:26:33.554758 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 02:26:33.554795 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 02:26:33.554830 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 02:26:33.554868 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 02:26:33.554917 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 02:26:33.554966 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 02:26:33.555010 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.555056 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 02:26:33.555099 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 02:26:33.555147 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 02:26:33.555190 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 02:26:33.555235 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 02:26:33.555278 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 02:26:33.555321 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 02:26:33.555365 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 02:26:33.555410 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 02:26:33.555450 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 02:26:33.555495 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 02:26:33.555536 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 02:26:33.555583 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 02:26:33.555628 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 02:26:33.555672 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 02:26:33.555716 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 02:26:33.555756 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 02:26:33.555801 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 02:26:33.555842 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 02:26:33.555883 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 02:26:33.555927 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 02:26:33.555970 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 02:26:33.556011 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 02:26:33.556055 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 02:26:33.556096 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 02:26:33.556136 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 02:26:33.556177 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 02:26:33.556216 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 02:26:33.556264 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 02:26:33.556306 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 02:26:33.556346 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 02:26:33.556391 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 02:26:33.556433 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.556478 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 02:26:33.556519 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.556569 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 02:26:33.556621 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.556678 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 02:26:33.556729 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.556784 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 02:26:33.556838 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.556893 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 02:26:33.556944 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 02:26:33.557000 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 02:26:33.557058 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 02:26:33.557108 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 02:26:33.557159 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 02:26:33.557216 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 02:26:33.557266 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 02:26:33.557325 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 02:26:33.557381 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 02:26:33.557434 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 02:26:33.557485 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 02:26:33.557539 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 02:26:33.557593 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 02:26:33.557654 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 02:26:33.557707 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 02:26:33.557762 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 02:26:33.557814 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 02:26:33.557867 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 02:26:33.557920 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 02:26:33.557971 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 02:26:33.558022 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 02:26:33.558073 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 02:26:33.558124 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 02:26:33.558255 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 02:26:33.558309 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 02:26:33.558361 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 02:26:33.558406 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 02:26:33.558448 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.558489 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 02:26:33.558531 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 02:26:33.558573 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 02:26:33.558630 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 02:26:33.558674 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 02:26:33.558719 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 02:26:33.558761 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 02:26:33.558806 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 02:26:33.558848 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 02:26:33.558889 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 02:26:33.558931 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 02:26:33.558973 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 02:26:33.559021 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 02:26:33.559065 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 02:26:33.559109 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 02:26:33.559151 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 02:26:33.559194 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 02:26:33.559234 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 02:26:33.559278 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 02:26:33.559325 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 02:26:33.559375 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 02:26:33.559419 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 02:26:33.559465 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 02:26:33.559509 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 02:26:33.559555 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 02:26:33.559606 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 02:26:33.559652 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 02:26:33.559695 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 02:26:33.559739 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 02:26:33.559781 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 02:26:33.559789 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 02:26:33.559794 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 02:26:33.559801 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 02:26:33.559806 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 02:26:33.559812 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 02:26:33.559817 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 02:26:33.559822 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 02:26:33.559827 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 02:26:33.559832 kernel: iommu: Default domain type: Translated Feb 13 02:26:33.559838 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 02:26:33.559881 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 02:26:33.559928 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 02:26:33.559972 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 02:26:33.559980 kernel: vgaarb: loaded Feb 13 02:26:33.559985 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 02:26:33.559991 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 02:26:33.559996 kernel: PTP clock support registered Feb 13 02:26:33.560001 kernel: PCI: Using ACPI for IRQ routing Feb 13 02:26:33.560007 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 02:26:33.560012 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 02:26:33.560018 kernel: e820: reserve RAM buffer [mem 0x820dd000-0x83ffffff] Feb 13 02:26:33.560023 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 02:26:33.560028 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 02:26:33.560033 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 02:26:33.560039 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 02:26:33.560044 kernel: clocksource: Switched to clocksource tsc-early Feb 13 02:26:33.560049 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 02:26:33.560054 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 02:26:33.560060 kernel: pnp: PnP ACPI init Feb 13 02:26:33.560102 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 02:26:33.560144 kernel: pnp 00:02: [dma 0 disabled] Feb 13 02:26:33.560185 kernel: pnp 00:03: [dma 0 disabled] Feb 13 02:26:33.560227 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 02:26:33.560265 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 02:26:33.560305 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 02:26:33.560347 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 02:26:33.560384 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 02:26:33.560421 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 02:26:33.560458 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 02:26:33.560494 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 02:26:33.560531 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 02:26:33.560567 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 02:26:33.560611 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 02:26:33.560651 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 02:26:33.560689 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 02:26:33.560725 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 02:26:33.560761 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 02:26:33.560799 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 02:26:33.560835 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 02:26:33.560875 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 02:26:33.560916 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 02:26:33.560924 kernel: pnp: PnP ACPI: found 10 devices Feb 13 02:26:33.560929 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 02:26:33.560934 kernel: NET: Registered PF_INET protocol family Feb 13 02:26:33.560939 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 02:26:33.560945 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 02:26:33.560950 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 02:26:33.560957 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 02:26:33.560962 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 02:26:33.560967 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 02:26:33.560973 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 02:26:33.560978 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 02:26:33.560983 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 02:26:33.560989 kernel: NET: Registered PF_XDP protocol family Feb 13 02:26:33.561030 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 02:26:33.561073 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 02:26:33.561113 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 02:26:33.561157 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 02:26:33.561200 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 02:26:33.561245 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 02:26:33.561286 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 02:26:33.561329 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 02:26:33.561371 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 02:26:33.561415 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 02:26:33.561456 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 02:26:33.561498 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 02:26:33.561539 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 02:26:33.561581 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 02:26:33.561638 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 02:26:33.561689 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 02:26:33.561740 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 02:26:33.561791 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 02:26:33.561844 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 02:26:33.561897 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 02:26:33.561950 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 02:26:33.562001 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 02:26:33.562052 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 02:26:33.562106 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 02:26:33.562153 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 02:26:33.562199 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 02:26:33.562244 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 02:26:33.562289 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 02:26:33.562335 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 02:26:33.562379 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 02:26:33.562432 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 02:26:33.562482 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 02:26:33.562537 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 02:26:33.562585 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 02:26:33.562641 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 02:26:33.562689 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 02:26:33.562740 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 02:26:33.562791 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 02:26:33.562841 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 02:26:33.562892 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 02:26:33.562901 kernel: PCI: CLS 64 bytes, default 64 Feb 13 02:26:33.562908 kernel: DMAR: No ATSR found Feb 13 02:26:33.562914 kernel: DMAR: No SATC found Feb 13 02:26:33.562921 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 02:26:33.562971 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 02:26:33.563025 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 02:26:33.563076 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 02:26:33.563126 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 02:26:33.563177 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 02:26:33.563228 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 02:26:33.563278 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 02:26:33.563328 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 02:26:33.563379 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 02:26:33.563432 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 02:26:33.563483 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 02:26:33.563533 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 02:26:33.563584 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 02:26:33.563643 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 02:26:33.563695 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 02:26:33.563747 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 02:26:33.563798 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 02:26:33.563844 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 02:26:33.563886 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 02:26:33.563927 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 02:26:33.563970 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 02:26:33.564013 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 02:26:33.564057 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 02:26:33.564100 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 02:26:33.564144 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 02:26:33.564189 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 02:26:33.564235 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 02:26:33.564243 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 02:26:33.564249 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 02:26:33.564254 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 02:26:33.564259 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 02:26:33.564264 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 02:26:33.564270 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 02:26:33.564276 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 02:26:33.564320 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 02:26:33.564329 kernel: Initialise system trusted keyrings Feb 13 02:26:33.564334 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 02:26:33.564339 kernel: Key type asymmetric registered Feb 13 02:26:33.564344 kernel: Asymmetric key parser 'x509' registered Feb 13 02:26:33.564349 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 02:26:33.564355 kernel: io scheduler mq-deadline registered Feb 13 02:26:33.564361 kernel: io scheduler kyber registered Feb 13 02:26:33.564367 kernel: io scheduler bfq registered Feb 13 02:26:33.564409 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 02:26:33.564451 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 02:26:33.564493 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 02:26:33.564534 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 02:26:33.564576 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 02:26:33.564622 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 02:26:33.564670 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 02:26:33.564678 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 02:26:33.564684 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 02:26:33.564689 kernel: pstore: Registered erst as persistent store backend Feb 13 02:26:33.564694 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 02:26:33.564700 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 02:26:33.564705 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 02:26:33.564710 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 02:26:33.564717 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 02:26:33.564760 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 02:26:33.564769 kernel: i8042: PNP: No PS/2 controller found. Feb 13 02:26:33.564806 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 02:26:33.564844 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 02:26:33.564882 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T02:26:32 UTC (1707791192) Feb 13 02:26:33.564919 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 02:26:33.564926 kernel: fail to initialize ptp_kvm Feb 13 02:26:33.564933 kernel: intel_pstate: Intel P-state driver initializing Feb 13 02:26:33.564938 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 02:26:33.564943 kernel: intel_pstate: HWP enabled Feb 13 02:26:33.564949 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 02:26:33.564954 kernel: vesafb: scrolling: redraw Feb 13 02:26:33.564959 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 02:26:33.564965 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000f8407128, using 768k, total 768k Feb 13 02:26:33.564970 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 02:26:33.564975 kernel: fb0: VESA VGA frame buffer device Feb 13 02:26:33.564981 kernel: NET: Registered PF_INET6 protocol family Feb 13 02:26:33.564986 kernel: Segment Routing with IPv6 Feb 13 02:26:33.564991 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 02:26:33.564997 kernel: NET: Registered PF_PACKET protocol family Feb 13 02:26:33.565002 kernel: Key type dns_resolver registered Feb 13 02:26:33.565007 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 02:26:33.565012 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 02:26:33.565017 kernel: IPI shorthand broadcast: enabled Feb 13 02:26:33.565023 kernel: sched_clock: Marking stable (1677564870, 1338970495)->(4436623748, -1420088383) Feb 13 02:26:33.565029 kernel: registered taskstats version 1 Feb 13 02:26:33.565034 kernel: Loading compiled-in X.509 certificates Feb 13 02:26:33.565039 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 02:26:33.565044 kernel: Key type .fscrypt registered Feb 13 02:26:33.565050 kernel: Key type fscrypt-provisioning registered Feb 13 02:26:33.565055 kernel: pstore: Using crash dump compression: deflate Feb 13 02:26:33.565060 kernel: ima: Allocated hash algorithm: sha1 Feb 13 02:26:33.565065 kernel: ima: No architecture policies found Feb 13 02:26:33.565071 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 02:26:33.565077 kernel: Write protecting the kernel read-only data: 28672k Feb 13 02:26:33.565082 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 02:26:33.565087 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 02:26:33.565092 kernel: Run /init as init process Feb 13 02:26:33.565098 kernel: with arguments: Feb 13 02:26:33.565103 kernel: /init Feb 13 02:26:33.565108 kernel: with environment: Feb 13 02:26:33.565113 kernel: HOME=/ Feb 13 02:26:33.565118 kernel: TERM=linux Feb 13 02:26:33.565124 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 02:26:33.565130 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 02:26:33.565137 systemd[1]: Detected architecture x86-64. Feb 13 02:26:33.565143 systemd[1]: Running in initrd. Feb 13 02:26:33.565148 systemd[1]: No hostname configured, using default hostname. Feb 13 02:26:33.565153 systemd[1]: Hostname set to . Feb 13 02:26:33.565159 systemd[1]: Initializing machine ID from random generator. Feb 13 02:26:33.565165 systemd[1]: Queued start job for default target initrd.target. Feb 13 02:26:33.565171 systemd[1]: Started systemd-ask-password-console.path. Feb 13 02:26:33.565176 systemd[1]: Reached target cryptsetup.target. Feb 13 02:26:33.565181 systemd[1]: Reached target paths.target. Feb 13 02:26:33.565187 systemd[1]: Reached target slices.target. Feb 13 02:26:33.565192 systemd[1]: Reached target swap.target. Feb 13 02:26:33.565197 systemd[1]: Reached target timers.target. Feb 13 02:26:33.565203 systemd[1]: Listening on iscsid.socket. Feb 13 02:26:33.565209 systemd[1]: Listening on iscsiuio.socket. Feb 13 02:26:33.565215 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 02:26:33.565220 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 02:26:33.565226 systemd[1]: Listening on systemd-journald.socket. Feb 13 02:26:33.565231 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Feb 13 02:26:33.565236 systemd[1]: Listening on systemd-networkd.socket. Feb 13 02:26:33.565242 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Feb 13 02:26:33.565247 kernel: clocksource: Switched to clocksource tsc Feb 13 02:26:33.565253 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 02:26:33.565259 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 02:26:33.565264 systemd[1]: Reached target sockets.target. Feb 13 02:26:33.565270 systemd[1]: Starting kmod-static-nodes.service... Feb 13 02:26:33.565275 systemd[1]: Finished network-cleanup.service. Feb 13 02:26:33.565281 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 02:26:33.565286 systemd[1]: Starting systemd-journald.service... Feb 13 02:26:33.565292 systemd[1]: Starting systemd-modules-load.service... Feb 13 02:26:33.565299 systemd-journald[267]: Journal started Feb 13 02:26:33.565325 systemd-journald[267]: Runtime Journal (/run/log/journal/5890d5c7dd1245a0bde3f3e81b7f51fc) is 8.0M, max 640.1M, 632.1M free. Feb 13 02:26:33.567194 systemd-modules-load[268]: Inserted module 'overlay' Feb 13 02:26:33.573000 audit: BPF prog-id=6 op=LOAD Feb 13 02:26:33.591623 kernel: audit: type=1334 audit(1707791193.573:2): prog-id=6 op=LOAD Feb 13 02:26:33.591638 systemd[1]: Starting systemd-resolved.service... Feb 13 02:26:33.640635 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 02:26:33.640651 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 02:26:33.670592 kernel: Bridge firewalling registered Feb 13 02:26:33.670609 systemd[1]: Started systemd-journald.service. Feb 13 02:26:33.685419 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 13 02:26:33.733781 kernel: audit: type=1130 audit(1707791193.693:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.691625 systemd-resolved[270]: Positive Trust Anchors: Feb 13 02:26:33.809403 kernel: SCSI subsystem initialized Feb 13 02:26:33.809416 kernel: audit: type=1130 audit(1707791193.745:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.809426 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 02:26:33.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.691632 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 02:26:33.911369 kernel: device-mapper: uevent: version 1.0.3 Feb 13 02:26:33.911455 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 02:26:33.911463 kernel: audit: type=1130 audit(1707791193.866:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.691651 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 02:26:33.984833 kernel: audit: type=1130 audit(1707791193.920:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.693190 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 13 02:26:33.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.693814 systemd[1]: Started systemd-resolved.service. Feb 13 02:26:34.095689 kernel: audit: type=1130 audit(1707791193.992:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.095702 kernel: audit: type=1130 audit(1707791194.049:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:33.745760 systemd[1]: Finished kmod-static-nodes.service. Feb 13 02:26:33.867516 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 02:26:33.911579 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 13 02:26:33.921105 systemd[1]: Finished systemd-modules-load.service. Feb 13 02:26:33.993178 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 02:26:34.049839 systemd[1]: Reached target nss-lookup.target. Feb 13 02:26:34.105202 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 02:26:34.125104 systemd[1]: Starting systemd-sysctl.service... Feb 13 02:26:34.125396 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 02:26:34.128180 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 02:26:34.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.128888 systemd[1]: Finished systemd-sysctl.service. Feb 13 02:26:34.177793 kernel: audit: type=1130 audit(1707791194.127:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.189929 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 02:26:34.254742 kernel: audit: type=1130 audit(1707791194.189:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.247841 systemd[1]: Starting dracut-cmdline.service... Feb 13 02:26:34.268736 dracut-cmdline[292]: dracut-dracut-053 Feb 13 02:26:34.268736 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 02:26:34.268736 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 02:26:34.425634 kernel: Loading iSCSI transport class v2.0-870. Feb 13 02:26:34.455628 kernel: iscsi: registered transport (tcp) Feb 13 02:26:34.504605 kernel: iscsi: registered transport (qla4xxx) Feb 13 02:26:34.504658 kernel: QLogic iSCSI HBA Driver Feb 13 02:26:34.520576 systemd[1]: Finished dracut-cmdline.service. Feb 13 02:26:34.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:34.521120 systemd[1]: Starting dracut-pre-udev.service... Feb 13 02:26:34.577652 kernel: raid6: avx2x4 gen() 48972 MB/s Feb 13 02:26:34.613652 kernel: raid6: avx2x4 xor() 20310 MB/s Feb 13 02:26:34.648622 kernel: raid6: avx2x2 gen() 53412 MB/s Feb 13 02:26:34.683657 kernel: raid6: avx2x2 xor() 32128 MB/s Feb 13 02:26:34.718622 kernel: raid6: avx2x1 gen() 45304 MB/s Feb 13 02:26:34.752658 kernel: raid6: avx2x1 xor() 27817 MB/s Feb 13 02:26:34.786622 kernel: raid6: sse2x4 gen() 21363 MB/s Feb 13 02:26:34.820657 kernel: raid6: sse2x4 xor() 11987 MB/s Feb 13 02:26:34.854661 kernel: raid6: sse2x2 gen() 21687 MB/s Feb 13 02:26:34.888658 kernel: raid6: sse2x2 xor() 13439 MB/s Feb 13 02:26:34.922622 kernel: raid6: sse2x1 gen() 18251 MB/s Feb 13 02:26:34.974253 kernel: raid6: sse2x1 xor() 8928 MB/s Feb 13 02:26:34.974268 kernel: raid6: using algorithm avx2x2 gen() 53412 MB/s Feb 13 02:26:34.974276 kernel: raid6: .... xor() 32128 MB/s, rmw enabled Feb 13 02:26:34.992336 kernel: raid6: using avx2x2 recovery algorithm Feb 13 02:26:35.038593 kernel: xor: automatically using best checksumming function avx Feb 13 02:26:35.116637 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 02:26:35.121781 systemd[1]: Finished dracut-pre-udev.service. Feb 13 02:26:35.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:35.129000 audit: BPF prog-id=7 op=LOAD Feb 13 02:26:35.129000 audit: BPF prog-id=8 op=LOAD Feb 13 02:26:35.130638 systemd[1]: Starting systemd-udevd.service... Feb 13 02:26:35.138743 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 13 02:26:35.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:35.143737 systemd[1]: Started systemd-udevd.service. Feb 13 02:26:35.181650 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 13 02:26:35.160504 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 02:26:35.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:35.187639 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 02:26:35.199333 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 02:26:35.248475 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 02:26:35.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:35.272597 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 02:26:35.309176 kernel: ACPI: bus type USB registered Feb 13 02:26:35.309208 kernel: usbcore: registered new interface driver usbfs Feb 13 02:26:35.309216 kernel: usbcore: registered new interface driver hub Feb 13 02:26:35.309222 kernel: usbcore: registered new device driver usb Feb 13 02:26:35.345593 kernel: libata version 3.00 loaded. Feb 13 02:26:35.366602 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 02:26:35.366658 kernel: AES CTR mode by8 optimization enabled Feb 13 02:26:35.383593 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 02:26:35.383689 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 02:26:35.423850 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 02:26:35.424596 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 02:26:35.457361 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 02:26:35.457380 kernel: scsi host0: ahci Feb 13 02:26:35.484400 kernel: scsi host1: ahci Feb 13 02:26:35.497718 kernel: scsi host2: ahci Feb 13 02:26:35.497793 kernel: pps pps0: new PPS source ptp0 Feb 13 02:26:35.511761 kernel: scsi host3: ahci Feb 13 02:26:35.524323 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 02:26:35.538232 kernel: scsi host4: ahci Feb 13 02:26:35.550133 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 02:26:35.565963 kernel: scsi host5: ahci Feb 13 02:26:35.565986 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:d0 Feb 13 02:26:35.593003 kernel: scsi host6: ahci Feb 13 02:26:35.604011 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 02:26:35.604082 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 13 02:26:35.617034 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 02:26:35.632294 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 13 02:26:35.676918 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 13 02:26:35.676935 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 13 02:26:35.691358 kernel: pps pps1: new PPS source ptp1 Feb 13 02:26:35.691428 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 13 02:26:35.717071 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 02:26:35.717145 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 13 02:26:35.743986 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 02:26:35.744060 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 13 02:26:35.758654 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:d1 Feb 13 02:26:35.819211 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 02:26:35.819289 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 02:26:35.854929 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Feb 13 02:26:35.855004 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 02:26:36.097610 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 02:26:36.097633 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 02:26:36.113620 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 02:26:36.127619 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 02:26:36.127693 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 02:26:36.161591 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 02:26:36.161677 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 02:26:36.195637 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 02:26:36.210614 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 02:26:36.225632 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 02:26:36.242637 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 02:26:36.291566 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 02:26:36.291584 kernel: ata2.00: Features: NCQ-prio Feb 13 02:26:36.291595 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 02:26:36.321458 kernel: ata1.00: Features: NCQ-prio Feb 13 02:26:36.340648 kernel: ata2.00: configured for UDMA/133 Feb 13 02:26:36.340663 kernel: ata1.00: configured for UDMA/133 Feb 13 02:26:36.353634 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 02:26:36.371623 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 02:26:36.417621 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 02:26:36.417727 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 02:26:36.417794 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 02:26:36.417853 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 02:26:36.491371 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 02:26:36.491444 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 02:26:36.491496 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 02:26:36.508821 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 02:26:36.539709 kernel: hub 1-0:1.0: USB hub found Feb 13 02:26:36.539788 kernel: hub 1-0:1.0: 16 ports detected Feb 13 02:26:36.568121 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:36.568138 kernel: hub 2-0:1.0: USB hub found Feb 13 02:26:36.568210 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 02:26:36.568219 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 02:26:36.568307 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 02:26:36.568366 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 02:26:36.568425 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 02:26:36.568511 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 02:26:36.568583 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 02:26:36.568647 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:36.570631 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 02:26:36.570648 kernel: GPT:9289727 != 937703087 Feb 13 02:26:36.570656 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 02:26:36.570665 kernel: GPT:9289727 != 937703087 Feb 13 02:26:36.570671 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 02:26:36.570677 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:26:36.570684 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:36.570690 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 02:26:36.572593 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 02:26:36.581636 kernel: hub 2-0:1.0: 10 ports detected Feb 13 02:26:36.612897 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 02:26:36.629750 kernel: usb: port power management may be unreliable Feb 13 02:26:36.629768 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 02:26:36.819077 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 02:26:36.819104 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 02:26:36.819170 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 02:26:36.859942 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Feb 13 02:26:36.860040 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 02:26:36.860051 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 02:26:36.860121 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 02:26:36.952565 kernel: hub 1-14:1.0: USB hub found Feb 13 02:26:36.952663 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 02:26:36.979590 kernel: hub 1-14:1.0: 4 ports detected Feb 13 02:26:37.026184 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 02:26:37.060714 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (552) Feb 13 02:26:37.052940 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 02:26:37.081691 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 02:26:37.094344 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 02:26:37.121597 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 02:26:37.130092 systemd[1]: Starting disk-uuid.service... Feb 13 02:26:37.289688 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:37.289701 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:26:37.289709 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 02:26:37.289783 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:37.289791 kernel: port_module: 9 callbacks suppressed Feb 13 02:26:37.289797 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 02:26:37.289852 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:26:37.289860 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 02:26:37.289912 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:37.289919 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:26:37.289926 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 02:26:37.289987 disk-uuid[677]: Primary Header is updated. Feb 13 02:26:37.289987 disk-uuid[677]: Secondary Entries is updated. Feb 13 02:26:37.289987 disk-uuid[677]: Secondary Header is updated. Feb 13 02:26:37.432606 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 02:26:37.432671 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 02:26:37.485850 kernel: usbcore: registered new interface driver usbhid Feb 13 02:26:37.485869 kernel: usbhid: USB HID core driver Feb 13 02:26:37.504656 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Feb 13 02:26:37.504733 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 02:26:37.565673 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Feb 13 02:26:37.660186 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 02:26:37.660278 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 02:26:37.660287 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 02:26:38.249025 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:26:38.268551 disk-uuid[678]: The operation has completed successfully. Feb 13 02:26:38.277829 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:26:38.302643 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 02:26:38.402923 kernel: audit: type=1130 audit(1707791198.310:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.402938 kernel: audit: type=1131 audit(1707791198.310:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.302713 systemd[1]: Finished disk-uuid.service. Feb 13 02:26:38.433672 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 02:26:38.316506 systemd[1]: Starting verity-setup.service... Feb 13 02:26:38.463890 systemd[1]: Found device dev-mapper-usr.device. Feb 13 02:26:38.473396 systemd[1]: Mounting sysusr-usr.mount... Feb 13 02:26:38.479835 systemd[1]: Finished verity-setup.service. Feb 13 02:26:38.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.541592 kernel: audit: type=1130 audit(1707791198.490:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.599291 systemd[1]: Mounted sysusr-usr.mount. Feb 13 02:26:38.614713 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 02:26:38.606911 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 02:26:38.701043 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 02:26:38.701061 kernel: BTRFS info (device sda6): using free space tree Feb 13 02:26:38.701069 kernel: BTRFS info (device sda6): has skinny extents Feb 13 02:26:38.701076 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 02:26:38.607324 systemd[1]: Starting ignition-setup.service... Feb 13 02:26:38.630038 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 02:26:38.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.709043 systemd[1]: Finished ignition-setup.service. Feb 13 02:26:38.835683 kernel: audit: type=1130 audit(1707791198.725:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.835700 kernel: audit: type=1130 audit(1707791198.784:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.726021 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 02:26:38.844000 audit: BPF prog-id=9 op=LOAD Feb 13 02:26:38.785250 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 02:26:38.883632 kernel: audit: type=1334 audit(1707791198.844:24): prog-id=9 op=LOAD Feb 13 02:26:38.845465 systemd[1]: Starting systemd-networkd.service... Feb 13 02:26:38.943235 kernel: audit: type=1130 audit(1707791198.891:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.911031 ignition[865]: Ignition 2.14.0 Feb 13 02:26:38.882172 systemd-networkd[877]: lo: Link UP Feb 13 02:26:38.911035 ignition[865]: Stage: fetch-offline Feb 13 02:26:38.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.882175 systemd-networkd[877]: lo: Gained carrier Feb 13 02:26:39.103106 kernel: audit: type=1130 audit(1707791198.985:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:39.103130 kernel: audit: type=1130 audit(1707791199.047:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:39.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.911063 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:26:38.882457 systemd-networkd[877]: Enumeration completed Feb 13 02:26:38.911075 ignition[865]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:26:38.882496 systemd[1]: Started systemd-networkd.service. Feb 13 02:26:39.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.919368 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:26:38.883297 systemd-networkd[877]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:26:39.218668 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 02:26:39.218747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 13 02:26:39.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:39.218775 iscsid[898]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 02:26:39.218775 iscsid[898]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 02:26:39.218775 iscsid[898]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 02:26:39.218775 iscsid[898]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 02:26:39.218775 iscsid[898]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 02:26:39.218775 iscsid[898]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 02:26:39.218775 iscsid[898]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 02:26:39.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:38.919434 ignition[865]: parsed url from cmdline: "" Feb 13 02:26:38.891678 systemd[1]: Reached target network.target. Feb 13 02:26:38.919436 ignition[865]: no config URL provided Feb 13 02:26:38.923668 unknown[865]: fetched base config from "system" Feb 13 02:26:38.919439 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 02:26:38.923672 unknown[865]: fetched user config from "system" Feb 13 02:26:38.919452 ignition[865]: parsing config with SHA512: 00a5bda4d9e249bdb01d3a18bd005e5b538971cae6a3785c6ac22372c904516214885fcaf40304bf7df8584df5e354388a261972bb5d86b7cae7451983e7d776 Feb 13 02:26:38.958404 systemd[1]: Starting iscsiuio.service... Feb 13 02:26:39.428759 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 02:26:38.923823 ignition[865]: fetch-offline: fetch-offline passed Feb 13 02:26:38.971982 systemd[1]: Started iscsiuio.service. Feb 13 02:26:38.923827 ignition[865]: POST message to Packet Timeline Feb 13 02:26:38.985962 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 02:26:38.923831 ignition[865]: POST Status error: resource requires networking Feb 13 02:26:39.047996 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 02:26:38.923862 ignition[865]: Ignition finished successfully Feb 13 02:26:39.048508 systemd[1]: Starting ignition-kargs.service... Feb 13 02:26:39.107338 ignition[888]: Ignition 2.14.0 Feb 13 02:26:39.110285 systemd[1]: Starting iscsid.service... Feb 13 02:26:39.107341 ignition[888]: Stage: kargs Feb 13 02:26:39.126872 systemd[1]: Started iscsid.service. Feb 13 02:26:39.107396 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:26:39.141166 systemd[1]: Starting dracut-initqueue.service... Feb 13 02:26:39.107405 ignition[888]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:26:39.154885 systemd[1]: Finished dracut-initqueue.service. Feb 13 02:26:39.108743 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:26:39.182622 systemd-networkd[877]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:26:39.110688 ignition[888]: kargs: kargs passed Feb 13 02:26:39.196725 systemd[1]: Reached target remote-fs-pre.target. Feb 13 02:26:39.110696 ignition[888]: POST message to Packet Timeline Feb 13 02:26:39.226622 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 02:26:39.110712 ignition[888]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:26:39.226657 systemd[1]: Reached target remote-fs.target. Feb 13 02:26:39.113328 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48258->[::1]:53: read: connection refused Feb 13 02:26:39.277334 systemd[1]: Starting dracut-pre-mount.service... Feb 13 02:26:39.313537 ignition[888]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 02:26:39.297935 systemd[1]: Finished dracut-pre-mount.service. Feb 13 02:26:39.313987 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34758->[::1]:53: read: connection refused Feb 13 02:26:39.423747 systemd-networkd[877]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:26:39.451996 systemd-networkd[877]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:26:39.482300 systemd-networkd[877]: enp1s0f1np1: Link UP Feb 13 02:26:39.482752 systemd-networkd[877]: enp1s0f1np1: Gained carrier Feb 13 02:26:39.714130 ignition[888]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 02:26:39.493085 systemd-networkd[877]: enp1s0f0np0: Link UP Feb 13 02:26:39.715173 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45372->[::1]:53: read: connection refused Feb 13 02:26:39.493557 systemd-networkd[877]: eno2: Link UP Feb 13 02:26:39.494081 systemd-networkd[877]: eno1: Link UP Feb 13 02:26:40.252801 systemd-networkd[877]: enp1s0f0np0: Gained carrier Feb 13 02:26:40.261833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 13 02:26:40.288804 systemd-networkd[877]: enp1s0f0np0: DHCPv4 address 147.75.90.7/31, gateway 147.75.90.6 acquired from 145.40.83.140 Feb 13 02:26:40.515882 ignition[888]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 02:26:40.517194 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56580->[::1]:53: read: connection refused Feb 13 02:26:40.869175 systemd-networkd[877]: enp1s0f1np1: Gained IPv6LL Feb 13 02:26:41.765161 systemd-networkd[877]: enp1s0f0np0: Gained IPv6LL Feb 13 02:26:42.118748 ignition[888]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 02:26:42.120082 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51013->[::1]:53: read: connection refused Feb 13 02:26:45.323470 ignition[888]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 02:26:45.363805 ignition[888]: GET result: OK Feb 13 02:26:45.708160 ignition[888]: Ignition finished successfully Feb 13 02:26:45.712715 systemd[1]: Finished ignition-kargs.service. Feb 13 02:26:45.801485 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 02:26:45.801502 kernel: audit: type=1130 audit(1707791205.723:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:45.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:45.732346 ignition[916]: Ignition 2.14.0 Feb 13 02:26:45.725909 systemd[1]: Starting ignition-disks.service... Feb 13 02:26:45.732350 ignition[916]: Stage: disks Feb 13 02:26:45.732408 ignition[916]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:26:45.732418 ignition[916]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:26:45.734532 ignition[916]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:26:45.734956 ignition[916]: disks: disks passed Feb 13 02:26:45.734959 ignition[916]: POST message to Packet Timeline Feb 13 02:26:45.734968 ignition[916]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:26:45.768649 ignition[916]: GET result: OK Feb 13 02:26:45.970015 ignition[916]: Ignition finished successfully Feb 13 02:26:45.972748 systemd[1]: Finished ignition-disks.service. Feb 13 02:26:45.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:45.986232 systemd[1]: Reached target initrd-root-device.target. Feb 13 02:26:46.065846 kernel: audit: type=1130 audit(1707791205.985:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.051811 systemd[1]: Reached target local-fs-pre.target. Feb 13 02:26:46.051846 systemd[1]: Reached target local-fs.target. Feb 13 02:26:46.075803 systemd[1]: Reached target sysinit.target. Feb 13 02:26:46.090806 systemd[1]: Reached target basic.target. Feb 13 02:26:46.104474 systemd[1]: Starting systemd-fsck-root.service... Feb 13 02:26:46.124156 systemd-fsck[931]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 02:26:46.137004 systemd[1]: Finished systemd-fsck-root.service. Feb 13 02:26:46.232205 kernel: audit: type=1130 audit(1707791206.145:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.232221 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 02:26:46.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.151399 systemd[1]: Mounting sysroot.mount... Feb 13 02:26:46.240212 systemd[1]: Mounted sysroot.mount. Feb 13 02:26:46.253849 systemd[1]: Reached target initrd-root-fs.target. Feb 13 02:26:46.261418 systemd[1]: Mounting sysroot-usr.mount... Feb 13 02:26:46.286421 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 02:26:46.295128 systemd[1]: Starting flatcar-static-network.service... Feb 13 02:26:46.302742 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 02:26:46.302767 systemd[1]: Reached target ignition-diskful.target. Feb 13 02:26:46.326885 systemd[1]: Mounted sysroot-usr.mount. Feb 13 02:26:46.351754 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 02:26:46.363947 systemd[1]: Starting initrd-setup-root.service... Feb 13 02:26:46.492568 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (942) Feb 13 02:26:46.492597 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 02:26:46.492618 kernel: BTRFS info (device sda6): using free space tree Feb 13 02:26:46.492630 kernel: BTRFS info (device sda6): has skinny extents Feb 13 02:26:46.492641 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 02:26:46.492657 initrd-setup-root[949]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 02:26:46.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.557086 coreos-metadata[939]: Feb 13 02:26:46.406 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:26:46.557086 coreos-metadata[939]: Feb 13 02:26:46.446 INFO Fetch successful Feb 13 02:26:46.742367 kernel: audit: type=1130 audit(1707791206.500:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.742456 kernel: audit: type=1130 audit(1707791206.565:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.742464 kernel: audit: type=1130 audit(1707791206.629:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.742472 kernel: audit: type=1131 audit(1707791206.629:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.742526 coreos-metadata[938]: Feb 13 02:26:46.407 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:26:46.742526 coreos-metadata[938]: Feb 13 02:26:46.430 INFO Fetch successful Feb 13 02:26:46.742526 coreos-metadata[938]: Feb 13 02:26:46.447 INFO wrote hostname ci-3510.3.2-a-bf81e68a8d to /sysroot/etc/hostname Feb 13 02:26:46.417904 systemd[1]: Finished initrd-setup-root.service. Feb 13 02:26:46.806823 initrd-setup-root[957]: cut: /sysroot/etc/group: No such file or directory Feb 13 02:26:46.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.501742 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 02:26:46.878813 kernel: audit: type=1130 audit(1707791206.814:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.878828 initrd-setup-root[965]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 02:26:46.565930 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 02:26:46.898795 initrd-setup-root[973]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 02:26:46.565969 systemd[1]: Finished flatcar-static-network.service. Feb 13 02:26:46.916832 ignition[1016]: INFO : Ignition 2.14.0 Feb 13 02:26:46.916832 ignition[1016]: INFO : Stage: mount Feb 13 02:26:46.916832 ignition[1016]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:26:46.916832 ignition[1016]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:26:46.916832 ignition[1016]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:26:46.916832 ignition[1016]: INFO : mount: mount passed Feb 13 02:26:46.916832 ignition[1016]: INFO : POST message to Packet Timeline Feb 13 02:26:46.916832 ignition[1016]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:26:46.916832 ignition[1016]: INFO : GET result: OK Feb 13 02:26:46.629859 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 02:26:46.751189 systemd[1]: Starting ignition-mount.service... Feb 13 02:26:46.780172 systemd[1]: Starting sysroot-boot.service... Feb 13 02:26:47.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.087487 ignition[1016]: INFO : Ignition finished successfully Feb 13 02:26:47.102787 kernel: audit: type=1130 audit(1707791207.028:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:46.800593 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 02:26:46.800647 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 02:26:47.222658 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1032) Feb 13 02:26:47.222671 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 02:26:47.222678 kernel: BTRFS info (device sda6): using free space tree Feb 13 02:26:47.222685 kernel: BTRFS info (device sda6): has skinny extents Feb 13 02:26:47.222692 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 02:26:46.801424 systemd[1]: Finished sysroot-boot.service. Feb 13 02:26:47.020833 systemd[1]: Finished ignition-mount.service. Feb 13 02:26:47.030692 systemd[1]: Starting ignition-files.service... Feb 13 02:26:47.272940 ignition[1051]: INFO : Ignition 2.14.0 Feb 13 02:26:47.272940 ignition[1051]: INFO : Stage: files Feb 13 02:26:47.272940 ignition[1051]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:26:47.272940 ignition[1051]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:26:47.272940 ignition[1051]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:26:47.272940 ignition[1051]: DEBUG : files: compiled without relabeling support, skipping Feb 13 02:26:47.272940 ignition[1051]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 02:26:47.272940 ignition[1051]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 02:26:47.272940 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 02:26:47.272940 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940684420" Feb 13 02:26:47.272940 ignition[1051]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940684420": device or resource busy Feb 13 02:26:47.272940 ignition[1051]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2940684420", trying btrfs: device or resource busy Feb 13 02:26:47.272940 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940684420" Feb 13 02:26:47.568883 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1055) Feb 13 02:26:47.096382 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 02:26:47.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.635293 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940684420" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem2940684420" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem2940684420" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Feb 13 02:26:47.635293 ignition[1051]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 02:26:48.026887 kernel: audit: type=1130 audit(1707791207.576:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.232634 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 02:26:48.042980 ignition[1051]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 02:26:48.042980 ignition[1051]: INFO : files: files passed Feb 13 02:26:48.042980 ignition[1051]: INFO : POST message to Packet Timeline Feb 13 02:26:48.042980 ignition[1051]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:26:48.042980 ignition[1051]: INFO : GET result: OK Feb 13 02:26:48.042980 ignition[1051]: INFO : Ignition finished successfully Feb 13 02:26:47.259110 unknown[1051]: wrote ssh authorized keys file for user: core Feb 13 02:26:47.552303 systemd[1]: Finished ignition-files.service. Feb 13 02:26:48.184913 initrd-setup-root-after-ignition[1081]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 02:26:47.583418 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 02:26:47.643841 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 02:26:48.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.644160 systemd[1]: Starting ignition-quench.service... Feb 13 02:26:47.675045 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 02:26:48.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.705074 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 02:26:48.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.705172 systemd[1]: Finished ignition-quench.service. Feb 13 02:26:47.731143 systemd[1]: Reached target ignition-complete.target. Feb 13 02:26:47.753692 systemd[1]: Starting initrd-parse-etc.service... Feb 13 02:26:47.788867 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 02:26:47.788934 systemd[1]: Finished initrd-parse-etc.service. Feb 13 02:26:48.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.792893 systemd[1]: Reached target initrd-fs.target. Feb 13 02:26:48.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.817822 systemd[1]: Reached target initrd.target. Feb 13 02:26:48.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.845198 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 02:26:48.428792 ignition[1096]: INFO : Ignition 2.14.0 Feb 13 02:26:48.428792 ignition[1096]: INFO : Stage: umount Feb 13 02:26:48.428792 ignition[1096]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:26:48.428792 ignition[1096]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:26:48.428792 ignition[1096]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:26:48.428792 ignition[1096]: INFO : umount: umount passed Feb 13 02:26:48.428792 ignition[1096]: INFO : POST message to Packet Timeline Feb 13 02:26:48.428792 ignition[1096]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:26:48.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.568318 iscsid[898]: iscsid shutting down. Feb 13 02:26:48.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.847387 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 02:26:48.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.598320 ignition[1096]: INFO : GET result: OK Feb 13 02:26:47.881048 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 02:26:47.892668 systemd[1]: Starting initrd-cleanup.service... Feb 13 02:26:47.927738 systemd[1]: Stopped target nss-lookup.target. Feb 13 02:26:47.948181 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 02:26:48.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:47.970228 systemd[1]: Stopped target timers.target. Feb 13 02:26:48.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.687922 ignition[1096]: INFO : Ignition finished successfully Feb 13 02:26:48.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.695000 audit: BPF prog-id=6 op=UNLOAD Feb 13 02:26:47.990182 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 02:26:47.990545 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 02:26:48.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.011487 systemd[1]: Stopped target initrd.target. Feb 13 02:26:48.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.034293 systemd[1]: Stopped target basic.target. Feb 13 02:26:48.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.050189 systemd[1]: Stopped target ignition-complete.target. Feb 13 02:26:48.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.074192 systemd[1]: Stopped target ignition-diskful.target. Feb 13 02:26:48.090184 systemd[1]: Stopped target initrd-root-device.target. Feb 13 02:26:48.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.108177 systemd[1]: Stopped target remote-fs.target. Feb 13 02:26:48.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.127170 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 02:26:48.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.143207 systemd[1]: Stopped target sysinit.target. Feb 13 02:26:48.161201 systemd[1]: Stopped target local-fs.target. Feb 13 02:26:48.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.178187 systemd[1]: Stopped target local-fs-pre.target. Feb 13 02:26:48.193179 systemd[1]: Stopped target swap.target. Feb 13 02:26:48.215072 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 02:26:48.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.215438 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 02:26:48.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.233397 systemd[1]: Stopped target cryptsetup.target. Feb 13 02:26:48.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.259080 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 02:26:48.259433 systemd[1]: Stopped dracut-initqueue.service. Feb 13 02:26:48.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.274334 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 02:26:48.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.274709 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 02:26:49.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.292383 systemd[1]: Stopped target paths.target. Feb 13 02:26:49.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:49.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.307010 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 02:26:48.310810 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 02:26:48.322188 systemd[1]: Stopped target slices.target. Feb 13 02:26:48.337173 systemd[1]: Stopped target sockets.target. Feb 13 02:26:48.353189 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 02:26:48.353565 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 02:26:48.372282 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 02:26:48.372638 systemd[1]: Stopped ignition-files.service. Feb 13 02:26:48.388278 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 02:26:48.388654 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 02:26:48.406334 systemd[1]: Stopping ignition-mount.service... Feb 13 02:26:49.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:48.417743 systemd[1]: Stopping iscsid.service... Feb 13 02:26:48.436276 systemd[1]: Stopping sysroot-boot.service... Feb 13 02:26:48.449983 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 02:26:48.450415 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 02:26:48.466238 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 02:26:48.466563 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 02:26:48.492737 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 02:26:48.494803 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 02:26:48.495036 systemd[1]: Stopped iscsid.service. Feb 13 02:26:49.237613 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 13 02:26:48.513247 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 02:26:48.513470 systemd[1]: Stopped sysroot-boot.service. Feb 13 02:26:48.531090 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 02:26:48.531338 systemd[1]: Closed iscsid.socket. Feb 13 02:26:48.545117 systemd[1]: Stopping iscsiuio.service... Feb 13 02:26:48.553405 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 02:26:48.553665 systemd[1]: Stopped iscsiuio.service. Feb 13 02:26:48.575468 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 02:26:48.575706 systemd[1]: Finished initrd-cleanup.service. Feb 13 02:26:48.591761 systemd[1]: Stopped target network.target. Feb 13 02:26:48.605909 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 02:26:48.606011 systemd[1]: Closed iscsiuio.socket. Feb 13 02:26:48.620153 systemd[1]: Stopping systemd-networkd.service... Feb 13 02:26:48.630729 systemd-networkd[877]: enp1s0f0np0: DHCPv6 lease lost Feb 13 02:26:48.634993 systemd[1]: Stopping systemd-resolved.service... Feb 13 02:26:48.640809 systemd-networkd[877]: enp1s0f1np1: DHCPv6 lease lost Feb 13 02:26:48.650414 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 02:26:49.237000 audit: BPF prog-id=9 op=UNLOAD Feb 13 02:26:48.650667 systemd[1]: Stopped systemd-resolved.service. Feb 13 02:26:48.666618 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 02:26:48.666866 systemd[1]: Stopped systemd-networkd.service. Feb 13 02:26:48.682246 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 02:26:48.682523 systemd[1]: Stopped ignition-mount.service. Feb 13 02:26:48.696265 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 02:26:48.696351 systemd[1]: Closed systemd-networkd.socket. Feb 13 02:26:48.711840 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 02:26:48.711990 systemd[1]: Stopped ignition-disks.service. Feb 13 02:26:48.727919 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 02:26:48.728049 systemd[1]: Stopped ignition-kargs.service. Feb 13 02:26:48.743021 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 02:26:48.743163 systemd[1]: Stopped ignition-setup.service. Feb 13 02:26:48.758028 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 02:26:48.758174 systemd[1]: Stopped initrd-setup-root.service. Feb 13 02:26:48.775735 systemd[1]: Stopping network-cleanup.service... Feb 13 02:26:48.788790 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 02:26:48.788969 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 02:26:48.804988 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 02:26:48.805122 systemd[1]: Stopped systemd-sysctl.service. Feb 13 02:26:48.821162 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 02:26:48.821278 systemd[1]: Stopped systemd-modules-load.service. Feb 13 02:26:48.836217 systemd[1]: Stopping systemd-udevd.service... Feb 13 02:26:48.854680 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 02:26:48.856067 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 02:26:48.856379 systemd[1]: Stopped systemd-udevd.service. Feb 13 02:26:48.868282 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 02:26:48.868420 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 02:26:48.880927 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 02:26:48.881020 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 02:26:48.897856 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 02:26:48.897973 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 02:26:48.914035 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 02:26:48.914165 systemd[1]: Stopped dracut-cmdline.service. Feb 13 02:26:48.929951 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 02:26:48.930066 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 02:26:48.947754 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 02:26:48.961678 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 13 02:26:48.961707 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 13 02:26:48.976746 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 02:26:48.976775 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 02:26:48.991709 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 02:26:48.991748 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 02:26:49.011174 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 13 02:26:49.011906 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 02:26:49.012022 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 02:26:49.118848 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 02:26:49.119060 systemd[1]: Stopped network-cleanup.service. Feb 13 02:26:49.130076 systemd[1]: Reached target initrd-switch-root.target. Feb 13 02:26:49.147324 systemd[1]: Starting initrd-switch-root.service... Feb 13 02:26:49.184210 systemd[1]: Switching root. Feb 13 02:26:49.239869 systemd-journald[267]: Journal stopped Feb 13 02:26:53.204506 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 02:26:53.204520 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 02:26:53.204529 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 02:26:53.204535 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 02:26:53.204540 kernel: SELinux: policy capability open_perms=1 Feb 13 02:26:53.204545 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 02:26:53.204551 kernel: SELinux: policy capability always_check_network=0 Feb 13 02:26:53.204556 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 02:26:53.204561 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 02:26:53.204567 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 02:26:53.204572 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 02:26:53.204578 systemd[1]: Successfully loaded SELinux policy in 301.984ms. Feb 13 02:26:53.204585 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.285ms. Feb 13 02:26:53.204612 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 02:26:53.204636 systemd[1]: Detected architecture x86-64. Feb 13 02:26:53.204642 systemd[1]: Detected first boot. Feb 13 02:26:53.204648 systemd[1]: Hostname set to . Feb 13 02:26:53.204654 systemd[1]: Initializing machine ID from random generator. Feb 13 02:26:53.204660 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 02:26:53.204666 systemd[1]: Populated /etc with preset unit settings. Feb 13 02:26:53.204672 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 02:26:53.204679 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 02:26:53.204685 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 02:26:53.204691 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 13 02:26:53.204697 kernel: audit: type=1334 audit(1707791211.535:93): prog-id=12 op=LOAD Feb 13 02:26:53.204703 kernel: audit: type=1334 audit(1707791211.535:94): prog-id=3 op=UNLOAD Feb 13 02:26:53.204708 kernel: audit: type=1334 audit(1707791211.599:95): prog-id=13 op=LOAD Feb 13 02:26:53.204714 kernel: audit: type=1334 audit(1707791211.620:96): prog-id=14 op=LOAD Feb 13 02:26:53.204720 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 02:26:53.204726 kernel: audit: type=1334 audit(1707791211.620:97): prog-id=4 op=UNLOAD Feb 13 02:26:53.204732 kernel: audit: type=1334 audit(1707791211.620:98): prog-id=5 op=UNLOAD Feb 13 02:26:53.204737 systemd[1]: Stopped initrd-switch-root.service. Feb 13 02:26:53.204743 kernel: audit: type=1131 audit(1707791211.620:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.204749 kernel: audit: type=1334 audit(1707791211.771:100): prog-id=12 op=UNLOAD Feb 13 02:26:53.204754 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 02:26:53.204761 kernel: audit: type=1130 audit(1707791211.778:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.204767 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 02:26:53.204773 kernel: audit: type=1131 audit(1707791211.778:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.204779 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 02:26:53.204785 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 02:26:53.204793 systemd[1]: Created slice system-getty.slice. Feb 13 02:26:53.204799 systemd[1]: Created slice system-modprobe.slice. Feb 13 02:26:53.204805 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 02:26:53.204812 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 02:26:53.204818 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 02:26:53.204825 systemd[1]: Created slice user.slice. Feb 13 02:26:53.204831 systemd[1]: Started systemd-ask-password-console.path. Feb 13 02:26:53.204837 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 02:26:53.204843 systemd[1]: Set up automount boot.automount. Feb 13 02:26:53.204850 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 02:26:53.204856 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 02:26:53.204862 systemd[1]: Stopped target initrd-fs.target. Feb 13 02:26:53.204869 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 02:26:53.204875 systemd[1]: Reached target integritysetup.target. Feb 13 02:26:53.204881 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 02:26:53.204887 systemd[1]: Reached target remote-fs.target. Feb 13 02:26:53.204894 systemd[1]: Reached target slices.target. Feb 13 02:26:53.204900 systemd[1]: Reached target swap.target. Feb 13 02:26:53.204906 systemd[1]: Reached target torcx.target. Feb 13 02:26:53.204912 systemd[1]: Reached target veritysetup.target. Feb 13 02:26:53.204919 systemd[1]: Listening on systemd-coredump.socket. Feb 13 02:26:53.204925 systemd[1]: Listening on systemd-initctl.socket. Feb 13 02:26:53.204931 systemd[1]: Listening on systemd-networkd.socket. Feb 13 02:26:53.204938 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 02:26:53.204945 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 02:26:53.204951 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 02:26:53.204958 systemd[1]: Mounting dev-hugepages.mount... Feb 13 02:26:53.204964 systemd[1]: Mounting dev-mqueue.mount... Feb 13 02:26:53.204970 systemd[1]: Mounting media.mount... Feb 13 02:26:53.204977 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 02:26:53.204983 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 02:26:53.204989 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 02:26:53.204995 systemd[1]: Mounting tmp.mount... Feb 13 02:26:53.205003 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 02:26:53.205009 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 02:26:53.205015 systemd[1]: Starting kmod-static-nodes.service... Feb 13 02:26:53.205022 systemd[1]: Starting modprobe@configfs.service... Feb 13 02:26:53.205028 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 02:26:53.205034 systemd[1]: Starting modprobe@drm.service... Feb 13 02:26:53.205040 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 02:26:53.205047 systemd[1]: Starting modprobe@fuse.service... Feb 13 02:26:53.205053 kernel: fuse: init (API version 7.34) Feb 13 02:26:53.205060 systemd[1]: Starting modprobe@loop.service... Feb 13 02:26:53.205066 kernel: loop: module loaded Feb 13 02:26:53.205072 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 02:26:53.205078 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 02:26:53.205084 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 02:26:53.205091 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 02:26:53.205097 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 02:26:53.205103 systemd[1]: Stopped systemd-journald.service. Feb 13 02:26:53.205109 systemd[1]: Starting systemd-journald.service... Feb 13 02:26:53.205117 systemd[1]: Starting systemd-modules-load.service... Feb 13 02:26:53.205125 systemd-journald[1247]: Journal started Feb 13 02:26:53.205149 systemd-journald[1247]: Runtime Journal (/run/log/journal/2ca314eee7af4117a2561248bd4c4e30) is 8.0M, max 640.1M, 632.1M free. Feb 13 02:26:49.664000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 02:26:49.941000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 02:26:49.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 02:26:49.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 02:26:49.943000 audit: BPF prog-id=10 op=LOAD Feb 13 02:26:49.943000 audit: BPF prog-id=10 op=UNLOAD Feb 13 02:26:49.943000 audit: BPF prog-id=11 op=LOAD Feb 13 02:26:49.943000 audit: BPF prog-id=11 op=UNLOAD Feb 13 02:26:50.010000 audit[1136]: AVC avc: denied { associate } for pid=1136 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 02:26:50.010000 audit[1136]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1119 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:26:50.010000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 02:26:50.034000 audit[1136]: AVC avc: denied { associate } for pid=1136 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 02:26:50.034000 audit[1136]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b5 a2=1ed a3=0 items=2 ppid=1119 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:26:50.034000 audit: CWD cwd="/" Feb 13 02:26:50.034000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:50.034000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:50.034000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 02:26:51.535000 audit: BPF prog-id=12 op=LOAD Feb 13 02:26:51.535000 audit: BPF prog-id=3 op=UNLOAD Feb 13 02:26:51.599000 audit: BPF prog-id=13 op=LOAD Feb 13 02:26:51.620000 audit: BPF prog-id=14 op=LOAD Feb 13 02:26:51.620000 audit: BPF prog-id=4 op=UNLOAD Feb 13 02:26:51.620000 audit: BPF prog-id=5 op=UNLOAD Feb 13 02:26:51.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:51.771000 audit: BPF prog-id=12 op=UNLOAD Feb 13 02:26:51.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:51.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.177000 audit: BPF prog-id=15 op=LOAD Feb 13 02:26:53.178000 audit: BPF prog-id=16 op=LOAD Feb 13 02:26:53.178000 audit: BPF prog-id=17 op=LOAD Feb 13 02:26:53.178000 audit: BPF prog-id=13 op=UNLOAD Feb 13 02:26:53.178000 audit: BPF prog-id=14 op=UNLOAD Feb 13 02:26:53.202000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 02:26:53.202000 audit[1247]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff756ea8d0 a2=4000 a3=7fff756ea96c items=0 ppid=1 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:26:53.202000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 02:26:51.533899 systemd[1]: Queued start job for default target multi-user.target. Feb 13 02:26:50.007754 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 02:26:51.621208 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 02:26:50.008370 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 02:26:50.008384 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 02:26:50.008406 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 02:26:50.008413 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 02:26:50.008433 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 02:26:50.008441 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 02:26:50.008572 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 02:26:50.008606 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 02:26:50.008615 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 02:26:50.009181 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 02:26:50.009207 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 02:26:50.009221 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 02:26:50.009231 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 02:26:50.009243 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 02:26:50.009252 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 02:26:51.195261 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:26:51.195402 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:26:51.195460 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:26:51.195552 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:26:51.195581 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 02:26:51.195619 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2024-02-13T02:26:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 02:26:53.236799 systemd[1]: Starting systemd-network-generator.service... Feb 13 02:26:53.259638 systemd[1]: Starting systemd-remount-fs.service... Feb 13 02:26:53.281635 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 02:26:53.315090 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 02:26:53.315111 systemd[1]: Stopped verity-setup.service. Feb 13 02:26:53.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.349637 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 02:26:53.363637 systemd[1]: Started systemd-journald.service. Feb 13 02:26:53.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.372108 systemd[1]: Mounted dev-hugepages.mount. Feb 13 02:26:53.379844 systemd[1]: Mounted dev-mqueue.mount. Feb 13 02:26:53.386831 systemd[1]: Mounted media.mount. Feb 13 02:26:53.393848 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 02:26:53.402837 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 02:26:53.411836 systemd[1]: Mounted tmp.mount. Feb 13 02:26:53.418894 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 02:26:53.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.427946 systemd[1]: Finished kmod-static-nodes.service. Feb 13 02:26:53.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.436953 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 02:26:53.437059 systemd[1]: Finished modprobe@configfs.service. Feb 13 02:26:53.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.446021 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 02:26:53.446154 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 02:26:53.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.455058 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 02:26:53.455218 systemd[1]: Finished modprobe@drm.service. Feb 13 02:26:53.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.464253 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 02:26:53.464503 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 02:26:53.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.473398 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 02:26:53.473728 systemd[1]: Finished modprobe@fuse.service. Feb 13 02:26:53.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.482387 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 02:26:53.482700 systemd[1]: Finished modprobe@loop.service. Feb 13 02:26:53.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.491439 systemd[1]: Finished systemd-modules-load.service. Feb 13 02:26:53.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.500397 systemd[1]: Finished systemd-network-generator.service. Feb 13 02:26:53.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.509366 systemd[1]: Finished systemd-remount-fs.service. Feb 13 02:26:53.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.518398 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 02:26:53.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.527943 systemd[1]: Reached target network-pre.target. Feb 13 02:26:53.539313 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 02:26:53.549262 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 02:26:53.556762 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 02:26:53.557766 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 02:26:53.565255 systemd[1]: Starting systemd-journal-flush.service... Feb 13 02:26:53.568981 systemd-journald[1247]: Time spent on flushing to /var/log/journal/2ca314eee7af4117a2561248bd4c4e30 is 15.044ms for 1554 entries. Feb 13 02:26:53.568981 systemd-journald[1247]: System Journal (/var/log/journal/2ca314eee7af4117a2561248bd4c4e30) is 8.0M, max 195.6M, 187.6M free. Feb 13 02:26:53.610689 systemd-journald[1247]: Received client request to flush runtime journal. Feb 13 02:26:53.581734 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 02:26:53.582209 systemd[1]: Starting systemd-random-seed.service... Feb 13 02:26:53.592725 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 02:26:53.593218 systemd[1]: Starting systemd-sysctl.service... Feb 13 02:26:53.600445 systemd[1]: Starting systemd-sysusers.service... Feb 13 02:26:53.608258 systemd[1]: Starting systemd-udev-settle.service... Feb 13 02:26:53.615825 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 02:26:53.623779 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 02:26:53.631827 systemd[1]: Finished systemd-journal-flush.service. Feb 13 02:26:53.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.639882 systemd[1]: Finished systemd-random-seed.service. Feb 13 02:26:53.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.647806 systemd[1]: Finished systemd-sysctl.service. Feb 13 02:26:53.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.655798 systemd[1]: Finished systemd-sysusers.service. Feb 13 02:26:53.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.664815 systemd[1]: Reached target first-boot-complete.target. Feb 13 02:26:53.673323 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 02:26:53.682708 udevadm[1263]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 13 02:26:53.691886 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 02:26:53.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.860482 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 02:26:53.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.868000 audit: BPF prog-id=18 op=LOAD Feb 13 02:26:53.868000 audit: BPF prog-id=19 op=LOAD Feb 13 02:26:53.868000 audit: BPF prog-id=7 op=UNLOAD Feb 13 02:26:53.868000 audit: BPF prog-id=8 op=UNLOAD Feb 13 02:26:53.869832 systemd[1]: Starting systemd-udevd.service... Feb 13 02:26:53.881100 systemd-udevd[1266]: Using default interface naming scheme 'v252'. Feb 13 02:26:53.899079 systemd[1]: Started systemd-udevd.service. Feb 13 02:26:53.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:53.908747 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 02:26:53.908000 audit: BPF prog-id=20 op=LOAD Feb 13 02:26:53.910001 systemd[1]: Starting systemd-networkd.service... Feb 13 02:26:53.931000 audit: BPF prog-id=21 op=LOAD Feb 13 02:26:53.931000 audit: BPF prog-id=22 op=LOAD Feb 13 02:26:53.945374 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 02:26:53.945433 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 02:26:53.945449 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1286) Feb 13 02:26:53.945465 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 02:26:53.981000 audit: BPF prog-id=23 op=LOAD Feb 13 02:26:53.982593 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 02:26:53.982709 systemd[1]: Starting systemd-userdbd.service... Feb 13 02:26:53.997693 kernel: ACPI: button: Power Button [PWRF] Feb 13 02:26:53.941000 audit[1322]: AVC avc: denied { confidentiality } for pid=1322 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 02:26:53.941000 audit[1322]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55794a503c70 a1=4d8bc a2=7fe1f4c89bc5 a3=5 items=42 ppid=1266 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:26:53.941000 audit: CWD cwd="/" Feb 13 02:26:53.941000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=1 name=(null) inode=24863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=2 name=(null) inode=24863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=3 name=(null) inode=24864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=4 name=(null) inode=24863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=5 name=(null) inode=24865 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=6 name=(null) inode=24863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=7 name=(null) inode=24866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:54.069613 kernel: IPMI message handler: version 39.2 Feb 13 02:26:54.069643 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 02:26:53.941000 audit: PATH item=8 name=(null) inode=24866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=9 name=(null) inode=24867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=10 name=(null) inode=24866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=11 name=(null) inode=24868 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=12 name=(null) inode=24866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=13 name=(null) inode=24869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=14 name=(null) inode=24866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=15 name=(null) inode=24870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=16 name=(null) inode=24866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=17 name=(null) inode=24871 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=18 name=(null) inode=24863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=19 name=(null) inode=24872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=20 name=(null) inode=24872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=21 name=(null) inode=24873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=22 name=(null) inode=24872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=23 name=(null) inode=24874 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=24 name=(null) inode=24872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=25 name=(null) inode=24875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=26 name=(null) inode=24872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=27 name=(null) inode=24876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=28 name=(null) inode=24872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=29 name=(null) inode=24877 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=30 name=(null) inode=24863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=31 name=(null) inode=24878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=32 name=(null) inode=24878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=33 name=(null) inode=24879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=34 name=(null) inode=24878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=35 name=(null) inode=24880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=36 name=(null) inode=24878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=37 name=(null) inode=24881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=38 name=(null) inode=24878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=39 name=(null) inode=24882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=40 name=(null) inode=24878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PATH item=41 name=(null) inode=24883 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:26:53.941000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 02:26:54.070186 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 02:26:54.102240 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 02:26:54.102592 kernel: ipmi device interface Feb 13 02:26:54.115592 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 02:26:54.136593 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 02:26:54.136700 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 02:26:54.169593 kernel: ipmi_si: IPMI System Interface driver Feb 13 02:26:54.172901 systemd[1]: Started systemd-userdbd.service. Feb 13 02:26:54.200726 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 02:26:54.200825 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 02:26:54.200840 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 02:26:54.200855 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 02:26:54.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.264441 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 02:26:54.264505 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 02:26:54.324894 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 02:26:54.325026 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 02:26:54.325111 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 02:26:54.325182 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 02:26:54.325196 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 02:26:54.419708 kernel: intel_rapl_common: Found RAPL domain package Feb 13 02:26:54.419763 kernel: intel_rapl_common: Found RAPL domain core Feb 13 02:26:54.419779 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 02:26:54.491626 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 02:26:54.513133 systemd-networkd[1303]: bond0: netdev ready Feb 13 02:26:54.520456 systemd-networkd[1303]: lo: Link UP Feb 13 02:26:54.520485 systemd-networkd[1303]: lo: Gained carrier Feb 13 02:26:54.522262 systemd-networkd[1303]: Enumeration completed Feb 13 02:26:54.522379 systemd[1]: Started systemd-networkd.service. Feb 13 02:26:54.523848 systemd-networkd[1303]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 02:26:54.529819 systemd-networkd[1303]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:74:e9.network. Feb 13 02:26:54.536634 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 02:26:54.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.545283 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 02:26:54.603594 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 02:26:54.621620 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 02:26:54.626787 systemd[1]: Finished systemd-udev-settle.service. Feb 13 02:26:54.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.635283 systemd[1]: Starting lvm2-activation-early.service... Feb 13 02:26:54.651029 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 02:26:54.678011 systemd[1]: Finished lvm2-activation-early.service. Feb 13 02:26:54.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.685716 systemd[1]: Reached target cryptsetup.target. Feb 13 02:26:54.694232 systemd[1]: Starting lvm2-activation.service... Feb 13 02:26:54.696327 lvm[1373]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 02:26:54.725018 systemd[1]: Finished lvm2-activation.service. Feb 13 02:26:54.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.732719 systemd[1]: Reached target local-fs-pre.target. Feb 13 02:26:54.740708 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 02:26:54.740722 systemd[1]: Reached target local-fs.target. Feb 13 02:26:54.748679 systemd[1]: Reached target machines.target. Feb 13 02:26:54.757261 systemd[1]: Starting ldconfig.service... Feb 13 02:26:54.764315 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 02:26:54.764336 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 02:26:54.764833 systemd[1]: Starting systemd-boot-update.service... Feb 13 02:26:54.772096 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 02:26:54.782232 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 02:26:54.782310 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 02:26:54.782333 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 02:26:54.782818 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 02:26:54.783013 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1375 (bootctl) Feb 13 02:26:54.783563 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 02:26:54.789700 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 02:26:54.790501 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 02:26:54.792972 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 02:26:54.802727 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 02:26:54.803072 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 02:26:54.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.804110 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 02:26:54.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.860210 systemd-fsck[1383]: fsck.fat 4.2 (2021-01-31) Feb 13 02:26:54.860210 systemd-fsck[1383]: /dev/sda1: 789 files, 115339/258078 clusters Feb 13 02:26:54.860872 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 02:26:54.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.873775 systemd[1]: Mounting boot.mount... Feb 13 02:26:54.886642 systemd[1]: Mounted boot.mount. Feb 13 02:26:54.906388 systemd[1]: Finished systemd-boot-update.service. Feb 13 02:26:54.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.935852 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 02:26:54.948628 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 02:26:54.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:26:54.966438 systemd[1]: Starting audit-rules.service... Feb 13 02:26:54.973628 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 02:26:54.974301 systemd-networkd[1303]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:74:e8.network. Feb 13 02:26:54.981209 systemd[1]: Starting clean-ca-certificates.service... Feb 13 02:26:54.986000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 02:26:54.986000 audit[1402]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffcda378c0 a2=420 a3=0 items=0 ppid=1386 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:26:54.986000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 02:26:54.987333 augenrules[1402]: No rules Feb 13 02:26:54.990232 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 02:26:54.999676 systemd[1]: Starting systemd-resolved.service... Feb 13 02:26:55.007619 systemd[1]: Starting systemd-timesyncd.service... Feb 13 02:26:55.015151 systemd[1]: Starting systemd-update-utmp.service... Feb 13 02:26:55.021953 systemd[1]: Finished audit-rules.service. Feb 13 02:26:55.028762 systemd[1]: Finished clean-ca-certificates.service. Feb 13 02:26:55.036749 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 02:26:55.046929 ldconfig[1374]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 02:26:55.054760 systemd[1]: Finished ldconfig.service. Feb 13 02:26:55.066762 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 02:26:55.074615 systemd[1]: Starting systemd-update-done.service... Feb 13 02:26:55.081674 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 02:26:55.081911 systemd[1]: Finished systemd-update-utmp.service. Feb 13 02:26:55.089818 systemd[1]: Finished systemd-update-done.service. Feb 13 02:26:55.102770 systemd[1]: Started systemd-timesyncd.service. Feb 13 02:26:55.104453 systemd-resolved[1408]: Positive Trust Anchors: Feb 13 02:26:55.104458 systemd-resolved[1408]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 02:26:55.104476 systemd-resolved[1408]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 02:26:55.108612 systemd-resolved[1408]: Using system hostname 'ci-3510.3.2-a-bf81e68a8d'. Feb 13 02:26:55.110860 systemd[1]: Reached target time-set.target. Feb 13 02:26:55.143631 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 02:26:55.183910 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 02:26:55.183988 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 02:26:55.184019 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 02:26:55.205537 systemd-networkd[1303]: bond0: Link UP Feb 13 02:26:55.205759 systemd-networkd[1303]: enp1s0f1np1: Link UP Feb 13 02:26:55.205897 systemd-networkd[1303]: enp1s0f1np1: Gained carrier Feb 13 02:26:55.206241 systemd[1]: Started systemd-resolved.service. Feb 13 02:26:55.206836 systemd-networkd[1303]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:74:e8.network. Feb 13 02:26:55.222752 systemd[1]: Reached target network.target. Feb 13 02:26:55.230665 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 02:26:55.230704 kernel: bond0: active interface up! Feb 13 02:26:55.261675 systemd[1]: Reached target nss-lookup.target. Feb 13 02:26:55.268590 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 13 02:26:55.275643 systemd[1]: Reached target sysinit.target. Feb 13 02:26:55.283662 systemd[1]: Started motdgen.path. Feb 13 02:26:55.291635 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 02:26:55.302689 systemd[1]: Started logrotate.timer. Feb 13 02:26:55.317656 systemd[1]: Started mdadm.timer. Feb 13 02:26:55.330632 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 02:26:55.337628 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 02:26:55.346631 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 02:26:55.346646 systemd[1]: Reached target paths.target. Feb 13 02:26:55.354617 systemd[1]: Reached target timers.target. Feb 13 02:26:55.362741 systemd[1]: Listening on dbus.socket. Feb 13 02:26:55.371171 systemd[1]: Starting docker.socket... Feb 13 02:26:55.374733 systemd-networkd[1303]: enp1s0f0np0: Link UP Feb 13 02:26:55.374936 systemd-networkd[1303]: bond0: Gained carrier Feb 13 02:26:55.375018 systemd-networkd[1303]: enp1s0f0np0: Gained carrier Feb 13 02:26:55.375096 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.414875 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 02:26:55.414903 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 02:26:55.419082 systemd[1]: Listening on sshd.socket. Feb 13 02:26:55.421789 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.421968 systemd-networkd[1303]: enp1s0f1np1: Link DOWN Feb 13 02:26:55.421971 systemd-networkd[1303]: enp1s0f1np1: Lost carrier Feb 13 02:26:55.425712 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 02:26:55.426109 systemd[1]: Listening on docker.socket. Feb 13 02:26:55.432664 systemd[1]: Reached target sockets.target. Feb 13 02:26:55.432747 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.432909 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.440617 systemd[1]: Reached target basic.target. Feb 13 02:26:55.447639 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 02:26:55.447651 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 02:26:55.448110 systemd[1]: Starting containerd.service... Feb 13 02:26:55.455041 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 02:26:55.463083 systemd[1]: Starting coreos-metadata.service... Feb 13 02:26:55.470116 systemd[1]: Starting dbus.service... Feb 13 02:26:55.476112 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 02:26:55.481034 jq[1423]: false Feb 13 02:26:55.483229 coreos-metadata[1416]: Feb 13 02:26:55.483 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:26:55.483398 systemd[1]: Starting extend-filesystems.service... Feb 13 02:26:55.487999 dbus-daemon[1422]: [system] SELinux support is enabled Feb 13 02:26:55.489652 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 02:26:55.490349 coreos-metadata[1419]: Feb 13 02:26:55.490 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:26:55.490431 systemd[1]: Starting motdgen.service... Feb 13 02:26:55.490795 extend-filesystems[1425]: Found sda Feb 13 02:26:55.490795 extend-filesystems[1425]: Found sda1 Feb 13 02:26:55.533651 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 13 02:26:55.498256 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 02:26:55.533811 extend-filesystems[1425]: Found sda2 Feb 13 02:26:55.533811 extend-filesystems[1425]: Found sda3 Feb 13 02:26:55.533811 extend-filesystems[1425]: Found usr Feb 13 02:26:55.533811 extend-filesystems[1425]: Found sda4 Feb 13 02:26:55.533811 extend-filesystems[1425]: Found sda6 Feb 13 02:26:55.533811 extend-filesystems[1425]: Found sda7 Feb 13 02:26:55.533811 extend-filesystems[1425]: Found sda9 Feb 13 02:26:55.533811 extend-filesystems[1425]: Checking size of /dev/sda9 Feb 13 02:26:55.533811 extend-filesystems[1425]: Resized partition /dev/sda9 Feb 13 02:26:55.668619 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 02:26:55.668723 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 02:26:55.668743 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 02:26:55.668758 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 02:26:55.527349 systemd[1]: Starting sshd-keygen.service... Feb 13 02:26:55.668854 extend-filesystems[1440]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 02:26:55.540283 systemd[1]: Starting systemd-logind.service... Feb 13 02:26:55.556658 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 02:26:55.683790 update_engine[1452]: I0213 02:26:55.637507 1452 main.cc:92] Flatcar Update Engine starting Feb 13 02:26:55.683790 update_engine[1452]: I0213 02:26:55.640995 1452 update_check_scheduler.cc:74] Next update check in 11m5s Feb 13 02:26:55.557152 systemd[1]: Starting tcsd.service... Feb 13 02:26:55.683950 jq[1453]: true Feb 13 02:26:55.578694 systemd-logind[1450]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 02:26:55.578703 systemd-logind[1450]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 02:26:55.578712 systemd-logind[1450]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 02:26:55.578817 systemd-logind[1450]: New seat seat0. Feb 13 02:26:55.595881 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 02:26:55.596253 systemd[1]: Starting update-engine.service... Feb 13 02:26:55.599918 systemd-networkd[1303]: enp1s0f1np1: Link UP Feb 13 02:26:55.599922 systemd-networkd[1303]: enp1s0f1np1: Gained carrier Feb 13 02:26:55.607778 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.607833 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.607896 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.608017 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:55.613286 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 02:26:55.638933 systemd[1]: Started dbus.service. Feb 13 02:26:55.677471 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 02:26:55.677561 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 02:26:55.677711 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 02:26:55.677783 systemd[1]: Finished motdgen.service. Feb 13 02:26:55.690944 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 02:26:55.691017 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 02:26:55.701210 jq[1455]: true Feb 13 02:26:55.701712 dbus-daemon[1422]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 02:26:55.706882 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 02:26:55.706975 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 02:26:55.707052 systemd[1]: Started systemd-logind.service. Feb 13 02:26:55.710760 env[1456]: time="2024-02-13T02:26:55.710737881Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 02:26:55.717506 systemd[1]: Started update-engine.service. Feb 13 02:26:55.718927 env[1456]: time="2024-02-13T02:26:55.718914694Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 02:26:55.719769 env[1456]: time="2024-02-13T02:26:55.719723890Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:26:55.720393 env[1456]: time="2024-02-13T02:26:55.720375264Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 02:26:55.720441 env[1456]: time="2024-02-13T02:26:55.720391878Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:26:55.720525 env[1456]: time="2024-02-13T02:26:55.720513109Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 02:26:55.720560 env[1456]: time="2024-02-13T02:26:55.720524720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 02:26:55.720560 env[1456]: time="2024-02-13T02:26:55.720536119Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 02:26:55.720560 env[1456]: time="2024-02-13T02:26:55.720546447Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 02:26:55.722533 env[1456]: time="2024-02-13T02:26:55.722520155Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:26:55.722680 env[1456]: time="2024-02-13T02:26:55.722669344Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:26:55.722766 env[1456]: time="2024-02-13T02:26:55.722753097Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 02:26:55.722796 env[1456]: time="2024-02-13T02:26:55.722764792Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 02:26:55.724826 env[1456]: time="2024-02-13T02:26:55.724812583Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 02:26:55.724895 env[1456]: time="2024-02-13T02:26:55.724824914Z" level=info msg="metadata content store policy set" policy=shared Feb 13 02:26:55.727298 systemd[1]: Started locksmithd.service. Feb 13 02:26:55.733734 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 02:26:55.733812 systemd[1]: Reached target system-config.target. Feb 13 02:26:55.737648 bash[1484]: Updated "/home/core/.ssh/authorized_keys" Feb 13 02:26:55.741727 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 02:26:55.741799 systemd[1]: Reached target user-config.target. Feb 13 02:26:55.742264 env[1456]: time="2024-02-13T02:26:55.742250436Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 02:26:55.742304 env[1456]: time="2024-02-13T02:26:55.742268629Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 02:26:55.742304 env[1456]: time="2024-02-13T02:26:55.742281928Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 02:26:55.742358 env[1456]: time="2024-02-13T02:26:55.742305781Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742358 env[1456]: time="2024-02-13T02:26:55.742318842Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742358 env[1456]: time="2024-02-13T02:26:55.742332696Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742358 env[1456]: time="2024-02-13T02:26:55.742344376Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742467 env[1456]: time="2024-02-13T02:26:55.742357184Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742467 env[1456]: time="2024-02-13T02:26:55.742369118Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742467 env[1456]: time="2024-02-13T02:26:55.742386725Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742467 env[1456]: time="2024-02-13T02:26:55.742399336Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742467 env[1456]: time="2024-02-13T02:26:55.742411709Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 02:26:55.742594 env[1456]: time="2024-02-13T02:26:55.742472132Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 02:26:55.742594 env[1456]: time="2024-02-13T02:26:55.742535526Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 02:26:55.742708 env[1456]: time="2024-02-13T02:26:55.742697257Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 02:26:55.742740 env[1456]: time="2024-02-13T02:26:55.742716500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742740 env[1456]: time="2024-02-13T02:26:55.742729531Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 02:26:55.742792 env[1456]: time="2024-02-13T02:26:55.742767456Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742792 env[1456]: time="2024-02-13T02:26:55.742780276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742849 env[1456]: time="2024-02-13T02:26:55.742792926Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742849 env[1456]: time="2024-02-13T02:26:55.742804058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742849 env[1456]: time="2024-02-13T02:26:55.742816091Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742849 env[1456]: time="2024-02-13T02:26:55.742827797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742849 env[1456]: time="2024-02-13T02:26:55.742839047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742971 env[1456]: time="2024-02-13T02:26:55.742850189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.742971 env[1456]: time="2024-02-13T02:26:55.742862616Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 02:26:55.742971 env[1456]: time="2024-02-13T02:26:55.742955855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.743054 env[1456]: time="2024-02-13T02:26:55.742969515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.743054 env[1456]: time="2024-02-13T02:26:55.742980441Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.743054 env[1456]: time="2024-02-13T02:26:55.742992191Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 02:26:55.743054 env[1456]: time="2024-02-13T02:26:55.743004904Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 02:26:55.743054 env[1456]: time="2024-02-13T02:26:55.743015029Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 02:26:55.743054 env[1456]: time="2024-02-13T02:26:55.743031171Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 02:26:55.743202 env[1456]: time="2024-02-13T02:26:55.743057438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 02:26:55.743259 env[1456]: time="2024-02-13T02:26:55.743224442Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743270178Z" level=info msg="Connect containerd service" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743293417Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743558607Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743602175Z" level=info msg="Start subscribing containerd event" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743630008Z" level=info msg="Start recovering state" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743664567Z" level=info msg="Start event monitor" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743673146Z" level=info msg="Start snapshots syncer" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743678368Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743700097Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743722615Z" level=info msg="containerd successfully booted in 0.033345s" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743678552Z" level=info msg="Start cni network conf syncer for default" Feb 13 02:26:55.745289 env[1456]: time="2024-02-13T02:26:55.743736481Z" level=info msg="Start streaming server" Feb 13 02:26:55.751092 systemd[1]: Started containerd.service. Feb 13 02:26:55.757895 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 02:26:55.786987 locksmithd[1490]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 02:26:56.013627 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 13 02:26:56.039720 extend-filesystems[1440]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 13 02:26:56.039720 extend-filesystems[1440]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 02:26:56.039720 extend-filesystems[1440]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 13 02:26:56.076677 extend-filesystems[1425]: Resized filesystem in /dev/sda9 Feb 13 02:26:56.076677 extend-filesystems[1425]: Found sdb Feb 13 02:26:56.040221 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 02:26:56.040302 systemd[1]: Finished extend-filesystems.service. Feb 13 02:26:56.858669 sshd_keygen[1449]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 02:26:56.870427 systemd[1]: Finished sshd-keygen.service. Feb 13 02:26:56.878557 systemd[1]: Starting issuegen.service... Feb 13 02:26:56.886901 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 02:26:56.886972 systemd[1]: Finished issuegen.service. Feb 13 02:26:56.895461 systemd[1]: Starting systemd-user-sessions.service... Feb 13 02:26:56.904936 systemd[1]: Finished systemd-user-sessions.service. Feb 13 02:26:56.913363 systemd[1]: Started getty@tty1.service. Feb 13 02:26:56.921251 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 02:26:56.929761 systemd[1]: Reached target getty.target. Feb 13 02:26:57.188708 systemd-networkd[1303]: bond0: Gained IPv6LL Feb 13 02:26:57.189023 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:57.380942 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:57.381002 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:26:57.381747 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 02:26:57.392006 systemd[1]: Reached target network-online.target. Feb 13 02:26:57.845825 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 02:27:01.605688 coreos-metadata[1419]: Feb 13 02:27:01.605 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 02:27:01.606431 coreos-metadata[1416]: Feb 13 02:27:01.605 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 02:27:01.962441 login[1514]: pam_lastlog(login:session): file /var/log/lastlog is locked/read Feb 13 02:27:01.963808 login[1515]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 02:27:01.971083 systemd[1]: Created slice user-500.slice. Feb 13 02:27:01.971604 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 02:27:01.972583 systemd-logind[1450]: New session 2 of user core. Feb 13 02:27:01.976621 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 02:27:01.977269 systemd[1]: Starting user@500.service... Feb 13 02:27:01.979135 (systemd)[1519]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:02.059675 systemd[1519]: Queued start job for default target default.target. Feb 13 02:27:02.059920 systemd[1519]: Reached target paths.target. Feb 13 02:27:02.059932 systemd[1519]: Reached target sockets.target. Feb 13 02:27:02.059940 systemd[1519]: Reached target timers.target. Feb 13 02:27:02.059947 systemd[1519]: Reached target basic.target. Feb 13 02:27:02.059967 systemd[1519]: Reached target default.target. Feb 13 02:27:02.059981 systemd[1519]: Startup finished in 77ms. Feb 13 02:27:02.060029 systemd[1]: Started user@500.service. Feb 13 02:27:02.060561 systemd[1]: Started session-2.scope. Feb 13 02:27:02.605885 coreos-metadata[1416]: Feb 13 02:27:02.605 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 02:27:02.606140 coreos-metadata[1419]: Feb 13 02:27:02.605 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 02:27:02.963580 login[1514]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 02:27:02.974505 systemd-logind[1450]: New session 1 of user core. Feb 13 02:27:02.976832 systemd[1]: Started session-1.scope. Feb 13 02:27:03.363596 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 02:27:03.363819 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 02:27:03.678256 coreos-metadata[1416]: Feb 13 02:27:03.678 INFO Fetch successful Feb 13 02:27:03.679089 coreos-metadata[1419]: Feb 13 02:27:03.678 INFO Fetch successful Feb 13 02:27:03.703974 systemd[1]: Finished coreos-metadata.service. Feb 13 02:27:03.704988 systemd[1]: Starting etcd-member.service... Feb 13 02:27:03.704991 unknown[1416]: wrote ssh authorized keys file for user: core Feb 13 02:27:03.705686 systemd[1]: Started packet-phone-home.service. Feb 13 02:27:03.711344 curl[1542]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 02:27:03.711344 curl[1542]: Dload Upload Total Spent Left Speed Feb 13 02:27:03.715705 update-ssh-keys[1543]: Updated "/home/core/.ssh/authorized_keys" Feb 13 02:27:03.715939 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 02:27:03.722671 systemd[1]: Starting docker.service... Feb 13 02:27:03.740997 env[1557]: time="2024-02-13T02:27:03.740969171Z" level=info msg="Starting up" Feb 13 02:27:03.741553 env[1557]: time="2024-02-13T02:27:03.741540149Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 02:27:03.741553 env[1557]: time="2024-02-13T02:27:03.741550533Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 02:27:03.741627 env[1557]: time="2024-02-13T02:27:03.741567375Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 02:27:03.741627 env[1557]: time="2024-02-13T02:27:03.741578104Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 02:27:03.742420 env[1557]: time="2024-02-13T02:27:03.742407687Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 02:27:03.742467 env[1557]: time="2024-02-13T02:27:03.742418944Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 02:27:03.742467 env[1557]: time="2024-02-13T02:27:03.742429622Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 02:27:03.742467 env[1557]: time="2024-02-13T02:27:03.742462859Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 02:27:03.757115 env[1557]: time="2024-02-13T02:27:03.757101684Z" level=info msg="Loading containers: start." Feb 13 02:27:03.884698 curl[1542]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 02:27:03.887080 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 02:27:03.984642 kernel: Initializing XFRM netlink socket Feb 13 02:27:04.029907 env[1557]: time="2024-02-13T02:27:04.029889083Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 02:27:04.030543 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:27:04.030600 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:27:04.033498 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:27:04.033584 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:27:04.074227 systemd-networkd[1303]: docker0: Link UP Feb 13 02:27:04.074405 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Feb 13 02:27:04.079499 env[1557]: time="2024-02-13T02:27:04.079456160Z" level=info msg="Loading containers: done." Feb 13 02:27:04.087297 env[1557]: time="2024-02-13T02:27:04.087233271Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 02:27:04.087284 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3482176848-merged.mount: Deactivated successfully. Feb 13 02:27:04.087629 env[1557]: time="2024-02-13T02:27:04.087422521Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 02:27:04.087629 env[1557]: time="2024-02-13T02:27:04.087535600Z" level=info msg="Daemon has completed initialization" Feb 13 02:27:04.098515 systemd[1]: Started docker.service. Feb 13 02:27:04.106453 env[1557]: time="2024-02-13T02:27:04.106361751Z" level=info msg="API listen on /run/docker.sock" Feb 13 02:27:04.107786 etcd-wrapper[1547]: Error response from daemon: No such container: etcd-member Feb 13 02:27:04.150314 etcd-wrapper[1681]: Error: No such container: etcd-member Feb 13 02:27:04.243606 etcd-wrapper[1704]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 02:27:05.201176 systemd[1]: Created slice system-sshd.slice. Feb 13 02:27:05.201773 systemd[1]: Started sshd@0-147.75.90.7:22-139.178.68.195:53222.service. Feb 13 02:27:05.247271 sshd[1723]: Accepted publickey for core from 139.178.68.195 port 53222 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:05.248793 sshd[1723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:05.254488 systemd-logind[1450]: New session 3 of user core. Feb 13 02:27:05.255747 systemd[1]: Started session-3.scope. Feb 13 02:27:05.319601 systemd[1]: Started sshd@1-147.75.90.7:22-139.178.68.195:53234.service. Feb 13 02:27:05.352202 sshd[1728]: Accepted publickey for core from 139.178.68.195 port 53234 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:05.352861 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:05.354982 systemd-logind[1450]: New session 4 of user core. Feb 13 02:27:05.355441 systemd[1]: Started session-4.scope. Feb 13 02:27:05.407675 sshd[1728]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:05.409179 systemd[1]: sshd@1-147.75.90.7:22-139.178.68.195:53234.service: Deactivated successfully. Feb 13 02:27:05.409496 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 02:27:05.409883 systemd-logind[1450]: Session 4 logged out. Waiting for processes to exit. Feb 13 02:27:05.410418 systemd[1]: Started sshd@2-147.75.90.7:22-139.178.68.195:53236.service. Feb 13 02:27:05.410890 systemd-logind[1450]: Removed session 4. Feb 13 02:27:05.444060 sshd[1734]: Accepted publickey for core from 139.178.68.195 port 53236 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:05.447323 sshd[1734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:05.457502 systemd-logind[1450]: New session 5 of user core. Feb 13 02:27:05.459886 systemd[1]: Started session-5.scope. Feb 13 02:27:05.539303 sshd[1734]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:05.545011 systemd[1]: sshd@2-147.75.90.7:22-139.178.68.195:53236.service: Deactivated successfully. Feb 13 02:27:05.546760 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 02:27:05.548476 systemd-logind[1450]: Session 5 logged out. Waiting for processes to exit. Feb 13 02:27:05.550675 systemd-logind[1450]: Removed session 5. Feb 13 02:27:05.600702 etcd-wrapper[1704]: v3.5.0: Pulling from coreos/etcd Feb 13 02:27:05.894988 etcd-wrapper[1704]: 1813d21adc01: Pulling fs layer Feb 13 02:27:05.894988 etcd-wrapper[1704]: 6e96907ab677: Pulling fs layer Feb 13 02:27:05.894988 etcd-wrapper[1704]: 444ed0ea8673: Pulling fs layer Feb 13 02:27:05.894988 etcd-wrapper[1704]: 0fd2df5633f0: Pulling fs layer Feb 13 02:27:05.894988 etcd-wrapper[1704]: 8cc22b9456bb: Pulling fs layer Feb 13 02:27:05.894988 etcd-wrapper[1704]: 7ac70aecd290: Pulling fs layer Feb 13 02:27:05.895722 etcd-wrapper[1704]: 4b376c64dfe4: Pulling fs layer Feb 13 02:27:05.895722 etcd-wrapper[1704]: 0fd2df5633f0: Waiting Feb 13 02:27:05.895722 etcd-wrapper[1704]: 4b376c64dfe4: Waiting Feb 13 02:27:05.895722 etcd-wrapper[1704]: 7ac70aecd290: Waiting Feb 13 02:27:06.312820 etcd-wrapper[1704]: 444ed0ea8673: Verifying Checksum Feb 13 02:27:06.312820 etcd-wrapper[1704]: 444ed0ea8673: Download complete Feb 13 02:27:06.318040 etcd-wrapper[1704]: 6e96907ab677: Download complete Feb 13 02:27:06.601811 etcd-wrapper[1704]: 1813d21adc01: Verifying Checksum Feb 13 02:27:06.601811 etcd-wrapper[1704]: 1813d21adc01: Download complete Feb 13 02:27:06.620384 etcd-wrapper[1704]: 8cc22b9456bb: Verifying Checksum Feb 13 02:27:06.620384 etcd-wrapper[1704]: 8cc22b9456bb: Download complete Feb 13 02:27:06.650138 etcd-wrapper[1704]: 0fd2df5633f0: Download complete Feb 13 02:27:06.909523 etcd-wrapper[1704]: 7ac70aecd290: Verifying Checksum Feb 13 02:27:06.909523 etcd-wrapper[1704]: 7ac70aecd290: Download complete Feb 13 02:27:06.927100 etcd-wrapper[1704]: 4b376c64dfe4: Verifying Checksum Feb 13 02:27:06.927100 etcd-wrapper[1704]: 4b376c64dfe4: Download complete Feb 13 02:27:07.078899 etcd-wrapper[1704]: 1813d21adc01: Pull complete Feb 13 02:27:07.268838 systemd[1]: var-lib-docker-overlay2-246f1aa863519f55b3cb66fdc021cd7ce093250f946e7330091e01d907545c5a-merged.mount: Deactivated successfully. Feb 13 02:27:07.526369 etcd-wrapper[1704]: 6e96907ab677: Pull complete Feb 13 02:27:07.725799 systemd[1]: var-lib-docker-overlay2-0840970a6e33c7c0006c456ca4306d9ba57ccaf3d2ff0290d99a2f6130bc5438-merged.mount: Deactivated successfully. Feb 13 02:27:07.769206 etcd-wrapper[1704]: 444ed0ea8673: Pull complete Feb 13 02:27:08.043242 etcd-wrapper[1704]: 0fd2df5633f0: Pull complete Feb 13 02:27:08.079593 etcd-wrapper[1704]: 8cc22b9456bb: Pull complete Feb 13 02:27:08.081574 systemd[1]: var-lib-docker-overlay2-5ea87516c89fa561767d86e5d561bd363334fff9506fc07a54d76002ee8d7000-merged.mount: Deactivated successfully. Feb 13 02:27:08.115923 systemd[1]: var-lib-docker-overlay2-79556ca219559aeab760b0c40bda5e6ae9ab6b167c4c3dd24689f36e786e989b-merged.mount: Deactivated successfully. Feb 13 02:27:08.140797 etcd-wrapper[1704]: 7ac70aecd290: Pull complete Feb 13 02:27:08.193678 systemd[1]: var-lib-docker-overlay2-7646d967130c23a0864a85a5c9948cc678e07343f7dc7dacbd53e83b1624e450-merged.mount: Deactivated successfully. Feb 13 02:27:08.196568 etcd-wrapper[1704]: 4b376c64dfe4: Pull complete Feb 13 02:27:08.199965 etcd-wrapper[1704]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 02:27:08.201020 etcd-wrapper[1704]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 02:27:08.270758 env[1456]: time="2024-02-13T02:27:08.270655670Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:27:08.270758 env[1456]: time="2024-02-13T02:27:08.270699673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:27:08.270758 env[1456]: time="2024-02-13T02:27:08.270716258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:27:08.271255 env[1456]: time="2024-02-13T02:27:08.270865718Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/2e48c026df7ac6e856bf0a3f98352c5a104db6a2d5eb3b3b9de782a37559507b pid=1902 runtime=io.containerd.runc.v2 Feb 13 02:27:08.282821 systemd[1]: Started docker-2e48c026df7ac6e856bf0a3f98352c5a104db6a2d5eb3b3b9de782a37559507b.scope. Feb 13 02:27:08.333554 etcd-wrapper[1704]: {"level":"info","ts":1707791228.3334327,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 02:27:08.333554 etcd-wrapper[1704]: {"level":"info","ts":1707791228.3334816,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"2ca314eee7af4117a2561248bd4c4e30"} Feb 13 02:27:08.333554 etcd-wrapper[1704]: {"level":"warn","ts":1707791228.3335187,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 02:27:08.333554 etcd-wrapper[1704]: {"level":"warn","ts":1707791228.3335297,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 02:27:08.333554 etcd-wrapper[1704]: {"level":"warn","ts":1707791228.3335366,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 02:27:08.333737 etcd-wrapper[1704]: {"level":"warn","ts":1707791228.3335423,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 02:27:08.333737 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.333Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.17:2379"]} Feb 13 02:27:08.333737 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.333Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 02:27:08.334040 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.333Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 02:27:08.334126 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.334Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"2ca314eee7af4117a2561248bd4c4e30","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.17:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"2ca314eee7af4117a2561248bd4c4e30=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 02:27:08.334911 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.334Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"653.512µs"} Feb 13 02:27:08.336064 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.335Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 02:27:08.336064 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.335Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 02:27:08.336064 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.335Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 02:27:08.336064 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.335Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 02:27:08.336064 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.335Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 02:27:08.336185 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.336Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 02:27:08.336657 etcd-wrapper[1704]: {"level":"warn","ts":"2024-02-13T02:27:08.336Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 02:27:08.337021 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.336Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 02:27:08.337204 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.337Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 02:27:08.337439 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.337Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 02:27:08.337698 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.337Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 02:27:08.337918 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.337Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 02:27:08.338037 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.337Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 02:27:08.338923 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.338Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.17:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 02:27:08.338960 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.338Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 02:27:08.338960 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.338Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.836Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.836Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 02:27:08.837419 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.837Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:2ca314eee7af4117a2561248bd4c4e30 ClientURLs:[http://10.67.80.17:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.838Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.838Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.838Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.838Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 02:27:08.839321 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.838Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 02:27:08.838848 systemd[1]: Started etcd-member.service. Feb 13 02:27:08.840933 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:27:08.839Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 02:27:08.839705 systemd[1]: Reached target multi-user.target. Feb 13 02:27:08.843119 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 02:27:08.850767 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 02:27:08.850860 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 02:27:08.851002 systemd[1]: Startup finished in 1.845s (kernel) + 16.510s (initrd) + 19.510s (userspace) = 37.866s. Feb 13 02:27:15.548280 systemd[1]: Started sshd@3-147.75.90.7:22-139.178.68.195:59576.service. Feb 13 02:27:15.581487 sshd[1950]: Accepted publickey for core from 139.178.68.195 port 59576 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:15.582448 sshd[1950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:15.585964 systemd-logind[1450]: New session 6 of user core. Feb 13 02:27:15.586655 systemd[1]: Started session-6.scope. Feb 13 02:27:15.643040 sshd[1950]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:15.644489 systemd[1]: sshd@3-147.75.90.7:22-139.178.68.195:59576.service: Deactivated successfully. Feb 13 02:27:15.644786 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 02:27:15.645138 systemd-logind[1450]: Session 6 logged out. Waiting for processes to exit. Feb 13 02:27:15.645607 systemd[1]: Started sshd@4-147.75.90.7:22-139.178.68.195:59588.service. Feb 13 02:27:15.646021 systemd-logind[1450]: Removed session 6. Feb 13 02:27:15.678818 sshd[1956]: Accepted publickey for core from 139.178.68.195 port 59588 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:15.679975 sshd[1956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:15.683643 systemd-logind[1450]: New session 7 of user core. Feb 13 02:27:15.684561 systemd[1]: Started session-7.scope. Feb 13 02:27:15.741420 sshd[1956]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:15.748023 systemd[1]: sshd@4-147.75.90.7:22-139.178.68.195:59588.service: Deactivated successfully. Feb 13 02:27:15.749558 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 02:27:15.751245 systemd-logind[1450]: Session 7 logged out. Waiting for processes to exit. Feb 13 02:27:15.753783 systemd[1]: Started sshd@5-147.75.90.7:22-139.178.68.195:59602.service. Feb 13 02:27:15.756138 systemd-logind[1450]: Removed session 7. Feb 13 02:27:15.811110 sshd[1962]: Accepted publickey for core from 139.178.68.195 port 59602 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:15.811690 sshd[1962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:15.813922 systemd-logind[1450]: New session 8 of user core. Feb 13 02:27:15.814283 systemd[1]: Started session-8.scope. Feb 13 02:27:15.872223 sshd[1962]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:15.878488 systemd[1]: sshd@5-147.75.90.7:22-139.178.68.195:59602.service: Deactivated successfully. Feb 13 02:27:15.879717 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 02:27:15.881123 systemd-logind[1450]: Session 8 logged out. Waiting for processes to exit. Feb 13 02:27:15.883636 systemd[1]: Started sshd@6-147.75.90.7:22-139.178.68.195:42942.service. Feb 13 02:27:15.886084 systemd-logind[1450]: Removed session 8. Feb 13 02:27:15.941659 sshd[1968]: Accepted publickey for core from 139.178.68.195 port 42942 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:15.942350 sshd[1968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:15.944597 systemd-logind[1450]: New session 9 of user core. Feb 13 02:27:15.945041 systemd[1]: Started session-9.scope. Feb 13 02:27:16.018089 sudo[1972]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 02:27:16.018706 sudo[1972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:27:16.041046 dbus-daemon[1422]: \xd0\xfd\u0006\u0015\xa0U: received setenforce notice (enforcing=1104876720) Feb 13 02:27:16.045818 sudo[1972]: pam_unix(sudo:session): session closed for user root Feb 13 02:27:16.050881 sshd[1968]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:16.057756 systemd[1]: sshd@6-147.75.90.7:22-139.178.68.195:42942.service: Deactivated successfully. Feb 13 02:27:16.059409 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 02:27:16.061172 systemd-logind[1450]: Session 9 logged out. Waiting for processes to exit. Feb 13 02:27:16.063858 systemd[1]: Started sshd@7-147.75.90.7:22-139.178.68.195:42944.service. Feb 13 02:27:16.066135 systemd-logind[1450]: Removed session 9. Feb 13 02:27:16.135919 sshd[1976]: Accepted publickey for core from 139.178.68.195 port 42944 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:16.139171 sshd[1976]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:16.149424 systemd-logind[1450]: New session 10 of user core. Feb 13 02:27:16.151789 systemd[1]: Started session-10.scope. Feb 13 02:27:16.226844 sudo[1980]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 02:27:16.226952 sudo[1980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:27:16.228759 sudo[1980]: pam_unix(sudo:session): session closed for user root Feb 13 02:27:16.231035 sudo[1979]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 02:27:16.231137 sudo[1979]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:27:16.236291 systemd[1]: Stopping audit-rules.service... Feb 13 02:27:16.236000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 02:27:16.237236 auditctl[1983]: No rules Feb 13 02:27:16.237401 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 02:27:16.237494 systemd[1]: Stopped audit-rules.service. Feb 13 02:27:16.238297 systemd[1]: Starting audit-rules.service... Feb 13 02:27:16.242647 kernel: kauditd_printk_skb: 106 callbacks suppressed Feb 13 02:27:16.242688 kernel: audit: type=1305 audit(1707791236.236:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 02:27:16.248494 augenrules[2000]: No rules Feb 13 02:27:16.248805 systemd[1]: Finished audit-rules.service. Feb 13 02:27:16.249318 sudo[1979]: pam_unix(sudo:session): session closed for user root Feb 13 02:27:16.250138 sshd[1976]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:16.251772 systemd[1]: sshd@7-147.75.90.7:22-139.178.68.195:42944.service: Deactivated successfully. Feb 13 02:27:16.252121 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 02:27:16.252494 systemd-logind[1450]: Session 10 logged out. Waiting for processes to exit. Feb 13 02:27:16.253098 systemd[1]: Started sshd@8-147.75.90.7:22-139.178.68.195:42954.service. Feb 13 02:27:16.253516 systemd-logind[1450]: Removed session 10. Feb 13 02:27:16.236000 audit[1983]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffb4447b0 a2=420 a3=0 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:27:16.289181 kernel: audit: type=1300 audit(1707791236.236:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffb4447b0 a2=420 a3=0 items=0 ppid=1 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:27:16.289256 kernel: audit: type=1327 audit(1707791236.236:160): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 02:27:16.236000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 02:27:16.298733 kernel: audit: type=1131 audit(1707791236.236:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.321219 kernel: audit: type=1130 audit(1707791236.248:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.325861 sshd[2006]: Accepted publickey for core from 139.178.68.195 port 42954 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:16.329889 sshd[2006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:16.332033 systemd-logind[1450]: New session 11 of user core. Feb 13 02:27:16.332683 systemd[1]: Started session-11.scope. Feb 13 02:27:16.343672 kernel: audit: type=1106 audit(1707791236.248:163): pid=1979 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.248000 audit[1979]: USER_END pid=1979 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.369733 kernel: audit: type=1104 audit(1707791236.248:164): pid=1979 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.248000 audit[1979]: CRED_DISP pid=1979 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.379364 sshd[2006]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:16.380570 systemd[1]: sshd@8-147.75.90.7:22-139.178.68.195:42954.service: Deactivated successfully. Feb 13 02:27:16.380943 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 02:27:16.381270 systemd-logind[1450]: Session 11 logged out. Waiting for processes to exit. Feb 13 02:27:16.381640 systemd-logind[1450]: Removed session 11. Feb 13 02:27:16.393357 kernel: audit: type=1106 audit(1707791236.250:165): pid=1976 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.250000 audit[1976]: USER_END pid=1976 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.425672 kernel: audit: type=1104 audit(1707791236.250:166): pid=1976 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.250000 audit[1976]: CRED_DISP pid=1976 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.427728 systemd[1]: Started sshd@9-147.75.90.7:22-139.178.68.195:42962.service. Feb 13 02:27:16.451755 kernel: audit: type=1131 audit(1707791236.251:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.90.7:22-139.178.68.195:42944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.90.7:22-139.178.68.195:42944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.90.7:22-139.178.68.195:42954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.325000 audit[2006]: USER_ACCT pid=2006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.329000 audit[2006]: CRED_ACQ pid=2006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.329000 audit[2006]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff591adc40 a2=3 a3=0 items=0 ppid=1 pid=2006 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:27:16.329000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 02:27:16.334000 audit[2006]: USER_START pid=2006 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.334000 audit[2008]: CRED_ACQ pid=2008 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.379000 audit[2006]: USER_END pid=2006 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.379000 audit[2006]: CRED_DISP pid=2006 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.90.7:22-139.178.68.195:42954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.7:22-139.178.68.195:42962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.504655 sshd[2014]: Accepted publickey for core from 139.178.68.195 port 42962 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:27:16.504000 audit[2014]: USER_ACCT pid=2014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.504000 audit[2014]: CRED_ACQ pid=2014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.504000 audit[2014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8f9d6750 a2=3 a3=0 items=0 ppid=1 pid=2014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:27:16.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 02:27:16.505361 sshd[2014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:27:16.507506 systemd-logind[1450]: New session 12 of user core. Feb 13 02:27:16.508172 systemd[1]: Started session-12.scope. Feb 13 02:27:16.509000 audit[2014]: USER_START pid=2014 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.510000 audit[2016]: CRED_ACQ pid=2016 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.917438 sshd[2014]: pam_unix(sshd:session): session closed for user core Feb 13 02:27:16.918000 audit[2014]: USER_END pid=2014 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.919000 audit[2014]: CRED_DISP pid=2014 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:27:16.921826 systemd[1]: sshd@9-147.75.90.7:22-139.178.68.195:42962.service: Deactivated successfully. Feb 13 02:27:16.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.7:22-139.178.68.195:42962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:27:16.923227 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 02:27:16.924518 systemd-logind[1450]: Session 12 logged out. Waiting for processes to exit. Feb 13 02:27:16.926197 systemd-logind[1450]: Removed session 12. Feb 13 02:27:34.392101 systemd-timesyncd[1409]: Contacted time server [2606:82c0:22::e]:123 (2.flatcar.pool.ntp.org). Feb 13 02:27:34.392227 systemd-timesyncd[1409]: Initial clock synchronization to Tue 2024-02-13 02:27:34.565436 UTC. Feb 13 02:27:41.009809 update_engine[1452]: I0213 02:27:41.009681 1452 update_attempter.cc:509] Updating boot flags... Feb 13 02:29:00.597033 systemd[1]: Started sshd@10-147.75.90.7:22-14.63.196.175:34214.service. Feb 13 02:29:00.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-14.63.196.175:34214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:29:00.602722 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 13 02:29:00.602799 kernel: audit: type=1130 audit(1707791340.595:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-14.63.196.175:34214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:29:03.687068 sshd[2057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:29:03.685000 audit[2057]: USER_AUTH pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:29:03.763779 kernel: audit: type=1100 audit(1707791343.685:187): pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:29:05.705968 sshd[2057]: Failed password for root from 14.63.196.175 port 34214 ssh2 Feb 13 02:29:06.716165 sshd[2057]: Received disconnect from 14.63.196.175 port 34214:11: Bye Bye [preauth] Feb 13 02:29:06.716165 sshd[2057]: Disconnected from authenticating user root 14.63.196.175 port 34214 [preauth] Feb 13 02:29:06.718675 systemd[1]: sshd@10-147.75.90.7:22-14.63.196.175:34214.service: Deactivated successfully. Feb 13 02:29:06.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-14.63.196.175:34214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:29:06.798795 kernel: audit: type=1131 audit(1707791346.718:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.7:22-14.63.196.175:34214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:30:33.961416 systemd[1]: Started sshd@11-147.75.90.7:22-104.250.49.155:44336.service. Feb 13 02:30:33.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-104.250.49.155:44336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:30:34.044794 kernel: audit: type=1130 audit(1707791433.959:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-104.250.49.155:44336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:30:48.461552 sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.155 user=root Feb 13 02:30:48.461000 audit[2065]: USER_AUTH pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:30:48.547807 kernel: audit: type=1100 audit(1707791448.461:190): pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:30:50.561578 sshd[2065]: Failed password for root from 104.250.49.155 port 44336 ssh2 Feb 13 02:30:51.345938 sshd[2065]: Received disconnect from 104.250.49.155 port 44336:11: Bye Bye [preauth] Feb 13 02:30:51.345938 sshd[2065]: Disconnected from authenticating user root 104.250.49.155 port 44336 [preauth] Feb 13 02:30:51.348428 systemd[1]: sshd@11-147.75.90.7:22-104.250.49.155:44336.service: Deactivated successfully. Feb 13 02:30:51.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-104.250.49.155:44336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:30:51.437768 kernel: audit: type=1131 audit(1707791451.348:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.7:22-104.250.49.155:44336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:31:59.182038 systemd[1]: Started sshd@12-147.75.90.7:22-14.63.196.175:41190.service. Feb 13 02:31:59.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-14.63.196.175:41190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:31:59.272592 kernel: audit: type=1130 audit(1707791519.181:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-14.63.196.175:41190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:32:01.822394 sshd[2072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:32:01.822000 audit[2072]: USER_AUTH pid=2072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:32:01.913652 kernel: audit: type=1100 audit(1707791521.822:193): pid=2072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:32:02.943845 sshd[2072]: Failed password for root from 14.63.196.175 port 41190 ssh2 Feb 13 02:32:03.398563 sshd[2072]: Received disconnect from 14.63.196.175 port 41190:11: Bye Bye [preauth] Feb 13 02:32:03.398563 sshd[2072]: Disconnected from authenticating user root 14.63.196.175 port 41190 [preauth] Feb 13 02:32:03.401209 systemd[1]: sshd@12-147.75.90.7:22-14.63.196.175:41190.service: Deactivated successfully. Feb 13 02:32:03.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-14.63.196.175:41190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:32:03.493792 kernel: audit: type=1131 audit(1707791523.401:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.7:22-14.63.196.175:41190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:33:39.281934 systemd[1]: Started sshd@13-147.75.90.7:22-85.209.11.27:44228.service. Feb 13 02:33:39.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-85.209.11.27:44228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:33:39.373788 kernel: audit: type=1130 audit(1707791619.280:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-85.209.11.27:44228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:33:42.149473 sshd[2079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.27 user=sshd Feb 13 02:33:42.148000 audit[2079]: USER_AUTH pid=2079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sshd" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 13 02:33:42.241782 kernel: audit: type=1100 audit(1707791622.148:196): pid=2079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sshd" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 13 02:33:44.138804 sshd[2079]: Failed password for sshd from 85.209.11.27 port 44228 ssh2 Feb 13 02:33:45.664049 sshd[2079]: Connection closed by authenticating user sshd 85.209.11.27 port 44228 [preauth] Feb 13 02:33:45.666564 systemd[1]: sshd@13-147.75.90.7:22-85.209.11.27:44228.service: Deactivated successfully. Feb 13 02:33:45.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-85.209.11.27:44228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:33:45.758787 kernel: audit: type=1131 audit(1707791625.665:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.7:22-85.209.11.27:44228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:34:55.908733 systemd[1]: Started sshd@14-147.75.90.7:22-14.63.196.175:46062.service. Feb 13 02:34:55.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-14.63.196.175:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:34:56.000648 kernel: audit: type=1130 audit(1707791695.907:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-14.63.196.175:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:34:57.773410 sshd[2087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:34:57.772000 audit[2087]: USER_AUTH pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:34:57.865728 kernel: audit: type=1100 audit(1707791697.772:199): pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:34:59.727053 sshd[2087]: Failed password for root from 14.63.196.175 port 46062 ssh2 Feb 13 02:35:00.801917 sshd[2087]: Received disconnect from 14.63.196.175 port 46062:11: Bye Bye [preauth] Feb 13 02:35:00.801917 sshd[2087]: Disconnected from authenticating user root 14.63.196.175 port 46062 [preauth] Feb 13 02:35:00.804420 systemd[1]: sshd@14-147.75.90.7:22-14.63.196.175:46062.service: Deactivated successfully. Feb 13 02:35:00.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-14.63.196.175:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:35:00.896592 kernel: audit: type=1131 audit(1707791700.803:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.7:22-14.63.196.175:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:35:42.749588 systemd[1]: Started sshd@15-147.75.90.7:22-104.250.49.155:49324.service. Feb 13 02:35:42.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-104.250.49.155:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:35:42.842804 kernel: audit: type=1130 audit(1707791742.749:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-104.250.49.155:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:36:50.191072 systemd[1]: Started sshd@16-147.75.90.7:22-83.12.113.122:60378.service. Feb 13 02:36:50.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-83.12.113.122:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:36:50.284638 kernel: audit: type=1130 audit(1707791810.190:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-83.12.113.122:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:36:51.262682 sshd[2094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:36:51.262000 audit[2094]: USER_AUTH pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:36:51.353615 kernel: audit: type=1100 audit(1707791811.262:203): pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:36:53.532691 sshd[2094]: Failed password for root from 83.12.113.122 port 60378 ssh2 Feb 13 02:36:54.336963 sshd[2094]: Received disconnect from 83.12.113.122 port 60378:11: Bye Bye [preauth] Feb 13 02:36:54.336963 sshd[2094]: Disconnected from authenticating user root 83.12.113.122 port 60378 [preauth] Feb 13 02:36:54.339362 systemd[1]: sshd@16-147.75.90.7:22-83.12.113.122:60378.service: Deactivated successfully. Feb 13 02:36:54.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-83.12.113.122:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:36:54.432668 kernel: audit: type=1131 audit(1707791814.339:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.7:22-83.12.113.122:60378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:42.754751 sshd[2092]: Timeout before authentication for 104.250.49.155 port 49324 Feb 13 02:37:42.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-104.250.49.155:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:42.756228 systemd[1]: sshd@15-147.75.90.7:22-104.250.49.155:49324.service: Deactivated successfully. Feb 13 02:37:42.848673 kernel: audit: type=1131 audit(1707791862.755:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.7:22-104.250.49.155:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:44.645066 systemd[1]: Started sshd@17-147.75.90.7:22-170.106.178.136:54962.service. Feb 13 02:37:44.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-170.106.178.136:54962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:44.738663 kernel: audit: type=1130 audit(1707791864.643:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-170.106.178.136:54962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:44.801186 sshd[2104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:37:44.799000 audit[2104]: USER_AUTH pid=2104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:37:44.892779 kernel: audit: type=1100 audit(1707791864.799:207): pid=2104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:37:47.347105 sshd[2104]: Failed password for root from 170.106.178.136 port 54962 ssh2 Feb 13 02:37:47.695505 sshd[2104]: Received disconnect from 170.106.178.136 port 54962:11: Bye Bye [preauth] Feb 13 02:37:47.695505 sshd[2104]: Disconnected from authenticating user root 170.106.178.136 port 54962 [preauth] Feb 13 02:37:47.697938 systemd[1]: sshd@17-147.75.90.7:22-170.106.178.136:54962.service: Deactivated successfully. Feb 13 02:37:47.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-170.106.178.136:54962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:47.791802 kernel: audit: type=1131 audit(1707791867.696:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.7:22-170.106.178.136:54962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:54.566050 systemd[1]: Started sshd@18-147.75.90.7:22-14.63.196.175:53538.service. Feb 13 02:37:54.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-14.63.196.175:53538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:54.657660 kernel: audit: type=1130 audit(1707791874.564:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-14.63.196.175:53538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:56.590384 sshd[2108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:37:56.589000 audit[2108]: USER_AUTH pid=2108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:37:56.681632 kernel: audit: type=1100 audit(1707791876.589:210): pid=2108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:37:59.116551 sshd[2108]: Failed password for root from 14.63.196.175 port 53538 ssh2 Feb 13 02:37:59.619286 sshd[2108]: Received disconnect from 14.63.196.175 port 53538:11: Bye Bye [preauth] Feb 13 02:37:59.619286 sshd[2108]: Disconnected from authenticating user root 14.63.196.175 port 53538 [preauth] Feb 13 02:37:59.621801 systemd[1]: sshd@18-147.75.90.7:22-14.63.196.175:53538.service: Deactivated successfully. Feb 13 02:37:59.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-14.63.196.175:53538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:37:59.715812 kernel: audit: type=1131 audit(1707791879.620:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.7:22-14.63.196.175:53538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:38:01.053184 update_engine[1452]: I0213 02:38:01.053073 1452 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 02:38:01.053184 update_engine[1452]: I0213 02:38:01.053153 1452 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 02:38:01.054705 update_engine[1452]: I0213 02:38:01.054625 1452 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 02:38:01.055629 update_engine[1452]: I0213 02:38:01.055539 1452 omaha_request_params.cc:62] Current group set to lts Feb 13 02:38:01.055926 update_engine[1452]: I0213 02:38:01.055850 1452 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 02:38:01.055926 update_engine[1452]: I0213 02:38:01.055871 1452 update_attempter.cc:643] Scheduling an action processor start. Feb 13 02:38:01.055926 update_engine[1452]: I0213 02:38:01.055903 1452 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 02:38:01.056309 update_engine[1452]: I0213 02:38:01.055970 1452 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 02:38:01.056309 update_engine[1452]: I0213 02:38:01.056118 1452 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 02:38:01.056309 update_engine[1452]: I0213 02:38:01.056134 1452 omaha_request_action.cc:271] Request: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: Feb 13 02:38:01.056309 update_engine[1452]: I0213 02:38:01.056144 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:38:01.057387 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 02:38:01.059313 update_engine[1452]: I0213 02:38:01.059226 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:38:01.059633 update_engine[1452]: E0213 02:38:01.059458 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:38:01.059757 update_engine[1452]: I0213 02:38:01.059634 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 02:38:10.402763 systemd[1]: Started sshd@19-147.75.90.7:22-104.250.49.155:37959.service. Feb 13 02:38:10.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-104.250.49.155:37959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:38:10.495593 kernel: audit: type=1130 audit(1707791890.401:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-104.250.49.155:37959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:38:10.995082 update_engine[1452]: I0213 02:38:10.994962 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:38:10.995844 update_engine[1452]: I0213 02:38:10.995440 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:38:10.995844 update_engine[1452]: E0213 02:38:10.995674 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:38:10.996090 update_engine[1452]: I0213 02:38:10.995852 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 02:38:12.117956 sshd[2113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.155 user=root Feb 13 02:38:12.116000 audit[2113]: USER_AUTH pid=2113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:38:12.210639 kernel: audit: type=1100 audit(1707791892.116:213): pid=2113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:38:14.170392 sshd[2113]: Failed password for root from 104.250.49.155 port 37959 ssh2 Feb 13 02:38:15.160157 sshd[2113]: Received disconnect from 104.250.49.155 port 37959:11: Bye Bye [preauth] Feb 13 02:38:15.160157 sshd[2113]: Disconnected from authenticating user root 104.250.49.155 port 37959 [preauth] Feb 13 02:38:15.162729 systemd[1]: sshd@19-147.75.90.7:22-104.250.49.155:37959.service: Deactivated successfully. Feb 13 02:38:15.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-104.250.49.155:37959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:38:15.256798 kernel: audit: type=1131 audit(1707791895.161:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.7:22-104.250.49.155:37959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:38:20.995092 update_engine[1452]: I0213 02:38:20.994983 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:38:20.995911 update_engine[1452]: I0213 02:38:20.995455 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:38:20.995911 update_engine[1452]: E0213 02:38:20.995685 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:38:20.995911 update_engine[1452]: I0213 02:38:20.995859 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 02:38:30.995432 update_engine[1452]: I0213 02:38:30.995309 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:38:30.996236 update_engine[1452]: I0213 02:38:30.995820 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:38:30.996236 update_engine[1452]: E0213 02:38:30.996031 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:38:30.996236 update_engine[1452]: I0213 02:38:30.996183 1452 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 02:38:30.996236 update_engine[1452]: I0213 02:38:30.996199 1452 omaha_request_action.cc:621] Omaha request response: Feb 13 02:38:30.996652 update_engine[1452]: E0213 02:38:30.996343 1452 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996371 1452 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996380 1452 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996389 1452 update_attempter.cc:306] Processing Done. Feb 13 02:38:30.996652 update_engine[1452]: E0213 02:38:30.996413 1452 update_attempter.cc:619] Update failed. Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996423 1452 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996433 1452 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996443 1452 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 02:38:30.996652 update_engine[1452]: I0213 02:38:30.996611 1452 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.996665 1452 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.996677 1452 omaha_request_action.cc:271] Request: Feb 13 02:38:30.997557 update_engine[1452]: Feb 13 02:38:30.997557 update_engine[1452]: Feb 13 02:38:30.997557 update_engine[1452]: Feb 13 02:38:30.997557 update_engine[1452]: Feb 13 02:38:30.997557 update_engine[1452]: Feb 13 02:38:30.997557 update_engine[1452]: Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.996687 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997009 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:38:30.997557 update_engine[1452]: E0213 02:38:30.997179 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997311 1452 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997325 1452 omaha_request_action.cc:621] Omaha request response: Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997336 1452 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997344 1452 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997352 1452 update_attempter.cc:306] Processing Done. Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997360 1452 update_attempter.cc:310] Error event sent. Feb 13 02:38:30.997557 update_engine[1452]: I0213 02:38:30.997388 1452 update_check_scheduler.cc:74] Next update check in 41m0s Feb 13 02:38:30.999136 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 02:38:30.999136 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 02:38:34.490533 systemd[1]: Started sshd@20-147.75.90.7:22-119.45.243.35:53272.service. Feb 13 02:38:34.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-119.45.243.35:53272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:38:34.582653 kernel: audit: type=1130 audit(1707791914.489:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-119.45.243.35:53272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:39.887325 systemd[1]: Started sshd@21-147.75.90.7:22-46.102.130.37:57904.service. Feb 13 02:39:39.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-46.102.130.37:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:39.980792 kernel: audit: type=1130 audit(1707791979.885:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-46.102.130.37:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:41.200117 sshd[2119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:39:41.198000 audit[2119]: USER_AUTH pid=2119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:39:41.293779 kernel: audit: type=1100 audit(1707791981.198:217): pid=2119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:39:42.807797 sshd[2119]: Failed password for root from 46.102.130.37 port 57904 ssh2 Feb 13 02:39:44.317469 sshd[2119]: Received disconnect from 46.102.130.37 port 57904:11: Bye Bye [preauth] Feb 13 02:39:44.317469 sshd[2119]: Disconnected from authenticating user root 46.102.130.37 port 57904 [preauth] Feb 13 02:39:44.319962 systemd[1]: sshd@21-147.75.90.7:22-46.102.130.37:57904.service: Deactivated successfully. Feb 13 02:39:44.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-46.102.130.37:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:44.413793 kernel: audit: type=1131 audit(1707791984.318:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.7:22-46.102.130.37:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.495712 sshd[2117]: Timeout before authentication for 119.45.243.35 port 53272 Feb 13 02:40:34.497188 systemd[1]: sshd@20-147.75.90.7:22-119.45.243.35:53272.service: Deactivated successfully. Feb 13 02:40:34.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-119.45.243.35:53272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.590807 kernel: audit: type=1131 audit(1707792034.497:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.7:22-119.45.243.35:53272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:35.076185 systemd[1]: Started sshd@22-147.75.90.7:22-104.250.49.155:46278.service. Feb 13 02:40:35.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-104.250.49.155:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:35.168638 kernel: audit: type=1130 audit(1707792035.075:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-104.250.49.155:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:44.208050 systemd[1]: Started sshd@23-147.75.90.7:22-14.63.196.175:43236.service. Feb 13 02:40:44.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-14.63.196.175:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:44.300778 kernel: audit: type=1130 audit(1707792044.207:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-14.63.196.175:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:46.479419 sshd[2124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.155 user=root Feb 13 02:40:46.479000 audit[2124]: USER_AUTH pid=2124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:40:46.572776 kernel: audit: type=1100 audit(1707792046.479:222): pid=2124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:40:47.260356 sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:40:47.260000 audit[2127]: USER_AUTH pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:40:47.352653 kernel: audit: type=1100 audit(1707792047.260:223): pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:40:48.343222 sshd[2124]: Failed password for root from 104.250.49.155 port 46278 ssh2 Feb 13 02:40:48.928146 sshd[2127]: Failed password for root from 14.63.196.175 port 43236 ssh2 Feb 13 02:40:50.295342 sshd[2127]: Received disconnect from 14.63.196.175 port 43236:11: Bye Bye [preauth] Feb 13 02:40:50.295342 sshd[2127]: Disconnected from authenticating user root 14.63.196.175 port 43236 [preauth] Feb 13 02:40:50.297830 systemd[1]: sshd@23-147.75.90.7:22-14.63.196.175:43236.service: Deactivated successfully. Feb 13 02:40:50.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-14.63.196.175:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:50.391788 kernel: audit: type=1131 audit(1707792050.297:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.7:22-14.63.196.175:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:00.620422 systemd[1]: Started sshd@24-147.75.90.7:22-101.42.157.74:33798.service. Feb 13 02:41:00.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-101.42.157.74:33798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:00.713791 kernel: audit: type=1130 audit(1707792060.619:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-101.42.157.74:33798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:01.657435 sshd[2131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.157.74 user=root Feb 13 02:41:01.657000 audit[2131]: USER_AUTH pid=2131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.157.74 addr=101.42.157.74 terminal=ssh res=failed' Feb 13 02:41:01.750774 kernel: audit: type=1100 audit(1707792061.657:226): pid=2131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.157.74 addr=101.42.157.74 terminal=ssh res=failed' Feb 13 02:41:03.581032 sshd[2131]: Failed password for root from 101.42.157.74 port 33798 ssh2 Feb 13 02:41:04.725516 sshd[2131]: Received disconnect from 101.42.157.74 port 33798:11: Bye Bye [preauth] Feb 13 02:41:04.725516 sshd[2131]: Disconnected from authenticating user root 101.42.157.74 port 33798 [preauth] Feb 13 02:41:04.727982 systemd[1]: sshd@24-147.75.90.7:22-101.42.157.74:33798.service: Deactivated successfully. Feb 13 02:41:04.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-101.42.157.74:33798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:04.821790 kernel: audit: type=1131 audit(1707792064.727:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.7:22-101.42.157.74:33798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:58.439549 systemd[1]: Started sshd@25-147.75.90.7:22-177.32.66.110:59014.service. Feb 13 02:41:58.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-177.32.66.110:59014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:58.440366 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 02:41:58.532659 kernel: audit: type=1130 audit(1707792118.438:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-177.32.66.110:59014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:58.536810 systemd-tmpfiles[2136]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 02:41:58.537027 systemd-tmpfiles[2136]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 02:41:58.537750 systemd-tmpfiles[2136]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 02:41:58.548178 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 02:41:58.548269 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 02:41:58.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:58.549148 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 02:41:58.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:58.726192 kernel: audit: type=1130 audit(1707792118.546:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:58.726225 kernel: audit: type=1131 audit(1707792118.546:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:59.574117 sshd[2135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.66.110 user=root Feb 13 02:41:59.572000 audit[2135]: USER_AUTH pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:41:59.665772 kernel: audit: type=1100 audit(1707792119.572:231): pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:42:01.126807 sshd[2135]: Failed password for root from 177.32.66.110 port 59014 ssh2 Feb 13 02:42:02.664268 sshd[2135]: Received disconnect from 177.32.66.110 port 59014:11: Bye Bye [preauth] Feb 13 02:42:02.664268 sshd[2135]: Disconnected from authenticating user root 177.32.66.110 port 59014 [preauth] Feb 13 02:42:02.666738 systemd[1]: sshd@25-147.75.90.7:22-177.32.66.110:59014.service: Deactivated successfully. Feb 13 02:42:02.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-177.32.66.110:59014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:02.759592 kernel: audit: type=1131 audit(1707792122.665:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.7:22-177.32.66.110:59014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:32.995414 systemd[1]: Started sshd@26-147.75.90.7:22-23.96.17.95:36188.service. Feb 13 02:42:32.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-23.96.17.95:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:33.087667 kernel: audit: type=1130 audit(1707792152.993:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-23.96.17.95:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:33.624466 sshd[2148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:42:33.623000 audit[2148]: ANOM_LOGIN_FAILURES pid=2148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:33.624719 sshd[2148]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 02:42:33.623000 audit[2148]: USER_AUTH pid=2148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:42:33.779163 kernel: audit: type=2100 audit(1707792153.623:234): pid=2148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:33.779194 kernel: audit: type=1100 audit(1707792153.623:235): pid=2148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:42:35.480484 sshd[2124]: Timeout before authentication for 104.250.49.155 port 46278 Feb 13 02:42:35.481626 systemd[1]: sshd@22-147.75.90.7:22-104.250.49.155:46278.service: Deactivated successfully. Feb 13 02:42:35.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-104.250.49.155:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:35.575791 kernel: audit: type=1131 audit(1707792155.480:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.7:22-104.250.49.155:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:35.843833 sshd[2148]: Failed password for root from 23.96.17.95 port 36188 ssh2 Feb 13 02:42:36.581460 sshd[2148]: Received disconnect from 23.96.17.95 port 36188:11: Bye Bye [preauth] Feb 13 02:42:36.581460 sshd[2148]: Disconnected from authenticating user root 23.96.17.95 port 36188 [preauth] Feb 13 02:42:36.583986 systemd[1]: sshd@26-147.75.90.7:22-23.96.17.95:36188.service: Deactivated successfully. Feb 13 02:42:36.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-23.96.17.95:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:36.677786 kernel: audit: type=1131 audit(1707792156.582:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.7:22-23.96.17.95:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:39.810057 systemd[1]: Started sshd@27-147.75.90.7:22-83.12.113.122:57126.service. Feb 13 02:42:39.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.7:22-83.12.113.122:57126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:39.903679 kernel: audit: type=1130 audit(1707792159.809:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.7:22-83.12.113.122:57126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:40.886769 sshd[2154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:42:40.886000 audit[2154]: USER_AUTH pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:42:40.979697 kernel: audit: type=1100 audit(1707792160.886:239): pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:42:43.402320 sshd[2154]: Failed password for root from 83.12.113.122 port 57126 ssh2 Feb 13 02:42:43.969824 sshd[2154]: Received disconnect from 83.12.113.122 port 57126:11: Bye Bye [preauth] Feb 13 02:42:43.969824 sshd[2154]: Disconnected from authenticating user root 83.12.113.122 port 57126 [preauth] Feb 13 02:42:43.972484 systemd[1]: sshd@27-147.75.90.7:22-83.12.113.122:57126.service: Deactivated successfully. Feb 13 02:42:43.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.7:22-83.12.113.122:57126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:44.065786 kernel: audit: type=1131 audit(1707792163.972:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.7:22-83.12.113.122:57126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:00.196085 systemd[1]: Started sshd@28-147.75.90.7:22-170.106.178.136:45386.service. Feb 13 02:43:00.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-170.106.178.136:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:00.289775 kernel: audit: type=1130 audit(1707792180.195:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-170.106.178.136:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:00.378549 sshd[2159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:43:00.378000 audit[2159]: ANOM_LOGIN_FAILURES pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:00.378685 sshd[2159]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 02:43:00.378000 audit[2159]: USER_AUTH pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:43:00.543119 kernel: audit: type=2100 audit(1707792180.378:242): pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:00.543167 kernel: audit: type=1100 audit(1707792180.378:243): pid=2159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:43:02.574288 systemd[1]: Started sshd@29-147.75.90.7:22-104.250.49.155:52543.service. Feb 13 02:43:02.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-104.250.49.155:52543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:02.637692 sshd[2159]: Failed password for root from 170.106.178.136 port 45386 ssh2 Feb 13 02:43:02.667795 kernel: audit: type=1130 audit(1707792182.573:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-104.250.49.155:52543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:03.271957 sshd[2159]: Received disconnect from 170.106.178.136 port 45386:11: Bye Bye [preauth] Feb 13 02:43:03.271957 sshd[2159]: Disconnected from authenticating user root 170.106.178.136 port 45386 [preauth] Feb 13 02:43:03.274445 systemd[1]: sshd@28-147.75.90.7:22-170.106.178.136:45386.service: Deactivated successfully. Feb 13 02:43:03.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-170.106.178.136:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:03.368649 kernel: audit: type=1131 audit(1707792183.274:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.7:22-170.106.178.136:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:08.769756 sshd[2162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.155 user=root Feb 13 02:43:08.769000 audit[2162]: ANOM_LOGIN_FAILURES pid=2162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:08.769998 sshd[2162]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 02:43:08.769000 audit[2162]: USER_AUTH pid=2162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:43:08.925370 kernel: audit: type=2100 audit(1707792188.769:246): pid=2162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:08.925433 kernel: audit: type=1100 audit(1707792188.769:247): pid=2162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:43:10.793956 sshd[2162]: Failed password for root from 104.250.49.155 port 52543 ssh2 Feb 13 02:43:11.805293 sshd[2162]: Received disconnect from 104.250.49.155 port 52543:11: Bye Bye [preauth] Feb 13 02:43:11.805293 sshd[2162]: Disconnected from authenticating user root 104.250.49.155 port 52543 [preauth] Feb 13 02:43:11.807786 systemd[1]: sshd@29-147.75.90.7:22-104.250.49.155:52543.service: Deactivated successfully. Feb 13 02:43:11.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-104.250.49.155:52543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:11.901647 kernel: audit: type=1131 audit(1707792191.807:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.7:22-104.250.49.155:52543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:30.616736 systemd[1]: Started sshd@30-147.75.90.7:22-141.98.11.169:54132.service. Feb 13 02:43:30.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-141.98.11.169:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:30.709772 kernel: audit: type=1130 audit(1707792210.616:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-141.98.11.169:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:31.690990 sshd[2168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 02:43:31.690000 audit[2168]: USER_AUTH pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 02:43:31.784775 kernel: audit: type=1100 audit(1707792211.690:250): pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 02:43:31.963725 systemd[1]: Started sshd@31-147.75.90.7:22-14.63.196.175:41888.service. Feb 13 02:43:31.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.7:22-14.63.196.175:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:32.057790 kernel: audit: type=1130 audit(1707792211.963:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.7:22-14.63.196.175:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:33.539536 sshd[2168]: Failed password for root from 141.98.11.169 port 54132 ssh2 Feb 13 02:43:34.360547 sshd[2171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:43:34.360000 audit[2171]: USER_AUTH pid=2171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:43:34.452799 kernel: audit: type=1100 audit(1707792214.360:252): pid=2171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:43:34.790968 sshd[2168]: Connection closed by authenticating user root 141.98.11.169 port 54132 [preauth] Feb 13 02:43:34.793397 systemd[1]: sshd@30-147.75.90.7:22-141.98.11.169:54132.service: Deactivated successfully. Feb 13 02:43:34.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-141.98.11.169:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:34.886653 kernel: audit: type=1131 audit(1707792214.793:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.7:22-141.98.11.169:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:34.953527 systemd[1]: Started sshd@32-147.75.90.7:22-141.98.11.169:50826.service. Feb 13 02:43:34.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.7:22-141.98.11.169:50826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:35.045774 kernel: audit: type=1130 audit(1707792214.953:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.7:22-141.98.11.169:50826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:35.899226 sshd[2176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 02:43:35.898000 audit[2176]: USER_AUTH pid=2176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 02:43:35.992612 kernel: audit: type=1100 audit(1707792215.898:255): pid=2176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 02:43:36.956712 sshd[2171]: Failed password for root from 14.63.196.175 port 41888 ssh2 Feb 13 02:43:37.386105 sshd[2171]: Received disconnect from 14.63.196.175 port 41888:11: Bye Bye [preauth] Feb 13 02:43:37.386105 sshd[2171]: Disconnected from authenticating user root 14.63.196.175 port 41888 [preauth] Feb 13 02:43:37.388580 systemd[1]: sshd@31-147.75.90.7:22-14.63.196.175:41888.service: Deactivated successfully. Feb 13 02:43:37.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.7:22-14.63.196.175:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:37.481651 kernel: audit: type=1131 audit(1707792217.388:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.7:22-14.63.196.175:41888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:37.963736 sshd[2176]: Failed password for root from 141.98.11.169 port 50826 ssh2 Feb 13 02:43:38.973135 sshd[2176]: Connection closed by authenticating user root 141.98.11.169 port 50826 [preauth] Feb 13 02:43:38.975613 systemd[1]: sshd@32-147.75.90.7:22-141.98.11.169:50826.service: Deactivated successfully. Feb 13 02:43:38.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.7:22-141.98.11.169:50826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:39.069788 kernel: audit: type=1131 audit(1707792218.975:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.7:22-141.98.11.169:50826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:43.044969 systemd[1]: Started sshd@33-147.75.90.7:22-83.12.113.122:47984.service. Feb 13 02:43:43.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-83.12.113.122:47984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:43.137629 kernel: audit: type=1130 audit(1707792223.044:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-83.12.113.122:47984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:44.112945 sshd[2182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:43:44.111000 audit[2182]: USER_AUTH pid=2182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:43:44.205778 kernel: audit: type=1100 audit(1707792224.111:259): pid=2182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:43:46.081850 sshd[2182]: Failed password for root from 83.12.113.122 port 47984 ssh2 Feb 13 02:43:47.189128 sshd[2182]: Received disconnect from 83.12.113.122 port 47984:11: Bye Bye [preauth] Feb 13 02:43:47.189128 sshd[2182]: Disconnected from authenticating user root 83.12.113.122 port 47984 [preauth] Feb 13 02:43:47.191662 systemd[1]: sshd@33-147.75.90.7:22-83.12.113.122:47984.service: Deactivated successfully. Feb 13 02:43:47.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-83.12.113.122:47984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:47.284774 kernel: audit: type=1131 audit(1707792227.191:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.7:22-83.12.113.122:47984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:53.025784 systemd[1]: Started sshd@34-147.75.90.7:22-46.102.130.37:53404.service. Feb 13 02:43:53.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-46.102.130.37:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:53.118814 kernel: audit: type=1130 audit(1707792233.024:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-46.102.130.37:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:54.301322 sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:43:54.300000 audit[2186]: USER_AUTH pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:43:54.392792 kernel: audit: type=1100 audit(1707792234.300:262): pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:43:55.974424 sshd[2186]: Failed password for root from 46.102.130.37 port 53404 ssh2 Feb 13 02:43:56.285581 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:43:56.284Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1119} Feb 13 02:43:56.304851 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:43:56.304Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1119,"took":"19.123247ms"} Feb 13 02:43:57.421975 sshd[2186]: Received disconnect from 46.102.130.37 port 53404:11: Bye Bye [preauth] Feb 13 02:43:57.421975 sshd[2186]: Disconnected from authenticating user root 46.102.130.37 port 53404 [preauth] Feb 13 02:43:57.424585 systemd[1]: sshd@34-147.75.90.7:22-46.102.130.37:53404.service: Deactivated successfully. Feb 13 02:43:57.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-46.102.130.37:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:57.517671 kernel: audit: type=1131 audit(1707792237.423:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.7:22-46.102.130.37:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:58.460535 systemd[1]: Started sshd@35-147.75.90.7:22-170.106.178.136:35984.service. Feb 13 02:43:58.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.7:22-170.106.178.136:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:58.553806 kernel: audit: type=1130 audit(1707792238.459:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.7:22-170.106.178.136:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:58.619505 sshd[2192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:43:58.618000 audit[2192]: USER_AUTH pid=2192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:43:58.710645 kernel: audit: type=1100 audit(1707792238.618:265): pid=2192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:44:01.174985 sshd[2192]: Failed password for root from 170.106.178.136 port 35984 ssh2 Feb 13 02:44:01.513451 sshd[2192]: Received disconnect from 170.106.178.136 port 35984:11: Bye Bye [preauth] Feb 13 02:44:01.513451 sshd[2192]: Disconnected from authenticating user root 170.106.178.136 port 35984 [preauth] Feb 13 02:44:01.515961 systemd[1]: sshd@35-147.75.90.7:22-170.106.178.136:35984.service: Deactivated successfully. Feb 13 02:44:01.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.7:22-170.106.178.136:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:01.609814 kernel: audit: type=1131 audit(1707792241.514:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.7:22-170.106.178.136:35984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:08.129704 systemd[1]: Started sshd@36-147.75.90.7:22-177.32.66.110:55356.service. Feb 13 02:44:08.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-177.32.66.110:55356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:08.222655 kernel: audit: type=1130 audit(1707792248.128:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-177.32.66.110:55356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:09.235816 sshd[2196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.66.110 user=root Feb 13 02:44:09.234000 audit[2196]: USER_AUTH pid=2196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:44:09.328811 kernel: audit: type=1100 audit(1707792249.234:268): pid=2196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:44:11.636030 sshd[2196]: Failed password for root from 177.32.66.110 port 55356 ssh2 Feb 13 02:44:12.325879 sshd[2196]: Received disconnect from 177.32.66.110 port 55356:11: Bye Bye [preauth] Feb 13 02:44:12.325879 sshd[2196]: Disconnected from authenticating user root 177.32.66.110 port 55356 [preauth] Feb 13 02:44:12.328418 systemd[1]: sshd@36-147.75.90.7:22-177.32.66.110:55356.service: Deactivated successfully. Feb 13 02:44:12.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-177.32.66.110:55356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:12.421796 kernel: audit: type=1131 audit(1707792252.327:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.7:22-177.32.66.110:55356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:21.560086 systemd[1]: Started sshd@37-147.75.90.7:22-220.249.78.130:45365.service. Feb 13 02:44:21.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-220.249.78.130:45365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:21.565201 sshd[2200]: kex_exchange_identification: Connection closed by remote host Feb 13 02:44:21.565201 sshd[2200]: Connection closed by 220.249.78.130 port 45365 Feb 13 02:44:21.565406 systemd[1]: sshd@37-147.75.90.7:22-220.249.78.130:45365.service: Deactivated successfully. Feb 13 02:44:21.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-220.249.78.130:45365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:21.743611 kernel: audit: type=1130 audit(1707792261.559:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-220.249.78.130:45365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:21.743693 kernel: audit: type=1131 audit(1707792261.564:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.7:22-220.249.78.130:45365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:22.286293 systemd[1]: Started sshd@38-147.75.90.7:22-220.249.78.130:46071.service. Feb 13 02:44:22.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-220.249.78.130:46071 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:22.379650 kernel: audit: type=1130 audit(1707792262.286:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-220.249.78.130:46071 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:23.221889 sshd[2204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:23.221000 audit[2204]: USER_AUTH pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:23.314775 kernel: audit: type=1100 audit(1707792263.221:273): pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:24.873806 sshd[2204]: Failed password for root from 220.249.78.130 port 46071 ssh2 Feb 13 02:44:26.293445 sshd[2204]: Connection closed by authenticating user root 220.249.78.130 port 46071 [preauth] Feb 13 02:44:26.296093 systemd[1]: sshd@38-147.75.90.7:22-220.249.78.130:46071.service: Deactivated successfully. Feb 13 02:44:26.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-220.249.78.130:46071 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:26.389670 kernel: audit: type=1131 audit(1707792266.296:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.7:22-220.249.78.130:46071 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:26.480561 systemd[1]: Started sshd@39-147.75.90.7:22-220.249.78.130:48073.service. Feb 13 02:44:26.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-220.249.78.130:48073 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:26.572611 kernel: audit: type=1130 audit(1707792266.480:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-220.249.78.130:48073 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:27.426729 sshd[2208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:27.426000 audit[2208]: USER_AUTH pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:27.519781 kernel: audit: type=1100 audit(1707792267.426:276): pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:29.631559 sshd[2208]: Failed password for root from 220.249.78.130 port 48073 ssh2 Feb 13 02:44:30.496051 sshd[2208]: Connection closed by authenticating user root 220.249.78.130 port 48073 [preauth] Feb 13 02:44:30.498557 systemd[1]: sshd@39-147.75.90.7:22-220.249.78.130:48073.service: Deactivated successfully. Feb 13 02:44:30.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-220.249.78.130:48073 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:30.591643 kernel: audit: type=1131 audit(1707792270.498:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.7:22-220.249.78.130:48073 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:30.991951 systemd[1]: Started sshd@40-147.75.90.7:22-220.249.78.130:50039.service. Feb 13 02:44:30.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-220.249.78.130:50039 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:31.085792 kernel: audit: type=1130 audit(1707792270.991:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-220.249.78.130:50039 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:31.929275 sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:31.928000 audit[2212]: USER_AUTH pid=2212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:32.021630 kernel: audit: type=1100 audit(1707792271.928:279): pid=2212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:33.682579 sshd[2212]: Failed password for root from 220.249.78.130 port 50039 ssh2 Feb 13 02:44:35.143033 sshd[2212]: Connection closed by authenticating user root 220.249.78.130 port 50039 [preauth] Feb 13 02:44:35.145519 systemd[1]: sshd@40-147.75.90.7:22-220.249.78.130:50039.service: Deactivated successfully. Feb 13 02:44:35.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-220.249.78.130:50039 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:35.238787 kernel: audit: type=1131 audit(1707792275.144:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.7:22-220.249.78.130:50039 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:35.745977 systemd[1]: Started sshd@41-147.75.90.7:22-220.249.78.130:52086.service. Feb 13 02:44:35.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-220.249.78.130:52086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:35.838792 kernel: audit: type=1130 audit(1707792275.744:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-220.249.78.130:52086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:36.673644 sshd[2216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:36.672000 audit[2216]: USER_AUTH pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:36.735052 systemd[1]: Started sshd@42-147.75.90.7:22-23.96.17.95:45230.service. Feb 13 02:44:36.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-23.96.17.95:45230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:36.857187 kernel: audit: type=1100 audit(1707792276.672:282): pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:36.857264 kernel: audit: type=1130 audit(1707792276.733:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-23.96.17.95:45230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:37.224584 sshd[2219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:44:37.223000 audit[2219]: USER_AUTH pid=2219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:44:37.322783 kernel: audit: type=1100 audit(1707792277.223:284): pid=2219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:44:38.778468 sshd[2216]: Failed password for root from 220.249.78.130 port 52086 ssh2 Feb 13 02:44:39.132962 sshd[2219]: Failed password for root from 23.96.17.95 port 45230 ssh2 Feb 13 02:44:39.875546 sshd[2216]: Connection closed by authenticating user root 220.249.78.130 port 52086 [preauth] Feb 13 02:44:39.878076 systemd[1]: sshd@41-147.75.90.7:22-220.249.78.130:52086.service: Deactivated successfully. Feb 13 02:44:39.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-220.249.78.130:52086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:39.971794 kernel: audit: type=1131 audit(1707792279.876:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.7:22-220.249.78.130:52086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:40.190039 sshd[2219]: Received disconnect from 23.96.17.95 port 45230:11: Bye Bye [preauth] Feb 13 02:44:40.190039 sshd[2219]: Disconnected from authenticating user root 23.96.17.95 port 45230 [preauth] Feb 13 02:44:40.192443 systemd[1]: sshd@42-147.75.90.7:22-23.96.17.95:45230.service: Deactivated successfully. Feb 13 02:44:40.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-23.96.17.95:45230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:40.290649 kernel: audit: type=1131 audit(1707792280.191:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.7:22-23.96.17.95:45230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:40.539989 systemd[1]: Started sshd@43-147.75.90.7:22-220.249.78.130:54095.service. Feb 13 02:44:40.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-220.249.78.130:54095 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:40.633799 kernel: audit: type=1130 audit(1707792280.538:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-220.249.78.130:54095 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:41.476536 sshd[2224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:41.475000 audit[2224]: USER_AUTH pid=2224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:41.569775 kernel: audit: type=1100 audit(1707792281.475:288): pid=2224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:42.602490 sshd[2224]: Failed password for root from 220.249.78.130 port 54095 ssh2 Feb 13 02:44:43.122910 sshd[2224]: Connection closed by authenticating user root 220.249.78.130 port 54095 [preauth] Feb 13 02:44:43.125447 systemd[1]: sshd@43-147.75.90.7:22-220.249.78.130:54095.service: Deactivated successfully. Feb 13 02:44:43.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-220.249.78.130:54095 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:43.218794 kernel: audit: type=1131 audit(1707792283.124:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.7:22-220.249.78.130:54095 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:43.304472 systemd[1]: Started sshd@44-147.75.90.7:22-220.249.78.130:55139.service. Feb 13 02:44:43.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-220.249.78.130:55139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:43.398797 kernel: audit: type=1130 audit(1707792283.303:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-220.249.78.130:55139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:44.230013 sshd[2228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:44.228000 audit[2228]: USER_AUTH pid=2228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:44.322591 kernel: audit: type=1100 audit(1707792284.228:291): pid=2228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:46.433978 sshd[2228]: Failed password for root from 220.249.78.130 port 55139 ssh2 Feb 13 02:44:47.625646 sshd[2228]: Connection closed by authenticating user root 220.249.78.130 port 55139 [preauth] Feb 13 02:44:47.628148 systemd[1]: sshd@44-147.75.90.7:22-220.249.78.130:55139.service: Deactivated successfully. Feb 13 02:44:47.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-220.249.78.130:55139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:47.721782 kernel: audit: type=1131 audit(1707792287.627:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.7:22-220.249.78.130:55139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:47.813976 systemd[1]: Started sshd@45-147.75.90.7:22-220.249.78.130:57128.service. Feb 13 02:44:47.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-220.249.78.130:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:47.906594 kernel: audit: type=1130 audit(1707792287.812:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-220.249.78.130:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:48.748498 sshd[2232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:48.748000 audit[2232]: USER_AUTH pid=2232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:48.842782 kernel: audit: type=1100 audit(1707792288.748:294): pid=2232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:50.832985 sshd[2232]: Failed password for root from 220.249.78.130 port 57128 ssh2 Feb 13 02:44:52.031994 systemd[1]: Started sshd@46-147.75.90.7:22-46.102.130.37:51528.service. Feb 13 02:44:52.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-46.102.130.37:51528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:52.124641 kernel: audit: type=1130 audit(1707792292.031:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-46.102.130.37:51528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:52.178207 sshd[2232]: Connection closed by authenticating user root 220.249.78.130 port 57128 [preauth] Feb 13 02:44:52.178934 systemd[1]: sshd@45-147.75.90.7:22-220.249.78.130:57128.service: Deactivated successfully. Feb 13 02:44:52.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-220.249.78.130:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:52.271793 kernel: audit: type=1131 audit(1707792292.178:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.7:22-220.249.78.130:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:52.364006 systemd[1]: Started sshd@47-147.75.90.7:22-220.249.78.130:59097.service. Feb 13 02:44:52.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-220.249.78.130:59097 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:52.457676 kernel: audit: type=1130 audit(1707792292.363:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-220.249.78.130:59097 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:53.243553 sshd[2235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:44:53.243000 audit[2235]: USER_AUTH pid=2235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:44:53.286772 sshd[2239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 user=root Feb 13 02:44:53.286000 audit[2239]: USER_AUTH pid=2239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:53.427962 kernel: audit: type=1100 audit(1707792293.243:298): pid=2235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:44:53.427994 kernel: audit: type=1100 audit(1707792293.286:299): pid=2239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:54.349272 sshd[2235]: Failed password for root from 46.102.130.37 port 51528 ssh2 Feb 13 02:44:54.392212 sshd[2239]: Failed password for root from 220.249.78.130 port 59097 ssh2 Feb 13 02:44:54.900323 sshd[2235]: Received disconnect from 46.102.130.37 port 51528:11: Bye Bye [preauth] Feb 13 02:44:54.900323 sshd[2235]: Disconnected from authenticating user root 46.102.130.37 port 51528 [preauth] Feb 13 02:44:54.902915 systemd[1]: sshd@46-147.75.90.7:22-46.102.130.37:51528.service: Deactivated successfully. Feb 13 02:44:54.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-46.102.130.37:51528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:54.910689 sshd[2239]: Connection closed by authenticating user root 220.249.78.130 port 59097 [preauth] Feb 13 02:44:54.911373 systemd[1]: sshd@47-147.75.90.7:22-220.249.78.130:59097.service: Deactivated successfully. Feb 13 02:44:54.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-220.249.78.130:59097 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.086596 kernel: audit: type=1131 audit(1707792294.902:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.7:22-46.102.130.37:51528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.086627 kernel: audit: type=1131 audit(1707792294.910:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.7:22-220.249.78.130:59097 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.098246 systemd[1]: Started sshd@48-147.75.90.7:22-220.249.78.130:60138.service. Feb 13 02:44:55.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-220.249.78.130:60138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.189645 kernel: audit: type=1130 audit(1707792295.097:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-220.249.78.130:60138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.779222 systemd[1]: Started sshd@49-147.75.90.7:22-170.106.178.136:54810.service. Feb 13 02:44:55.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-170.106.178.136:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.831821 sshd[2244]: Invalid user oracle from 220.249.78.130 port 60138 Feb 13 02:44:55.874785 kernel: audit: type=1130 audit(1707792295.778:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-170.106.178.136:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:55.953033 sshd[2247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:44:55.952000 audit[2247]: USER_AUTH pid=2247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:44:56.018430 sshd[2244]: pam_faillock(sshd:auth): User unknown Feb 13 02:44:56.018723 sshd[2244]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:44:56.018743 sshd[2244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:44:56.018976 sshd[2244]: pam_faillock(sshd:auth): User unknown Feb 13 02:44:56.018000 audit[2244]: USER_AUTH pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:56.145582 kernel: audit: type=1100 audit(1707792295.952:304): pid=2247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:44:56.145653 kernel: audit: type=1100 audit(1707792296.018:305): pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:44:58.202946 sshd[2244]: Failed password for invalid user oracle from 220.249.78.130 port 60138 ssh2 Feb 13 02:44:58.333736 sshd[2247]: Failed password for root from 170.106.178.136 port 54810 ssh2 Feb 13 02:44:58.838924 sshd[2247]: Received disconnect from 170.106.178.136 port 54810:11: Bye Bye [preauth] Feb 13 02:44:58.838924 sshd[2247]: Disconnected from authenticating user root 170.106.178.136 port 54810 [preauth] Feb 13 02:44:58.841349 systemd[1]: sshd@49-147.75.90.7:22-170.106.178.136:54810.service: Deactivated successfully. Feb 13 02:44:58.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-170.106.178.136:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:58.933638 kernel: audit: type=1131 audit(1707792298.841:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.7:22-170.106.178.136:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:59.999028 sshd[2244]: Connection closed by invalid user oracle 220.249.78.130 port 60138 [preauth] Feb 13 02:45:00.001741 systemd[1]: sshd@48-147.75.90.7:22-220.249.78.130:60138.service: Deactivated successfully. Feb 13 02:45:00.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-220.249.78.130:60138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:00.095774 kernel: audit: type=1131 audit(1707792300.001:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.7:22-220.249.78.130:60138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:00.911602 systemd[1]: Started sshd@50-147.75.90.7:22-220.249.78.130:33914.service. Feb 13 02:45:00.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-220.249.78.130:33914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:01.004619 kernel: audit: type=1130 audit(1707792300.911:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-220.249.78.130:33914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:02.188750 sshd[2252]: Invalid user oracle from 220.249.78.130 port 33914 Feb 13 02:45:02.371011 sshd[2252]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:02.371968 sshd[2252]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:02.372058 sshd[2252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:02.372929 sshd[2252]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:02.372000 audit[2252]: USER_AUTH pid=2252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:02.466793 kernel: audit: type=1100 audit(1707792302.372:309): pid=2252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:02.564044 systemd[1]: Started sshd@51-147.75.90.7:22-83.12.113.122:38960.service. Feb 13 02:45:02.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-83.12.113.122:38960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:02.657792 kernel: audit: type=1130 audit(1707792302.563:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-83.12.113.122:38960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:03.637503 sshd[2255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:45:03.637000 audit[2255]: USER_AUTH pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:45:03.729789 kernel: audit: type=1100 audit(1707792303.637:311): pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:45:04.381821 sshd[2252]: Failed password for invalid user oracle from 220.249.78.130 port 33914 ssh2 Feb 13 02:45:05.450914 sshd[2255]: Failed password for root from 83.12.113.122 port 38960 ssh2 Feb 13 02:45:06.211410 sshd[2252]: Connection closed by invalid user oracle 220.249.78.130 port 33914 [preauth] Feb 13 02:45:06.213917 systemd[1]: sshd@50-147.75.90.7:22-220.249.78.130:33914.service: Deactivated successfully. Feb 13 02:45:06.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-220.249.78.130:33914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:06.308751 kernel: audit: type=1131 audit(1707792306.213:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.7:22-220.249.78.130:33914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:06.405260 systemd[1]: Started sshd@52-147.75.90.7:22-220.249.78.130:36839.service. Feb 13 02:45:06.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-220.249.78.130:36839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:06.498617 kernel: audit: type=1130 audit(1707792306.404:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-220.249.78.130:36839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:06.712555 sshd[2255]: Received disconnect from 83.12.113.122 port 38960:11: Bye Bye [preauth] Feb 13 02:45:06.712555 sshd[2255]: Disconnected from authenticating user root 83.12.113.122 port 38960 [preauth] Feb 13 02:45:06.715065 systemd[1]: sshd@51-147.75.90.7:22-83.12.113.122:38960.service: Deactivated successfully. Feb 13 02:45:06.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-83.12.113.122:38960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:06.813661 kernel: audit: type=1131 audit(1707792306.714:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.7:22-83.12.113.122:38960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:07.531636 sshd[2259]: Invalid user oracle from 220.249.78.130 port 36839 Feb 13 02:45:07.716079 sshd[2259]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:07.717170 sshd[2259]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:07.717260 sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:07.718188 sshd[2259]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:07.717000 audit[2259]: USER_AUTH pid=2259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:07.812812 kernel: audit: type=1100 audit(1707792307.717:315): pid=2259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:09.727055 systemd[1]: Started sshd@53-147.75.90.7:22-101.42.157.74:45236.service. Feb 13 02:45:09.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-101.42.157.74:45236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:09.819649 kernel: audit: type=1130 audit(1707792309.726:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-101.42.157.74:45236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:10.078881 sshd[2259]: Failed password for invalid user oracle from 220.249.78.130 port 36839 ssh2 Feb 13 02:45:11.994108 sshd[2259]: Connection closed by invalid user oracle 220.249.78.130 port 36839 [preauth] Feb 13 02:45:11.996607 systemd[1]: sshd@52-147.75.90.7:22-220.249.78.130:36839.service: Deactivated successfully. Feb 13 02:45:11.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-220.249.78.130:36839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:12.090785 kernel: audit: type=1131 audit(1707792311.996:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.7:22-220.249.78.130:36839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:12.329444 systemd[1]: Started sshd@54-147.75.90.7:22-220.249.78.130:39601.service. Feb 13 02:45:12.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-220.249.78.130:39601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:12.423793 kernel: audit: type=1130 audit(1707792312.329:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-220.249.78.130:39601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:13.409958 sshd[2271]: Invalid user oracle from 220.249.78.130 port 39601 Feb 13 02:45:13.594481 sshd[2271]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:13.595519 sshd[2271]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:13.595632 sshd[2271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:13.596683 sshd[2271]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:13.595000 audit[2271]: USER_AUTH pid=2271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:13.690657 kernel: audit: type=1100 audit(1707792313.595:319): pid=2271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:15.113962 sshd[2271]: Failed password for invalid user oracle from 220.249.78.130 port 39601 ssh2 Feb 13 02:45:15.674319 sshd[2271]: Connection closed by invalid user oracle 220.249.78.130 port 39601 [preauth] Feb 13 02:45:15.676755 systemd[1]: sshd@54-147.75.90.7:22-220.249.78.130:39601.service: Deactivated successfully. Feb 13 02:45:15.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-220.249.78.130:39601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:15.770788 kernel: audit: type=1131 audit(1707792315.675:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.7:22-220.249.78.130:39601 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:15.860732 systemd[1]: Started sshd@55-147.75.90.7:22-220.249.78.130:40909.service. Feb 13 02:45:15.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-220.249.78.130:40909 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:15.954795 kernel: audit: type=1130 audit(1707792315.859:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-220.249.78.130:40909 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:16.610291 sshd[2276]: Invalid user oracle from 220.249.78.130 port 40909 Feb 13 02:45:16.796091 sshd[2276]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:16.797050 sshd[2276]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:16.797140 sshd[2276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:16.798194 sshd[2276]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:16.796000 audit[2276]: USER_AUTH pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:16.892792 kernel: audit: type=1100 audit(1707792316.796:322): pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:19.063012 sshd[2276]: Failed password for invalid user oracle from 220.249.78.130 port 40909 ssh2 Feb 13 02:45:20.774933 sshd[2276]: Connection closed by invalid user oracle 220.249.78.130 port 40909 [preauth] Feb 13 02:45:20.777373 systemd[1]: sshd@55-147.75.90.7:22-220.249.78.130:40909.service: Deactivated successfully. Feb 13 02:45:20.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-220.249.78.130:40909 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:20.871787 kernel: audit: type=1131 audit(1707792320.776:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.7:22-220.249.78.130:40909 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:21.722868 systemd[1]: Started sshd@56-147.75.90.7:22-220.249.78.130:42927.service. Feb 13 02:45:21.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-220.249.78.130:42927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:21.816772 kernel: audit: type=1130 audit(1707792321.721:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-220.249.78.130:42927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:22.941021 sshd[2281]: Invalid user oracle from 220.249.78.130 port 42927 Feb 13 02:45:23.123459 sshd[2281]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:23.124462 sshd[2281]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:23.124553 sshd[2281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:23.125479 sshd[2281]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:23.124000 audit[2281]: USER_AUTH pid=2281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:23.219770 kernel: audit: type=1100 audit(1707792323.124:325): pid=2281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:24.682781 sshd[2281]: Failed password for invalid user oracle from 220.249.78.130 port 42927 ssh2 Feb 13 02:45:25.201114 sshd[2281]: Connection closed by invalid user oracle 220.249.78.130 port 42927 [preauth] Feb 13 02:45:25.203553 systemd[1]: sshd@56-147.75.90.7:22-220.249.78.130:42927.service: Deactivated successfully. Feb 13 02:45:25.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-220.249.78.130:42927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:25.297593 kernel: audit: type=1131 audit(1707792325.202:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.7:22-220.249.78.130:42927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:26.107304 systemd[1]: Started sshd@57-147.75.90.7:22-220.249.78.130:44942.service. Feb 13 02:45:26.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-220.249.78.130:44942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:26.165412 sshd[2265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.157.74 user=root Feb 13 02:45:26.163000 audit[2265]: USER_AUTH pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.157.74 addr=101.42.157.74 terminal=ssh res=failed' Feb 13 02:45:26.292947 kernel: audit: type=1130 audit(1707792326.105:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-220.249.78.130:44942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:26.292981 kernel: audit: type=1100 audit(1707792326.163:328): pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.157.74 addr=101.42.157.74 terminal=ssh res=failed' Feb 13 02:45:27.264641 systemd[1]: Started sshd@58-147.75.90.7:22-177.32.66.110:46154.service. Feb 13 02:45:27.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-177.32.66.110:46154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:27.357657 kernel: audit: type=1130 audit(1707792327.263:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-177.32.66.110:46154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:28.133971 sshd[2265]: Failed password for root from 101.42.157.74 port 45236 ssh2 Feb 13 02:45:28.441010 sshd[2288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.66.110 user=root Feb 13 02:45:28.440000 audit[2288]: USER_AUTH pid=2288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:45:28.534642 kernel: audit: type=1100 audit(1707792328.440:330): pid=2288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:45:28.891098 sshd[2285]: Invalid user oracle from 220.249.78.130 port 44942 Feb 13 02:45:29.055697 sshd[2265]: Received disconnect from 101.42.157.74 port 45236:11: Bye Bye [preauth] Feb 13 02:45:29.055697 sshd[2265]: Disconnected from authenticating user root 101.42.157.74 port 45236 [preauth] Feb 13 02:45:29.058247 systemd[1]: sshd@53-147.75.90.7:22-101.42.157.74:45236.service: Deactivated successfully. Feb 13 02:45:29.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-101.42.157.74:45236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:29.074091 sshd[2285]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:29.074431 sshd[2285]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:29.074455 sshd[2285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:29.074729 sshd[2285]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:29.074000 audit[2285]: USER_AUTH pid=2285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:29.243479 kernel: audit: type=1131 audit(1707792329.058:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.7:22-101.42.157.74:45236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:29.243510 kernel: audit: type=1100 audit(1707792329.074:332): pid=2285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:30.685917 sshd[2288]: Failed password for root from 177.32.66.110 port 46154 ssh2 Feb 13 02:45:30.787923 sshd[2285]: Failed password for invalid user oracle from 220.249.78.130 port 44942 ssh2 Feb 13 02:45:31.346516 systemd[1]: Started sshd@59-147.75.90.7:22-104.250.49.155:33393.service. Feb 13 02:45:31.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-104.250.49.155:33393 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.439651 kernel: audit: type=1130 audit(1707792331.345:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-104.250.49.155:33393 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.556880 sshd[2288]: Received disconnect from 177.32.66.110 port 46154:11: Bye Bye [preauth] Feb 13 02:45:31.556880 sshd[2288]: Disconnected from authenticating user root 177.32.66.110 port 46154 [preauth] Feb 13 02:45:31.558701 systemd[1]: sshd@58-147.75.90.7:22-177.32.66.110:46154.service: Deactivated successfully. Feb 13 02:45:31.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-177.32.66.110:46154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.641452 sshd[2285]: Connection closed by invalid user oracle 220.249.78.130 port 44942 [preauth] Feb 13 02:45:31.642039 systemd[1]: sshd@57-147.75.90.7:22-220.249.78.130:44942.service: Deactivated successfully. Feb 13 02:45:31.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-220.249.78.130:44942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.749566 kernel: audit: type=1131 audit(1707792331.558:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.7:22-177.32.66.110:46154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.749596 kernel: audit: type=1131 audit(1707792331.641:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.7:22-220.249.78.130:44942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.822748 systemd[1]: Started sshd@60-147.75.90.7:22-220.249.78.130:47878.service. Feb 13 02:45:31.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-220.249.78.130:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:31.915652 kernel: audit: type=1130 audit(1707792331.822:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-220.249.78.130:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:32.564686 sshd[2298]: Invalid user oracle from 220.249.78.130 port 47878 Feb 13 02:45:32.751184 sshd[2298]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:32.752324 sshd[2298]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:32.752417 sshd[2298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:32.753301 sshd[2298]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:32.752000 audit[2298]: USER_AUTH pid=2298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:32.846662 kernel: audit: type=1100 audit(1707792332.752:337): pid=2298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:34.877999 sshd[2298]: Failed password for invalid user oracle from 220.249.78.130 port 47878 ssh2 Feb 13 02:45:34.885624 sshd[2293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.155 user=root Feb 13 02:45:34.885000 audit[2293]: USER_AUTH pid=2293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:45:34.978778 kernel: audit: type=1100 audit(1707792334.885:338): pid=2293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.155 addr=104.250.49.155 terminal=ssh res=failed' Feb 13 02:45:35.769534 systemd[1]: Started sshd@61-147.75.90.7:22-23.96.17.95:40520.service. Feb 13 02:45:35.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.7:22-23.96.17.95:40520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:35.861600 kernel: audit: type=1130 audit(1707792335.769:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.7:22-23.96.17.95:40520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:36.217725 sshd[2301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:45:36.217000 audit[2301]: USER_AUTH pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:45:36.309774 kernel: audit: type=1100 audit(1707792336.217:340): pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:45:36.733216 sshd[2298]: Connection closed by invalid user oracle 220.249.78.130 port 47878 [preauth] Feb 13 02:45:36.735685 systemd[1]: sshd@60-147.75.90.7:22-220.249.78.130:47878.service: Deactivated successfully. Feb 13 02:45:36.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-220.249.78.130:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:36.829787 kernel: audit: type=1131 audit(1707792336.735:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.7:22-220.249.78.130:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:36.915438 systemd[1]: Started sshd@62-147.75.90.7:22-220.249.78.130:49928.service. Feb 13 02:45:36.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-220.249.78.130:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:36.953743 sshd[2293]: Failed password for root from 104.250.49.155 port 33393 ssh2 Feb 13 02:45:37.008592 kernel: audit: type=1130 audit(1707792336.915:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-220.249.78.130:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:37.559686 sshd[2301]: Failed password for root from 23.96.17.95 port 40520 ssh2 Feb 13 02:45:37.658442 sshd[2305]: Invalid user admin from 220.249.78.130 port 49928 Feb 13 02:45:37.733303 sshd[2301]: Received disconnect from 23.96.17.95 port 40520:11: Bye Bye [preauth] Feb 13 02:45:37.733303 sshd[2301]: Disconnected from authenticating user root 23.96.17.95 port 40520 [preauth] Feb 13 02:45:37.735794 systemd[1]: sshd@61-147.75.90.7:22-23.96.17.95:40520.service: Deactivated successfully. Feb 13 02:45:37.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.7:22-23.96.17.95:40520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:37.828627 kernel: audit: type=1131 audit(1707792337.735:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.7:22-23.96.17.95:40520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:37.838796 sshd[2305]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:37.839005 sshd[2305]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:37.839022 sshd[2305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:37.839217 sshd[2305]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:37.838000 audit[2305]: USER_AUTH pid=2305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:37.920291 sshd[2293]: Received disconnect from 104.250.49.155 port 33393:11: Bye Bye [preauth] Feb 13 02:45:37.920291 sshd[2293]: Disconnected from authenticating user root 104.250.49.155 port 33393 [preauth] Feb 13 02:45:37.920771 systemd[1]: sshd@59-147.75.90.7:22-104.250.49.155:33393.service: Deactivated successfully. Feb 13 02:45:37.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-104.250.49.155:33393 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:38.024678 kernel: audit: type=1100 audit(1707792337.838:344): pid=2305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:38.024708 kernel: audit: type=1131 audit(1707792337.920:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.7:22-104.250.49.155:33393 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:39.651975 sshd[2305]: Failed password for invalid user admin from 220.249.78.130 port 49928 ssh2 Feb 13 02:45:41.374292 sshd[2305]: Connection closed by invalid user admin 220.249.78.130 port 49928 [preauth] Feb 13 02:45:41.376800 systemd[1]: sshd@62-147.75.90.7:22-220.249.78.130:49928.service: Deactivated successfully. Feb 13 02:45:41.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-220.249.78.130:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:41.470738 kernel: audit: type=1131 audit(1707792341.376:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.7:22-220.249.78.130:49928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:41.566693 systemd[1]: Started sshd@63-147.75.90.7:22-220.249.78.130:51952.service. Feb 13 02:45:41.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-220.249.78.130:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:41.659792 kernel: audit: type=1130 audit(1707792341.566:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-220.249.78.130:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:42.317053 sshd[2311]: Invalid user admin from 220.249.78.130 port 51952 Feb 13 02:45:42.510205 sshd[2311]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:42.511322 sshd[2311]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:42.511412 sshd[2311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:42.512310 sshd[2311]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:42.511000 audit[2311]: USER_AUTH pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:42.606710 kernel: audit: type=1100 audit(1707792342.511:348): pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:44.676763 sshd[2311]: Failed password for invalid user admin from 220.249.78.130 port 51952 ssh2 Feb 13 02:45:46.047068 sshd[2311]: Connection closed by invalid user admin 220.249.78.130 port 51952 [preauth] Feb 13 02:45:46.049611 systemd[1]: sshd@63-147.75.90.7:22-220.249.78.130:51952.service: Deactivated successfully. Feb 13 02:45:46.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-220.249.78.130:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:46.141773 kernel: audit: type=1131 audit(1707792346.049:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.7:22-220.249.78.130:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:46.235835 systemd[1]: Started sshd@64-147.75.90.7:22-220.249.78.130:53974.service. Feb 13 02:45:46.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-220.249.78.130:53974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:46.328593 kernel: audit: type=1130 audit(1707792346.235:350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-220.249.78.130:53974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:46.977537 sshd[2315]: Invalid user admin from 220.249.78.130 port 53974 Feb 13 02:45:47.162095 sshd[2315]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:47.163075 sshd[2315]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:47.163162 sshd[2315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:47.164053 sshd[2315]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:47.163000 audit[2315]: USER_AUTH pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:47.258790 kernel: audit: type=1100 audit(1707792347.163:351): pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:49.016784 sshd[2315]: Failed password for invalid user admin from 220.249.78.130 port 53974 ssh2 Feb 13 02:45:49.418930 systemd[1]: Started sshd@65-147.75.90.7:22-46.102.130.37:52190.service. Feb 13 02:45:49.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.7:22-46.102.130.37:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:49.511624 kernel: audit: type=1130 audit(1707792349.418:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.7:22-46.102.130.37:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:50.638175 sshd[2318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:45:50.637000 audit[2318]: USER_AUTH pid=2318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:45:50.731077 sshd[2315]: Connection closed by invalid user admin 220.249.78.130 port 53974 [preauth] Feb 13 02:45:50.731664 kernel: audit: type=1100 audit(1707792350.637:353): pid=2318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:45:50.731696 systemd[1]: sshd@64-147.75.90.7:22-220.249.78.130:53974.service: Deactivated successfully. Feb 13 02:45:50.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-220.249.78.130:53974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:50.824669 kernel: audit: type=1131 audit(1707792350.731:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.7:22-220.249.78.130:53974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:50.887406 systemd[1]: Started sshd@66-147.75.90.7:22-220.249.78.130:55974.service. Feb 13 02:45:50.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-220.249.78.130:55974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:50.981792 kernel: audit: type=1130 audit(1707792350.887:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-220.249.78.130:55974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:51.657114 sshd[2322]: Invalid user admin from 220.249.78.130 port 55974 Feb 13 02:45:51.839585 sshd[2322]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:51.840566 sshd[2322]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:51.840680 sshd[2322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:51.841613 sshd[2322]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:51.841000 audit[2322]: USER_AUTH pid=2322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:51.935658 kernel: audit: type=1100 audit(1707792351.841:356): pid=2322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:51.938568 systemd[1]: Started sshd@67-147.75.90.7:22-170.106.178.136:45404.service. Feb 13 02:45:51.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.7:22-170.106.178.136:45404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:52.031640 kernel: audit: type=1130 audit(1707792351.938:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.7:22-170.106.178.136:45404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:52.113032 sshd[2325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:45:52.112000 audit[2325]: USER_AUTH pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:45:52.211677 kernel: audit: type=1100 audit(1707792352.112:358): pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:45:52.235639 sshd[2318]: Failed password for root from 46.102.130.37 port 52190 ssh2 Feb 13 02:45:53.574993 sshd[2322]: Failed password for invalid user admin from 220.249.78.130 port 55974 ssh2 Feb 13 02:45:53.745754 sshd[2318]: Received disconnect from 46.102.130.37 port 52190:11: Bye Bye [preauth] Feb 13 02:45:53.745754 sshd[2318]: Disconnected from authenticating user root 46.102.130.37 port 52190 [preauth] Feb 13 02:45:53.748247 systemd[1]: sshd@65-147.75.90.7:22-46.102.130.37:52190.service: Deactivated successfully. Feb 13 02:45:53.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.7:22-46.102.130.37:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:53.842776 kernel: audit: type=1131 audit(1707792353.748:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.7:22-46.102.130.37:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:54.317900 sshd[2325]: Failed password for root from 170.106.178.136 port 45404 ssh2 Feb 13 02:45:55.007482 sshd[2325]: Received disconnect from 170.106.178.136 port 45404:11: Bye Bye [preauth] Feb 13 02:45:55.007482 sshd[2325]: Disconnected from authenticating user root 170.106.178.136 port 45404 [preauth] Feb 13 02:45:55.009988 systemd[1]: sshd@67-147.75.90.7:22-170.106.178.136:45404.service: Deactivated successfully. Feb 13 02:45:55.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.7:22-170.106.178.136:45404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:55.104783 kernel: audit: type=1131 audit(1707792355.009:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.7:22-170.106.178.136:45404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:55.374657 sshd[2322]: Connection closed by invalid user admin 220.249.78.130 port 55974 [preauth] Feb 13 02:45:55.377265 systemd[1]: sshd@66-147.75.90.7:22-220.249.78.130:55974.service: Deactivated successfully. Feb 13 02:45:55.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-220.249.78.130:55974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:55.474652 kernel: audit: type=1131 audit(1707792355.377:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.7:22-220.249.78.130:55974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:55.566602 systemd[1]: Started sshd@68-147.75.90.7:22-220.249.78.130:57957.service. Feb 13 02:45:55.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-220.249.78.130:57957 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:55.659594 kernel: audit: type=1130 audit(1707792355.566:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-220.249.78.130:57957 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:56.318125 sshd[2332]: Invalid user admin from 220.249.78.130 port 57957 Feb 13 02:45:56.501548 sshd[2332]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:56.502584 sshd[2332]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:45:56.502692 sshd[2332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:45:56.503603 sshd[2332]: pam_faillock(sshd:auth): User unknown Feb 13 02:45:56.503000 audit[2332]: USER_AUTH pid=2332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:56.597795 kernel: audit: type=1100 audit(1707792356.503:363): pid=2332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:45:58.592878 sshd[2332]: Failed password for invalid user admin from 220.249.78.130 port 57957 ssh2 Feb 13 02:46:00.038041 sshd[2332]: Connection closed by invalid user admin 220.249.78.130 port 57957 [preauth] Feb 13 02:46:00.040539 systemd[1]: sshd@68-147.75.90.7:22-220.249.78.130:57957.service: Deactivated successfully. Feb 13 02:46:00.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-220.249.78.130:57957 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:00.134654 kernel: audit: type=1131 audit(1707792360.039:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.7:22-220.249.78.130:57957 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:00.224567 systemd[1]: Started sshd@69-147.75.90.7:22-220.249.78.130:59938.service. Feb 13 02:46:00.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-220.249.78.130:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:00.318788 kernel: audit: type=1130 audit(1707792360.223:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-220.249.78.130:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:00.977445 sshd[2337]: Invalid user admin from 220.249.78.130 port 59938 Feb 13 02:46:01.162058 sshd[2337]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:01.163022 sshd[2337]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:46:01.163112 sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:46:01.163995 sshd[2337]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:01.162000 audit[2337]: USER_AUTH pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:01.257637 kernel: audit: type=1100 audit(1707792361.162:366): pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:02.937362 sshd[2337]: Failed password for invalid user admin from 220.249.78.130 port 59938 ssh2 Feb 13 02:46:04.725317 sshd[2337]: Connection closed by invalid user admin 220.249.78.130 port 59938 [preauth] Feb 13 02:46:04.727829 systemd[1]: sshd@69-147.75.90.7:22-220.249.78.130:59938.service: Deactivated successfully. Feb 13 02:46:04.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-220.249.78.130:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:04.821806 kernel: audit: type=1131 audit(1707792364.726:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.7:22-220.249.78.130:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:04.911691 systemd[1]: Started sshd@70-147.75.90.7:22-220.249.78.130:33713.service. Feb 13 02:46:04.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.7:22-220.249.78.130:33713 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:05.005791 kernel: audit: type=1130 audit(1707792364.910:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.7:22-220.249.78.130:33713 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:05.660777 sshd[2341]: Invalid user admin from 220.249.78.130 port 33713 Feb 13 02:46:05.844048 sshd[2341]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:05.845013 sshd[2341]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:46:05.845100 sshd[2341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:46:05.846001 sshd[2341]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:05.844000 audit[2341]: USER_AUTH pid=2341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:05.938769 kernel: audit: type=1100 audit(1707792365.844:369): pid=2341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:07.092827 systemd[1]: Started sshd@71-147.75.90.7:22-83.12.113.122:58064.service. Feb 13 02:46:07.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-83.12.113.122:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:07.186774 kernel: audit: type=1130 audit(1707792367.091:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-83.12.113.122:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:07.835298 sshd[2341]: Failed password for invalid user admin from 220.249.78.130 port 33713 ssh2 Feb 13 02:46:08.163813 sshd[2344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:46:08.162000 audit[2344]: USER_AUTH pid=2344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:46:08.256650 kernel: audit: type=1100 audit(1707792368.162:371): pid=2344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:46:09.380053 sshd[2341]: Connection closed by invalid user admin 220.249.78.130 port 33713 [preauth] Feb 13 02:46:09.382529 systemd[1]: sshd@70-147.75.90.7:22-220.249.78.130:33713.service: Deactivated successfully. Feb 13 02:46:09.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.7:22-220.249.78.130:33713 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:09.476787 kernel: audit: type=1131 audit(1707792369.381:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.7:22-220.249.78.130:33713 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:09.568257 systemd[1]: Started sshd@72-147.75.90.7:22-220.249.78.130:35704.service. Feb 13 02:46:09.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-220.249.78.130:35704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:09.661788 kernel: audit: type=1130 audit(1707792369.566:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-220.249.78.130:35704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:10.233253 sshd[2344]: Failed password for root from 83.12.113.122 port 58064 ssh2 Feb 13 02:46:10.323380 sshd[2348]: Invalid user admin from 220.249.78.130 port 35704 Feb 13 02:46:10.507046 sshd[2348]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:10.508055 sshd[2348]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:46:10.508144 sshd[2348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:46:10.509053 sshd[2348]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:10.507000 audit[2348]: USER_AUTH pid=2348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:10.602670 kernel: audit: type=1100 audit(1707792370.507:374): pid=2348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:11.244910 sshd[2344]: Received disconnect from 83.12.113.122 port 58064:11: Bye Bye [preauth] Feb 13 02:46:11.244910 sshd[2344]: Disconnected from authenticating user root 83.12.113.122 port 58064 [preauth] Feb 13 02:46:11.247371 systemd[1]: sshd@71-147.75.90.7:22-83.12.113.122:58064.service: Deactivated successfully. Feb 13 02:46:11.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-83.12.113.122:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:11.341788 kernel: audit: type=1131 audit(1707792371.246:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.7:22-83.12.113.122:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:12.518296 sshd[2348]: Failed password for invalid user admin from 220.249.78.130 port 35704 ssh2 Feb 13 02:46:14.043524 sshd[2348]: Connection closed by invalid user admin 220.249.78.130 port 35704 [preauth] Feb 13 02:46:14.046034 systemd[1]: sshd@72-147.75.90.7:22-220.249.78.130:35704.service: Deactivated successfully. Feb 13 02:46:14.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-220.249.78.130:35704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:14.138593 kernel: audit: type=1131 audit(1707792374.044:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.7:22-220.249.78.130:35704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:14.235128 systemd[1]: Started sshd@73-147.75.90.7:22-220.249.78.130:37699.service. Feb 13 02:46:14.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-220.249.78.130:37699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:14.328669 kernel: audit: type=1130 audit(1707792374.233:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-220.249.78.130:37699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:14.987246 sshd[2355]: Invalid user mysql from 220.249.78.130 port 37699 Feb 13 02:46:15.173035 sshd[2355]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:15.173998 sshd[2355]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:46:15.174090 sshd[2355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:46:15.174996 sshd[2355]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:15.173000 audit[2355]: USER_AUTH pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mysql" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:15.268799 kernel: audit: type=1100 audit(1707792375.173:378): pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mysql" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:17.093229 systemd[1]: Started sshd@74-147.75.90.7:22-14.63.196.175:43350.service. Feb 13 02:46:17.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-14.63.196.175:43350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:17.185784 kernel: audit: type=1130 audit(1707792377.091:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-14.63.196.175:43350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:17.203831 sshd[2355]: Failed password for invalid user mysql from 220.249.78.130 port 37699 ssh2 Feb 13 02:46:18.018854 sshd[2355]: Connection closed by invalid user mysql 220.249.78.130 port 37699 [preauth] Feb 13 02:46:18.021323 systemd[1]: sshd@73-147.75.90.7:22-220.249.78.130:37699.service: Deactivated successfully. Feb 13 02:46:18.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-220.249.78.130:37699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:18.114787 kernel: audit: type=1131 audit(1707792378.020:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.7:22-220.249.78.130:37699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:18.886941 systemd[1]: Started sshd@75-147.75.90.7:22-220.249.78.130:39717.service. Feb 13 02:46:18.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.90.7:22-220.249.78.130:39717 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:18.979597 kernel: audit: type=1130 audit(1707792378.886:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.90.7:22-220.249.78.130:39717 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:19.558257 sshd[2358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:46:19.556000 audit[2358]: USER_AUTH pid=2358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:46:19.632505 sshd[2362]: Invalid user mysql from 220.249.78.130 port 39717 Feb 13 02:46:19.650793 kernel: audit: type=1100 audit(1707792379.556:382): pid=2358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:46:19.821371 sshd[2362]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:19.822539 sshd[2362]: pam_unix(sshd:auth): check pass; user unknown Feb 13 02:46:19.822653 sshd[2362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.78.130 Feb 13 02:46:19.823539 sshd[2362]: pam_faillock(sshd:auth): User unknown Feb 13 02:46:19.822000 audit[2362]: USER_AUTH pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mysql" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:19.921710 kernel: audit: type=1100 audit(1707792379.822:383): pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mysql" exe="/usr/sbin/sshd" hostname=220.249.78.130 addr=220.249.78.130 terminal=ssh res=failed' Feb 13 02:46:21.471717 sshd[2358]: Failed password for root from 14.63.196.175 port 43350 ssh2 Feb 13 02:46:21.737012 sshd[2362]: Failed password for invalid user mysql from 220.249.78.130 port 39717 ssh2 Feb 13 02:46:22.577995 sshd[2358]: Received disconnect from 14.63.196.175 port 43350:11: Bye Bye [preauth] Feb 13 02:46:22.577995 sshd[2358]: Disconnected from authenticating user root 14.63.196.175 port 43350 [preauth] Feb 13 02:46:22.580442 systemd[1]: sshd@74-147.75.90.7:22-14.63.196.175:43350.service: Deactivated successfully. Feb 13 02:46:22.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-14.63.196.175:43350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:22.671631 kernel: audit: type=1131 audit(1707792382.580:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.7:22-14.63.196.175:43350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:22.875572 sshd[2362]: Connection closed by invalid user mysql 220.249.78.130 port 39717 [preauth] Feb 13 02:46:22.878136 systemd[1]: sshd@75-147.75.90.7:22-220.249.78.130:39717.service: Deactivated successfully. Feb 13 02:46:22.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.90.7:22-220.249.78.130:39717 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:22.976803 kernel: audit: type=1131 audit(1707792382.877:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.90.7:22-220.249.78.130:39717 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:35.030112 systemd[1]: Started sshd@76-147.75.90.7:22-23.96.17.95:56964.service. Feb 13 02:46:35.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.90.7:22-23.96.17.95:56964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:35.122656 kernel: audit: type=1130 audit(1707792395.029:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.90.7:22-23.96.17.95:56964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:35.485472 sshd[2368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:46:35.485000 audit[2368]: USER_AUTH pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:46:35.577761 kernel: audit: type=1100 audit(1707792395.485:387): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:46:36.927693 sshd[2368]: Failed password for root from 23.96.17.95 port 56964 ssh2 Feb 13 02:46:38.449522 sshd[2368]: Received disconnect from 23.96.17.95 port 56964:11: Bye Bye [preauth] Feb 13 02:46:38.449522 sshd[2368]: Disconnected from authenticating user root 23.96.17.95 port 56964 [preauth] Feb 13 02:46:38.452103 systemd[1]: sshd@76-147.75.90.7:22-23.96.17.95:56964.service: Deactivated successfully. Feb 13 02:46:38.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.90.7:22-23.96.17.95:56964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:38.545597 kernel: audit: type=1131 audit(1707792398.451:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.90.7:22-23.96.17.95:56964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:42.350407 systemd[1]: Started sshd@77-147.75.90.7:22-177.32.66.110:36944.service. Feb 13 02:46:42.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.90.7:22-177.32.66.110:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:42.442634 kernel: audit: type=1130 audit(1707792402.349:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.90.7:22-177.32.66.110:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:43.464843 sshd[2373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.66.110 user=root Feb 13 02:46:43.464000 audit[2373]: USER_AUTH pid=2373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:46:43.556649 kernel: audit: type=1100 audit(1707792403.464:390): pid=2373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:46:44.799925 systemd[1]: Started sshd@78-147.75.90.7:22-46.102.130.37:38686.service. Feb 13 02:46:44.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.90.7:22-46.102.130.37:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:44.892790 kernel: audit: type=1130 audit(1707792404.799:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.90.7:22-46.102.130.37:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:45.338529 sshd[2373]: Failed password for root from 177.32.66.110 port 36944 ssh2 Feb 13 02:46:46.014096 sshd[2376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:46:46.013000 audit[2376]: USER_AUTH pid=2376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:46:46.106776 kernel: audit: type=1100 audit(1707792406.013:392): pid=2376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:46:46.316731 systemd[1]: Started sshd@79-147.75.90.7:22-170.106.178.136:35996.service. Feb 13 02:46:46.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-170.106.178.136:35996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:46.409659 kernel: audit: type=1130 audit(1707792406.316:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-170.106.178.136:35996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:46.495488 sshd[2379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:46:46.495000 audit[2379]: USER_AUTH pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:46:46.590652 kernel: audit: type=1100 audit(1707792406.495:394): pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:46:46.622160 sshd[2373]: Received disconnect from 177.32.66.110 port 36944:11: Bye Bye [preauth] Feb 13 02:46:46.622160 sshd[2373]: Disconnected from authenticating user root 177.32.66.110 port 36944 [preauth] Feb 13 02:46:46.622766 systemd[1]: sshd@77-147.75.90.7:22-177.32.66.110:36944.service: Deactivated successfully. Feb 13 02:46:46.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.90.7:22-177.32.66.110:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:46.715795 kernel: audit: type=1131 audit(1707792406.622:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.90.7:22-177.32.66.110:36944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:48.299169 sshd[2376]: Failed password for root from 46.102.130.37 port 38686 ssh2 Feb 13 02:46:48.780727 sshd[2379]: Failed password for root from 170.106.178.136 port 35996 ssh2 Feb 13 02:46:49.119103 sshd[2376]: Received disconnect from 46.102.130.37 port 38686:11: Bye Bye [preauth] Feb 13 02:46:49.119103 sshd[2376]: Disconnected from authenticating user root 46.102.130.37 port 38686 [preauth] Feb 13 02:46:49.121530 systemd[1]: sshd@78-147.75.90.7:22-46.102.130.37:38686.service: Deactivated successfully. Feb 13 02:46:49.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.90.7:22-46.102.130.37:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:49.214644 kernel: audit: type=1131 audit(1707792409.121:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.90.7:22-46.102.130.37:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:49.390805 sshd[2379]: Received disconnect from 170.106.178.136 port 35996:11: Bye Bye [preauth] Feb 13 02:46:49.390805 sshd[2379]: Disconnected from authenticating user root 170.106.178.136 port 35996 [preauth] Feb 13 02:46:49.393280 systemd[1]: sshd@79-147.75.90.7:22-170.106.178.136:35996.service: Deactivated successfully. Feb 13 02:46:49.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-170.106.178.136:35996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:49.487791 kernel: audit: type=1131 audit(1707792409.393:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.90.7:22-170.106.178.136:35996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:51.281378 systemd[1]: Started sshd@80-147.75.90.7:22-101.42.157.74:49404.service. Feb 13 02:46:51.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-101.42.157.74:49404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:51.373656 kernel: audit: type=1130 audit(1707792411.280:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-101.42.157.74:49404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:17.329831 systemd[1]: Started sshd@81-147.75.90.7:22-83.12.113.122:48970.service. Feb 13 02:47:17.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-83.12.113.122:48970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:17.422706 kernel: audit: type=1130 audit(1707792437.328:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-83.12.113.122:48970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:18.403817 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:47:18.402000 audit[2388]: USER_AUTH pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:47:18.496639 kernel: audit: type=1100 audit(1707792438.402:400): pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:47:20.081996 sshd[2388]: Failed password for root from 83.12.113.122 port 48970 ssh2 Feb 13 02:47:21.478442 sshd[2388]: Received disconnect from 83.12.113.122 port 48970:11: Bye Bye [preauth] Feb 13 02:47:21.478442 sshd[2388]: Disconnected from authenticating user root 83.12.113.122 port 48970 [preauth] Feb 13 02:47:21.480917 systemd[1]: sshd@81-147.75.90.7:22-83.12.113.122:48970.service: Deactivated successfully. Feb 13 02:47:21.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-83.12.113.122:48970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:21.574795 kernel: audit: type=1131 audit(1707792441.479:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.90.7:22-83.12.113.122:48970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:35.970825 systemd[1]: Started sshd@82-147.75.90.7:22-23.96.17.95:42808.service. Feb 13 02:47:35.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-23.96.17.95:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:36.063666 kernel: audit: type=1130 audit(1707792455.970:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-23.96.17.95:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:36.609963 sshd[2395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:47:36.609000 audit[2395]: USER_AUTH pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:47:36.702782 kernel: audit: type=1100 audit(1707792456.609:403): pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:47:38.759750 sshd[2395]: Failed password for root from 23.96.17.95 port 42808 ssh2 Feb 13 02:47:39.606192 sshd[2395]: Received disconnect from 23.96.17.95 port 42808:11: Bye Bye [preauth] Feb 13 02:47:39.606192 sshd[2395]: Disconnected from authenticating user root 23.96.17.95 port 42808 [preauth] Feb 13 02:47:39.608694 systemd[1]: sshd@82-147.75.90.7:22-23.96.17.95:42808.service: Deactivated successfully. Feb 13 02:47:39.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-23.96.17.95:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:39.701650 kernel: audit: type=1131 audit(1707792459.608:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.90.7:22-23.96.17.95:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:39.743274 systemd[1]: Started sshd@83-147.75.90.7:22-170.106.178.136:54826.service. Feb 13 02:47:39.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.90.7:22-170.106.178.136:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:39.835788 kernel: audit: type=1130 audit(1707792459.742:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.90.7:22-170.106.178.136:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:39.908720 sshd[2399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:47:39.908000 audit[2399]: USER_AUTH pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:47:40.000775 kernel: audit: type=1100 audit(1707792459.908:406): pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:47:40.899346 systemd[1]: Started sshd@84-147.75.90.7:22-46.102.130.37:42218.service. Feb 13 02:47:40.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-46.102.130.37:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:40.992797 kernel: audit: type=1130 audit(1707792460.898:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-46.102.130.37:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:41.801971 sshd[2399]: Failed password for root from 170.106.178.136 port 54826 ssh2 Feb 13 02:47:42.124646 sshd[2402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:47:42.124000 audit[2402]: USER_AUTH pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:47:42.217791 kernel: audit: type=1100 audit(1707792462.124:408): pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:47:42.804836 sshd[2399]: Received disconnect from 170.106.178.136 port 54826:11: Bye Bye [preauth] Feb 13 02:47:42.804836 sshd[2399]: Disconnected from authenticating user root 170.106.178.136 port 54826 [preauth] Feb 13 02:47:42.807274 systemd[1]: sshd@83-147.75.90.7:22-170.106.178.136:54826.service: Deactivated successfully. Feb 13 02:47:42.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.90.7:22-170.106.178.136:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:42.900626 kernel: audit: type=1131 audit(1707792462.807:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.90.7:22-170.106.178.136:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:43.762881 sshd[2402]: Failed password for root from 46.102.130.37 port 42218 ssh2 Feb 13 02:47:45.233340 sshd[2402]: Received disconnect from 46.102.130.37 port 42218:11: Bye Bye [preauth] Feb 13 02:47:45.233340 sshd[2402]: Disconnected from authenticating user root 46.102.130.37 port 42218 [preauth] Feb 13 02:47:45.235823 systemd[1]: sshd@84-147.75.90.7:22-46.102.130.37:42218.service: Deactivated successfully. Feb 13 02:47:45.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-46.102.130.37:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:45.328782 kernel: audit: type=1131 audit(1707792465.235:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.90.7:22-46.102.130.37:42218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:04.177437 systemd[1]: Started sshd@85-147.75.90.7:22-177.32.66.110:55972.service. Feb 13 02:48:04.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.90.7:22-177.32.66.110:55972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:04.270797 kernel: audit: type=1130 audit(1707792484.176:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.90.7:22-177.32.66.110:55972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:05.249854 sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.66.110 user=root Feb 13 02:48:05.249000 audit[2408]: USER_AUTH pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:48:05.342769 kernel: audit: type=1100 audit(1707792485.249:412): pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:48:06.711963 sshd[2408]: Failed password for root from 177.32.66.110 port 55972 ssh2 Feb 13 02:48:08.347409 sshd[2408]: Received disconnect from 177.32.66.110 port 55972:11: Bye Bye [preauth] Feb 13 02:48:08.347409 sshd[2408]: Disconnected from authenticating user root 177.32.66.110 port 55972 [preauth] Feb 13 02:48:08.349922 systemd[1]: sshd@85-147.75.90.7:22-177.32.66.110:55972.service: Deactivated successfully. Feb 13 02:48:08.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.90.7:22-177.32.66.110:55972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:08.443807 kernel: audit: type=1131 audit(1707792488.349:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.90.7:22-177.32.66.110:55972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:22.795566 systemd[1]: Started sshd@86-147.75.90.7:22-83.12.113.122:39850.service. Feb 13 02:48:22.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-83.12.113.122:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:22.888771 kernel: audit: type=1130 audit(1707792502.795:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-83.12.113.122:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:23.862182 sshd[2412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:48:23.861000 audit[2412]: USER_AUTH pid=2412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:48:23.955783 kernel: audit: type=1100 audit(1707792503.861:415): pid=2412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:48:25.464695 sshd[2412]: Failed password for root from 83.12.113.122 port 39850 ssh2 Feb 13 02:48:26.946087 sshd[2412]: Received disconnect from 83.12.113.122 port 39850:11: Bye Bye [preauth] Feb 13 02:48:26.946087 sshd[2412]: Disconnected from authenticating user root 83.12.113.122 port 39850 [preauth] Feb 13 02:48:26.948562 systemd[1]: sshd@86-147.75.90.7:22-83.12.113.122:39850.service: Deactivated successfully. Feb 13 02:48:26.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-83.12.113.122:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:27.040635 kernel: audit: type=1131 audit(1707792506.948:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.90.7:22-83.12.113.122:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:31.612518 systemd[1]: Started sshd@87-147.75.90.7:22-101.42.157.74:49536.service. Feb 13 02:48:31.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.90.7:22-101.42.157.74:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:31.704767 kernel: audit: type=1130 audit(1707792511.611:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.90.7:22-101.42.157.74:49536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:33.976182 systemd[1]: Started sshd@88-147.75.90.7:22-170.106.178.136:45418.service. Feb 13 02:48:33.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-170.106.178.136:45418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:34.068594 kernel: audit: type=1130 audit(1707792513.974:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-170.106.178.136:45418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:34.144454 sshd[2418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:48:34.142000 audit[2418]: USER_AUTH pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:48:34.236673 kernel: audit: type=1100 audit(1707792514.142:419): pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:48:36.589796 sshd[2418]: Failed password for root from 170.106.178.136 port 45418 ssh2 Feb 13 02:48:37.043449 sshd[2418]: Received disconnect from 170.106.178.136 port 45418:11: Bye Bye [preauth] Feb 13 02:48:37.043449 sshd[2418]: Disconnected from authenticating user root 170.106.178.136 port 45418 [preauth] Feb 13 02:48:37.045838 systemd[1]: sshd@88-147.75.90.7:22-170.106.178.136:45418.service: Deactivated successfully. Feb 13 02:48:37.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-170.106.178.136:45418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:37.107559 systemd[1]: Started sshd@89-147.75.90.7:22-46.102.130.37:56802.service. Feb 13 02:48:37.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-46.102.130.37:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:37.230254 kernel: audit: type=1131 audit(1707792517.044:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.90.7:22-170.106.178.136:45418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:37.230290 kernel: audit: type=1130 audit(1707792517.106:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-46.102.130.37:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:38.385555 sshd[2422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:48:38.384000 audit[2422]: USER_AUTH pid=2422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:48:38.477635 kernel: audit: type=1100 audit(1707792518.384:422): pid=2422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:48:40.379829 sshd[2422]: Failed password for root from 46.102.130.37 port 56802 ssh2 Feb 13 02:48:41.128045 systemd[1]: Started sshd@90-147.75.90.7:22-23.96.17.95:39482.service. Feb 13 02:48:41.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-23.96.17.95:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:41.219638 kernel: audit: type=1130 audit(1707792521.126:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-23.96.17.95:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:41.501789 sshd[2422]: Received disconnect from 46.102.130.37 port 56802:11: Bye Bye [preauth] Feb 13 02:48:41.501789 sshd[2422]: Disconnected from authenticating user root 46.102.130.37 port 56802 [preauth] Feb 13 02:48:41.504183 systemd[1]: sshd@89-147.75.90.7:22-46.102.130.37:56802.service: Deactivated successfully. Feb 13 02:48:41.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-46.102.130.37:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:41.603814 kernel: audit: type=1131 audit(1707792521.503:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.90.7:22-46.102.130.37:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:41.688378 sshd[2425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:48:41.686000 audit[2425]: USER_AUTH pid=2425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:48:41.781780 kernel: audit: type=1100 audit(1707792521.686:425): pid=2425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:48:43.762578 sshd[2425]: Failed password for root from 23.96.17.95 port 39482 ssh2 Feb 13 02:48:44.651500 sshd[2425]: Received disconnect from 23.96.17.95 port 39482:11: Bye Bye [preauth] Feb 13 02:48:44.651500 sshd[2425]: Disconnected from authenticating user root 23.96.17.95 port 39482 [preauth] Feb 13 02:48:44.653955 systemd[1]: sshd@90-147.75.90.7:22-23.96.17.95:39482.service: Deactivated successfully. Feb 13 02:48:44.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-23.96.17.95:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:44.746786 kernel: audit: type=1131 audit(1707792524.652:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.90.7:22-23.96.17.95:39482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:51.286716 sshd[2386]: Timeout before authentication for 101.42.157.74 port 49404 Feb 13 02:48:51.288141 systemd[1]: sshd@80-147.75.90.7:22-101.42.157.74:49404.service: Deactivated successfully. Feb 13 02:48:51.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-101.42.157.74:49404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:51.381830 kernel: audit: type=1131 audit(1707792531.286:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.90.7:22-101.42.157.74:49404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:48:56.284492 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:48:56.283Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1912} Feb 13 02:48:56.302159 etcd-wrapper[1704]: {"level":"info","ts":"2024-02-13T02:48:56.301Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1912,"took":"16.944827ms"} Feb 13 02:49:05.920621 systemd[1]: Started sshd@91-147.75.90.7:22-14.63.196.175:46052.service. Feb 13 02:49:05.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-14.63.196.175:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:06.012604 kernel: audit: type=1130 audit(1707792545.919:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-14.63.196.175:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:08.404761 sshd[2431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.196.175 user=root Feb 13 02:49:08.403000 audit[2431]: USER_AUTH pid=2431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:49:08.497641 kernel: audit: type=1100 audit(1707792548.403:429): pid=2431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.63.196.175 addr=14.63.196.175 terminal=ssh res=failed' Feb 13 02:49:10.850726 sshd[2431]: Failed password for root from 14.63.196.175 port 46052 ssh2 Feb 13 02:49:11.428261 sshd[2431]: Received disconnect from 14.63.196.175 port 46052:11: Bye Bye [preauth] Feb 13 02:49:11.428261 sshd[2431]: Disconnected from authenticating user root 14.63.196.175 port 46052 [preauth] Feb 13 02:49:11.430757 systemd[1]: sshd@91-147.75.90.7:22-14.63.196.175:46052.service: Deactivated successfully. Feb 13 02:49:11.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-14.63.196.175:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:11.524790 kernel: audit: type=1131 audit(1707792551.429:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.90.7:22-14.63.196.175:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:25.477838 systemd[1]: Started sshd@92-147.75.90.7:22-177.32.66.110:46776.service. Feb 13 02:49:25.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.90.7:22-177.32.66.110:46776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:25.570592 kernel: audit: type=1130 audit(1707792565.476:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.90.7:22-177.32.66.110:46776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:26.572682 sshd[2435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.66.110 user=root Feb 13 02:49:26.571000 audit[2435]: USER_AUTH pid=2435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:49:26.665666 kernel: audit: type=1100 audit(1707792566.571:432): pid=2435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=177.32.66.110 addr=177.32.66.110 terminal=ssh res=failed' Feb 13 02:49:29.158703 sshd[2435]: Failed password for root from 177.32.66.110 port 46776 ssh2 Feb 13 02:49:29.314927 systemd[1]: Started sshd@93-147.75.90.7:22-170.106.178.136:36008.service. Feb 13 02:49:29.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-170.106.178.136:36008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:29.408593 kernel: audit: type=1130 audit(1707792569.313:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-170.106.178.136:36008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:29.493056 sshd[2438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.178.136 user=root Feb 13 02:49:29.491000 audit[2438]: USER_AUTH pid=2438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:49:29.584758 kernel: audit: type=1100 audit(1707792569.491:434): pid=2438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.106.178.136 addr=170.106.178.136 terminal=ssh res=failed' Feb 13 02:49:29.677794 sshd[2435]: Received disconnect from 177.32.66.110 port 46776:11: Bye Bye [preauth] Feb 13 02:49:29.677794 sshd[2435]: Disconnected from authenticating user root 177.32.66.110 port 46776 [preauth] Feb 13 02:49:29.679275 systemd[1]: sshd@92-147.75.90.7:22-177.32.66.110:46776.service: Deactivated successfully. Feb 13 02:49:29.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.90.7:22-177.32.66.110:46776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:29.772777 kernel: audit: type=1131 audit(1707792569.678:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.90.7:22-177.32.66.110:46776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:31.155973 sshd[2438]: Failed password for root from 170.106.178.136 port 36008 ssh2 Feb 13 02:49:32.312945 systemd[1]: Started sshd@94-147.75.90.7:22-46.102.130.37:57100.service. Feb 13 02:49:32.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.90.7:22-46.102.130.37:57100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:32.372081 systemd[1]: Started sshd@95-147.75.90.7:22-83.12.113.122:58994.service. Feb 13 02:49:32.378356 sshd[2438]: Received disconnect from 170.106.178.136 port 36008:11: Bye Bye [preauth] Feb 13 02:49:32.378356 sshd[2438]: Disconnected from authenticating user root 170.106.178.136 port 36008 [preauth] Feb 13 02:49:32.378893 systemd[1]: sshd@93-147.75.90.7:22-170.106.178.136:36008.service: Deactivated successfully. Feb 13 02:49:32.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-83.12.113.122:58994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:32.497483 kernel: audit: type=1130 audit(1707792572.311:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.90.7:22-46.102.130.37:57100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:32.497515 kernel: audit: type=1130 audit(1707792572.370:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-83.12.113.122:58994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:32.497532 kernel: audit: type=1131 audit(1707792572.378:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-170.106.178.136:36008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:32.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.90.7:22-170.106.178.136:36008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:33.454437 sshd[2445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.113.122 user=root Feb 13 02:49:33.453000 audit[2445]: USER_AUTH pid=2445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:49:33.496498 sshd[2442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.102.130.37 user=root Feb 13 02:49:33.495000 audit[2442]: USER_AUTH pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:49:33.637496 kernel: audit: type=1100 audit(1707792573.453:439): pid=2445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=83.12.113.122 addr=83.12.113.122 terminal=ssh res=failed' Feb 13 02:49:33.637529 kernel: audit: type=1100 audit(1707792573.495:440): pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.102.130.37 addr=46.102.130.37 terminal=ssh res=failed' Feb 13 02:49:35.664732 sshd[2445]: Failed password for root from 83.12.113.122 port 58994 ssh2 Feb 13 02:49:35.706205 sshd[2442]: Failed password for root from 46.102.130.37 port 57100 ssh2 Feb 13 02:49:36.531033 sshd[2445]: Received disconnect from 83.12.113.122 port 58994:11: Bye Bye [preauth] Feb 13 02:49:36.531033 sshd[2445]: Disconnected from authenticating user root 83.12.113.122 port 58994 [preauth] Feb 13 02:49:36.533462 systemd[1]: sshd@95-147.75.90.7:22-83.12.113.122:58994.service: Deactivated successfully. Feb 13 02:49:36.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-83.12.113.122:58994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:36.595688 sshd[2442]: Received disconnect from 46.102.130.37 port 57100:11: Bye Bye [preauth] Feb 13 02:49:36.595688 sshd[2442]: Disconnected from authenticating user root 46.102.130.37 port 57100 [preauth] Feb 13 02:49:36.596173 systemd[1]: sshd@94-147.75.90.7:22-46.102.130.37:57100.service: Deactivated successfully. Feb 13 02:49:36.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.90.7:22-46.102.130.37:57100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:36.718669 kernel: audit: type=1131 audit(1707792576.533:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.90.7:22-83.12.113.122:58994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:36.718704 kernel: audit: type=1131 audit(1707792576.595:442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.90.7:22-46.102.130.37:57100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:48.698927 systemd[1]: Started sshd@96-147.75.90.7:22-23.96.17.95:36564.service. Feb 13 02:49:48.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.90.7:22-23.96.17.95:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:48.791679 kernel: audit: type=1130 audit(1707792588.698:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.90.7:22-23.96.17.95:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:49.157600 sshd[2454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.17.95 user=root Feb 13 02:49:49.157000 audit[2454]: USER_AUTH pid=2454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:49:49.255776 kernel: audit: type=1100 audit(1707792589.157:444): pid=2454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.96.17.95 addr=23.96.17.95 terminal=ssh res=failed' Feb 13 02:49:51.232154 sshd[2454]: Failed password for root from 23.96.17.95 port 36564 ssh2 Feb 13 02:49:52.117528 sshd[2454]: Received disconnect from 23.96.17.95 port 36564:11: Bye Bye [preauth] Feb 13 02:49:52.117528 sshd[2454]: Disconnected from authenticating user root 23.96.17.95 port 36564 [preauth] Feb 13 02:49:52.120003 systemd[1]: sshd@96-147.75.90.7:22-23.96.17.95:36564.service: Deactivated successfully. Feb 13 02:49:52.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.90.7:22-23.96.17.95:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:52.213778 kernel: audit: type=1131 audit(1707792592.119:445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.90.7:22-23.96.17.95:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'