Feb 13 04:49:57.586395 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 04:49:57.586409 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 04:49:57.586416 kernel: BIOS-provided physical RAM map: Feb 13 04:49:57.586420 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 04:49:57.586439 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 04:49:57.586442 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 04:49:57.586447 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 04:49:57.586451 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 04:49:57.586454 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cffff] usable Feb 13 04:49:57.586458 kernel: BIOS-e820: [mem 0x00000000819d0000-0x00000000819d0fff] ACPI NVS Feb 13 04:49:57.586462 kernel: BIOS-e820: [mem 0x00000000819d1000-0x00000000819d1fff] reserved Feb 13 04:49:57.586466 kernel: BIOS-e820: [mem 0x00000000819d2000-0x000000008afccfff] usable Feb 13 04:49:57.586470 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 04:49:57.586474 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 04:49:57.586478 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 04:49:57.586483 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 04:49:57.586487 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 04:49:57.586491 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 04:49:57.586495 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 04:49:57.586499 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 04:49:57.586504 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 04:49:57.586508 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 04:49:57.586512 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 04:49:57.586516 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 04:49:57.586520 kernel: NX (Execute Disable) protection: active Feb 13 04:49:57.586524 kernel: SMBIOS 3.2.1 present. Feb 13 04:49:57.586529 kernel: DMI: Supermicro Super Server/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 04:49:57.586533 kernel: tsc: Detected 3400.000 MHz processor Feb 13 04:49:57.586537 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 04:49:57.586541 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 04:49:57.586546 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 04:49:57.586550 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 04:49:57.586554 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 04:49:57.586558 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 04:49:57.586562 kernel: Using GB pages for direct mapping Feb 13 04:49:57.586567 kernel: ACPI: Early table checksum verification disabled Feb 13 04:49:57.586572 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 04:49:57.586576 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 04:49:57.586580 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 04:49:57.586584 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 04:49:57.586591 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 04:49:57.586595 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 04:49:57.586601 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 04:49:57.586605 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 04:49:57.586610 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 04:49:57.586614 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 04:49:57.586619 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 04:49:57.586623 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 04:49:57.586628 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 04:49:57.586632 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:49:57.586638 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 04:49:57.586642 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 04:49:57.586647 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:49:57.586651 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:49:57.586656 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 04:49:57.586660 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 04:49:57.586665 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:49:57.586670 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:49:57.586675 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 04:49:57.586679 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 04:49:57.586684 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 04:49:57.586688 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 04:49:57.586693 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 04:49:57.586697 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 04:49:57.586702 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 04:49:57.586707 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 04:49:57.586711 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 04:49:57.586716 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 04:49:57.586721 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 04:49:57.586725 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 04:49:57.586730 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 04:49:57.586735 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 04:49:57.586739 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 04:49:57.586743 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 04:49:57.586748 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 04:49:57.586752 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 04:49:57.586758 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 04:49:57.586762 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 04:49:57.586767 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 04:49:57.586771 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 04:49:57.586776 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 04:49:57.586780 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 04:49:57.586785 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 04:49:57.586789 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 04:49:57.586794 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 04:49:57.586799 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 04:49:57.586804 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 04:49:57.586808 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 04:49:57.586812 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 04:49:57.586817 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 04:49:57.586821 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 04:49:57.586826 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 04:49:57.586830 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 04:49:57.586836 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 04:49:57.586840 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 04:49:57.586845 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 04:49:57.586849 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 04:49:57.586854 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 04:49:57.586858 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 04:49:57.586863 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 04:49:57.586867 kernel: No NUMA configuration found Feb 13 04:49:57.586872 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 04:49:57.586876 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 04:49:57.586882 kernel: Zone ranges: Feb 13 04:49:57.586886 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 04:49:57.586891 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 04:49:57.586895 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 04:49:57.586900 kernel: Movable zone start for each node Feb 13 04:49:57.586904 kernel: Early memory node ranges Feb 13 04:49:57.586909 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 04:49:57.586913 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 04:49:57.586918 kernel: node 0: [mem 0x0000000040400000-0x00000000819cffff] Feb 13 04:49:57.586923 kernel: node 0: [mem 0x00000000819d2000-0x000000008afccfff] Feb 13 04:49:57.586928 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 04:49:57.586932 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 04:49:57.586937 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 04:49:57.586941 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 04:49:57.586946 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 04:49:57.586954 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 04:49:57.586959 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 04:49:57.586964 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 04:49:57.586969 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 04:49:57.586975 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 04:49:57.586980 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 04:49:57.586985 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 04:49:57.586989 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 04:49:57.586994 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 04:49:57.586999 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 04:49:57.587004 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 04:49:57.587010 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 04:49:57.587014 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 04:49:57.587019 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 04:49:57.587024 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 04:49:57.587029 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 04:49:57.587034 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 04:49:57.587038 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 04:49:57.587043 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 04:49:57.587048 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 04:49:57.587054 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 04:49:57.587058 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 04:49:57.587063 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 04:49:57.587068 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 04:49:57.587073 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 04:49:57.587078 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 04:49:57.587082 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 04:49:57.587087 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 04:49:57.587092 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 04:49:57.587098 kernel: TSC deadline timer available Feb 13 04:49:57.587103 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 04:49:57.587107 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 04:49:57.587112 kernel: Booting paravirtualized kernel on bare hardware Feb 13 04:49:57.587117 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 04:49:57.587122 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 04:49:57.587127 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 04:49:57.587132 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 04:49:57.587137 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 04:49:57.587142 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 04:49:57.587147 kernel: Policy zone: Normal Feb 13 04:49:57.587152 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 04:49:57.587158 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 04:49:57.587162 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 04:49:57.587167 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 04:49:57.587172 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 04:49:57.587177 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 04:49:57.587183 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 04:49:57.587188 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 04:49:57.587193 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 04:49:57.587198 kernel: rcu: Hierarchical RCU implementation. Feb 13 04:49:57.587203 kernel: rcu: RCU event tracing is enabled. Feb 13 04:49:57.587208 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 04:49:57.587213 kernel: Rude variant of Tasks RCU enabled. Feb 13 04:49:57.587218 kernel: Tracing variant of Tasks RCU enabled. Feb 13 04:49:57.587223 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 04:49:57.587228 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 04:49:57.587233 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 04:49:57.587238 kernel: random: crng init done Feb 13 04:49:57.587243 kernel: Console: colour dummy device 80x25 Feb 13 04:49:57.587247 kernel: printk: console [tty0] enabled Feb 13 04:49:57.587252 kernel: printk: console [ttyS1] enabled Feb 13 04:49:57.587257 kernel: ACPI: Core revision 20210730 Feb 13 04:49:57.587262 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 04:49:57.587267 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 04:49:57.587273 kernel: DMAR: Host address width 39 Feb 13 04:49:57.587277 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 04:49:57.587282 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 04:49:57.587287 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 04:49:57.587292 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 04:49:57.587297 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 04:49:57.587302 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 04:49:57.587307 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 04:49:57.587311 kernel: x2apic enabled Feb 13 04:49:57.587317 kernel: Switched APIC routing to cluster x2apic. Feb 13 04:49:57.587322 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 04:49:57.587327 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 04:49:57.587332 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 04:49:57.587337 kernel: process: using mwait in idle threads Feb 13 04:49:57.587342 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 04:49:57.587346 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 04:49:57.587351 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 04:49:57.587356 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 04:49:57.587362 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 04:49:57.587370 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 04:49:57.587396 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 04:49:57.587401 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 04:49:57.587406 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 04:49:57.587426 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 04:49:57.587430 kernel: TAA: Mitigation: TSX disabled Feb 13 04:49:57.587435 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 04:49:57.587440 kernel: SRBDS: Mitigation: Microcode Feb 13 04:49:57.587445 kernel: GDS: Vulnerable: No microcode Feb 13 04:49:57.587450 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 04:49:57.587455 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 04:49:57.587460 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 04:49:57.587465 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 04:49:57.587470 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 04:49:57.587474 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 04:49:57.587479 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 04:49:57.587484 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 04:49:57.587489 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 04:49:57.587494 kernel: Freeing SMP alternatives memory: 32K Feb 13 04:49:57.587498 kernel: pid_max: default: 32768 minimum: 301 Feb 13 04:49:57.587503 kernel: LSM: Security Framework initializing Feb 13 04:49:57.587508 kernel: SELinux: Initializing. Feb 13 04:49:57.587514 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 04:49:57.587518 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 04:49:57.587523 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 04:49:57.587528 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 04:49:57.587533 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 04:49:57.587538 kernel: ... version: 4 Feb 13 04:49:57.587543 kernel: ... bit width: 48 Feb 13 04:49:57.587547 kernel: ... generic registers: 4 Feb 13 04:49:57.587552 kernel: ... value mask: 0000ffffffffffff Feb 13 04:49:57.587557 kernel: ... max period: 00007fffffffffff Feb 13 04:49:57.587563 kernel: ... fixed-purpose events: 3 Feb 13 04:49:57.587568 kernel: ... event mask: 000000070000000f Feb 13 04:49:57.587572 kernel: signal: max sigframe size: 2032 Feb 13 04:49:57.587577 kernel: rcu: Hierarchical SRCU implementation. Feb 13 04:49:57.587582 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 04:49:57.587587 kernel: smp: Bringing up secondary CPUs ... Feb 13 04:49:57.587592 kernel: x86: Booting SMP configuration: Feb 13 04:49:57.587597 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 04:49:57.587602 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 04:49:57.587607 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 04:49:57.587612 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 04:49:57.587617 kernel: smpboot: Max logical packages: 1 Feb 13 04:49:57.587622 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 04:49:57.587627 kernel: devtmpfs: initialized Feb 13 04:49:57.587631 kernel: x86/mm: Memory block size: 128MB Feb 13 04:49:57.587636 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819d0000-0x819d0fff] (4096 bytes) Feb 13 04:49:57.587641 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 04:49:57.587646 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 04:49:57.587652 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 04:49:57.587657 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 04:49:57.587662 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 04:49:57.587667 kernel: audit: initializing netlink subsys (disabled) Feb 13 04:49:57.587672 kernel: audit: type=2000 audit(1707799792.040:1): state=initialized audit_enabled=0 res=1 Feb 13 04:49:57.587676 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 04:49:57.587681 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 04:49:57.587686 kernel: cpuidle: using governor menu Feb 13 04:49:57.587691 kernel: ACPI: bus type PCI registered Feb 13 04:49:57.587696 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 04:49:57.587701 kernel: dca service started, version 1.12.1 Feb 13 04:49:57.587706 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 04:49:57.587711 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 04:49:57.587716 kernel: PCI: Using configuration type 1 for base access Feb 13 04:49:57.587721 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 04:49:57.587725 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 04:49:57.587730 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 04:49:57.587736 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 04:49:57.587741 kernel: ACPI: Added _OSI(Module Device) Feb 13 04:49:57.587746 kernel: ACPI: Added _OSI(Processor Device) Feb 13 04:49:57.587750 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 04:49:57.587755 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 04:49:57.587760 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 04:49:57.587765 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 04:49:57.587770 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 04:49:57.587775 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 04:49:57.587780 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:49:57.587785 kernel: ACPI: SSDT 0xFFFFA01CC0213900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 04:49:57.587790 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 04:49:57.587795 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:49:57.587800 kernel: ACPI: SSDT 0xFFFFA01CC1AE6C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 04:49:57.587805 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:49:57.587809 kernel: ACPI: SSDT 0xFFFFA01CC1A58000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 04:49:57.587814 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:49:57.587819 kernel: ACPI: SSDT 0xFFFFA01CC1A5B800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 04:49:57.587824 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:49:57.587829 kernel: ACPI: SSDT 0xFFFFA01CC014B000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 04:49:57.587834 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:49:57.587839 kernel: ACPI: SSDT 0xFFFFA01CC1AE2400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 04:49:57.587844 kernel: ACPI: Interpreter enabled Feb 13 04:49:57.587849 kernel: ACPI: PM: (supports S0 S5) Feb 13 04:49:57.587853 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 04:49:57.587858 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 04:49:57.587863 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 04:49:57.587868 kernel: HEST: Table parsing has been initialized. Feb 13 04:49:57.587874 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 04:49:57.587879 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 04:49:57.587883 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 04:49:57.587888 kernel: ACPI: PM: Power Resource [USBC] Feb 13 04:49:57.587893 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 04:49:57.587898 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 04:49:57.587903 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 04:49:57.587907 kernel: ACPI: PM: Power Resource [WRST] Feb 13 04:49:57.587912 kernel: ACPI: PM: Power Resource [FN00] Feb 13 04:49:57.587917 kernel: ACPI: PM: Power Resource [FN01] Feb 13 04:49:57.587923 kernel: ACPI: PM: Power Resource [FN02] Feb 13 04:49:57.587927 kernel: ACPI: PM: Power Resource [FN03] Feb 13 04:49:57.587932 kernel: ACPI: PM: Power Resource [FN04] Feb 13 04:49:57.587937 kernel: ACPI: PM: Power Resource [PIN] Feb 13 04:49:57.587942 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 04:49:57.588003 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 04:49:57.588048 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 04:49:57.588091 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 04:49:57.588099 kernel: PCI host bridge to bus 0000:00 Feb 13 04:49:57.588142 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 04:49:57.588179 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 04:49:57.588216 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 04:49:57.588253 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 04:49:57.588288 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 04:49:57.588327 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 04:49:57.588402 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 04:49:57.588468 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 04:49:57.588511 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.588557 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 04:49:57.588599 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 04:49:57.588645 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 04:49:57.588688 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 04:49:57.588735 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 04:49:57.588778 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 04:49:57.588836 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 04:49:57.588883 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 04:49:57.588928 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 04:49:57.588971 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 04:49:57.589019 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 04:49:57.589063 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 04:49:57.589114 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 04:49:57.589158 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 04:49:57.589206 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 04:49:57.589251 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 04:49:57.589294 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 04:49:57.589342 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 04:49:57.589390 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 04:49:57.589435 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 04:49:57.589480 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 04:49:57.589527 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 04:49:57.589569 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 04:49:57.589616 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 04:49:57.589659 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 04:49:57.589701 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 04:49:57.589745 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 04:49:57.589788 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 04:49:57.589839 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 04:49:57.589884 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 04:49:57.589927 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 04:49:57.589974 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 04:49:57.590018 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.590068 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 04:49:57.590112 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.590162 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 04:49:57.590206 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.590254 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 04:49:57.590298 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.590347 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 04:49:57.590399 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.590447 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 04:49:57.590492 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 04:49:57.590542 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 04:49:57.590594 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 04:49:57.590639 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 04:49:57.590682 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 04:49:57.590730 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 04:49:57.590774 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 04:49:57.590825 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 04:49:57.590870 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 04:49:57.590918 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 04:49:57.590963 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 04:49:57.591008 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 04:49:57.591053 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 04:49:57.591103 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 04:49:57.591148 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 04:49:57.591196 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 04:49:57.591241 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 04:49:57.591286 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 04:49:57.591331 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 04:49:57.591379 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 04:49:57.591423 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 04:49:57.591467 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 04:49:57.591511 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 04:49:57.591562 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 04:49:57.591609 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 04:49:57.591654 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 04:49:57.591699 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 04:49:57.591743 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.591787 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 04:49:57.591830 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 04:49:57.591874 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 04:49:57.591925 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 04:49:57.591970 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 04:49:57.592015 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 04:49:57.592060 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 04:49:57.592106 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 04:49:57.592150 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 04:49:57.592194 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 04:49:57.592239 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 04:49:57.592284 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 04:49:57.592337 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 04:49:57.592390 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 04:49:57.592439 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 04:49:57.592484 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 04:49:57.592530 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 04:49:57.592574 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 04:49:57.592620 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:49:57.592669 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 04:49:57.592722 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 04:49:57.592771 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 04:49:57.592819 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 04:49:57.592866 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 04:49:57.592914 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 04:49:57.592963 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 04:49:57.593011 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 04:49:57.593056 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 04:49:57.593101 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 04:49:57.593146 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:49:57.593154 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 04:49:57.593160 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 04:49:57.593166 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 04:49:57.593173 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 04:49:57.593178 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 04:49:57.593184 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 04:49:57.593189 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 04:49:57.593195 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 04:49:57.593200 kernel: iommu: Default domain type: Translated Feb 13 04:49:57.593206 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 04:49:57.593252 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 04:49:57.593301 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 04:49:57.593348 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 04:49:57.593356 kernel: vgaarb: loaded Feb 13 04:49:57.593362 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 04:49:57.593372 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 04:49:57.593378 kernel: PTP clock support registered Feb 13 04:49:57.593383 kernel: PCI: Using ACPI for IRQ routing Feb 13 04:49:57.593389 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 04:49:57.593394 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 04:49:57.593401 kernel: e820: reserve RAM buffer [mem 0x819d0000-0x83ffffff] Feb 13 04:49:57.593406 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 04:49:57.593412 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 04:49:57.593417 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 04:49:57.593422 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 04:49:57.593428 kernel: clocksource: Switched to clocksource tsc-early Feb 13 04:49:57.593433 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 04:49:57.593439 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 04:49:57.593445 kernel: pnp: PnP ACPI init Feb 13 04:49:57.593492 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 04:49:57.593537 kernel: pnp 00:02: [dma 0 disabled] Feb 13 04:49:57.593581 kernel: pnp 00:03: [dma 0 disabled] Feb 13 04:49:57.593625 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 04:49:57.593666 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 04:49:57.593709 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 04:49:57.593754 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 04:49:57.593794 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 04:49:57.593833 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 04:49:57.593871 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 04:49:57.593910 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 04:49:57.593949 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 04:49:57.593987 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 04:49:57.594028 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 04:49:57.594071 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 04:49:57.594111 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 04:49:57.594149 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 04:49:57.594188 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 04:49:57.594226 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 04:49:57.594264 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 04:49:57.594306 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 04:49:57.594348 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 04:49:57.594356 kernel: pnp: PnP ACPI: found 10 devices Feb 13 04:49:57.594362 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 04:49:57.594372 kernel: NET: Registered PF_INET protocol family Feb 13 04:49:57.594377 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 04:49:57.594383 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 04:49:57.594389 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 04:49:57.594396 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 04:49:57.594402 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 04:49:57.594407 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 04:49:57.594413 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 04:49:57.594418 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 04:49:57.594424 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 04:49:57.594429 kernel: NET: Registered PF_XDP protocol family Feb 13 04:49:57.594477 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 04:49:57.594522 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 04:49:57.594568 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 04:49:57.594614 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 04:49:57.594661 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 04:49:57.594706 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 04:49:57.594751 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 04:49:57.594797 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 04:49:57.594840 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 04:49:57.594887 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 04:49:57.594931 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 04:49:57.594976 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 04:49:57.595019 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 04:49:57.595064 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 04:49:57.595110 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 04:49:57.595153 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 04:49:57.595197 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 04:49:57.595241 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 04:49:57.595287 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 04:49:57.595331 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 04:49:57.595385 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:49:57.595429 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 04:49:57.595475 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 04:49:57.595520 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:49:57.595560 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 04:49:57.595600 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 04:49:57.595638 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 04:49:57.595676 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 04:49:57.595714 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 04:49:57.595752 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 04:49:57.595798 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 04:49:57.595841 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 04:49:57.595888 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 04:49:57.595929 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 04:49:57.595973 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 04:49:57.596013 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 04:49:57.596058 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 04:49:57.596101 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 04:49:57.596144 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 04:49:57.596187 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 04:49:57.596195 kernel: PCI: CLS 64 bytes, default 64 Feb 13 04:49:57.596201 kernel: DMAR: No ATSR found Feb 13 04:49:57.596207 kernel: DMAR: No SATC found Feb 13 04:49:57.596212 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 04:49:57.596258 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 04:49:57.596306 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 04:49:57.596350 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 04:49:57.596399 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 04:49:57.596443 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 04:49:57.596487 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 04:49:57.596531 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 04:49:57.596574 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 04:49:57.596617 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 04:49:57.596663 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 04:49:57.596706 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 04:49:57.596750 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 04:49:57.596794 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 04:49:57.596838 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 04:49:57.596881 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 04:49:57.596925 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 04:49:57.596969 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 04:49:57.597014 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 04:49:57.597058 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 04:49:57.597102 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 04:49:57.597146 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 04:49:57.597192 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 04:49:57.597237 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 04:49:57.597282 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 04:49:57.597329 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 04:49:57.597381 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 04:49:57.597431 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 04:49:57.597439 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 04:49:57.597445 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 04:49:57.597451 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 04:49:57.597456 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 04:49:57.597462 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 04:49:57.597467 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 04:49:57.597474 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 04:49:57.597521 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 04:49:57.597530 kernel: Initialise system trusted keyrings Feb 13 04:49:57.597535 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 04:49:57.597541 kernel: Key type asymmetric registered Feb 13 04:49:57.597547 kernel: Asymmetric key parser 'x509' registered Feb 13 04:49:57.597552 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 04:49:57.597558 kernel: io scheduler mq-deadline registered Feb 13 04:49:57.597565 kernel: io scheduler kyber registered Feb 13 04:49:57.597570 kernel: io scheduler bfq registered Feb 13 04:49:57.597615 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 04:49:57.597659 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 04:49:57.597704 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 04:49:57.597747 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 04:49:57.597792 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 04:49:57.597836 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 04:49:57.597890 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 04:49:57.597899 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 04:49:57.597904 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 04:49:57.597910 kernel: pstore: Registered erst as persistent store backend Feb 13 04:49:57.597916 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 04:49:57.597921 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 04:49:57.597927 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 04:49:57.597932 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 04:49:57.597939 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 04:49:57.597984 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 04:49:57.597992 kernel: i8042: PNP: No PS/2 controller found. Feb 13 04:49:57.598031 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 04:49:57.598072 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 04:49:57.598112 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T04:49:56 UTC (1707799796) Feb 13 04:49:57.598152 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 04:49:57.598160 kernel: fail to initialize ptp_kvm Feb 13 04:49:57.598167 kernel: intel_pstate: Intel P-state driver initializing Feb 13 04:49:57.598173 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 04:49:57.598178 kernel: intel_pstate: HWP enabled Feb 13 04:49:57.598184 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 04:49:57.598190 kernel: vesafb: scrolling: redraw Feb 13 04:49:57.598195 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 04:49:57.598201 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000000146fb74, using 768k, total 768k Feb 13 04:49:57.598206 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 04:49:57.598212 kernel: fb0: VESA VGA frame buffer device Feb 13 04:49:57.598218 kernel: NET: Registered PF_INET6 protocol family Feb 13 04:49:57.598224 kernel: Segment Routing with IPv6 Feb 13 04:49:57.598229 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 04:49:57.598235 kernel: NET: Registered PF_PACKET protocol family Feb 13 04:49:57.598241 kernel: Key type dns_resolver registered Feb 13 04:49:57.598246 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 04:49:57.598252 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 04:49:57.598257 kernel: IPI shorthand broadcast: enabled Feb 13 04:49:57.598263 kernel: sched_clock: Marking stable (1735632955, 1334578218)->(4489093605, -1418882432) Feb 13 04:49:57.598269 kernel: registered taskstats version 1 Feb 13 04:49:57.598275 kernel: Loading compiled-in X.509 certificates Feb 13 04:49:57.598280 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 04:49:57.598286 kernel: Key type .fscrypt registered Feb 13 04:49:57.598291 kernel: Key type fscrypt-provisioning registered Feb 13 04:49:57.598297 kernel: pstore: Using crash dump compression: deflate Feb 13 04:49:57.598303 kernel: ima: Allocated hash algorithm: sha1 Feb 13 04:49:57.598308 kernel: ima: No architecture policies found Feb 13 04:49:57.598314 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 04:49:57.598320 kernel: Write protecting the kernel read-only data: 28672k Feb 13 04:49:57.598326 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 04:49:57.598331 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 04:49:57.598337 kernel: Run /init as init process Feb 13 04:49:57.598343 kernel: with arguments: Feb 13 04:49:57.598348 kernel: /init Feb 13 04:49:57.598353 kernel: with environment: Feb 13 04:49:57.598359 kernel: HOME=/ Feb 13 04:49:57.598367 kernel: TERM=linux Feb 13 04:49:57.598374 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 04:49:57.598381 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 04:49:57.598388 systemd[1]: Detected architecture x86-64. Feb 13 04:49:57.598394 systemd[1]: Running in initrd. Feb 13 04:49:57.598399 systemd[1]: No hostname configured, using default hostname. Feb 13 04:49:57.598405 systemd[1]: Hostname set to . Feb 13 04:49:57.598411 systemd[1]: Initializing machine ID from random generator. Feb 13 04:49:57.598418 systemd[1]: Queued start job for default target initrd.target. Feb 13 04:49:57.598423 systemd[1]: Started systemd-ask-password-console.path. Feb 13 04:49:57.598429 systemd[1]: Reached target cryptsetup.target. Feb 13 04:49:57.598435 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 13 04:49:57.598441 systemd[1]: Reached target paths.target. Feb 13 04:49:57.598446 systemd[1]: Reached target slices.target. Feb 13 04:49:57.598452 systemd[1]: Reached target swap.target. Feb 13 04:49:57.598458 systemd[1]: Reached target timers.target. Feb 13 04:49:57.598465 systemd[1]: Listening on iscsid.socket. Feb 13 04:49:57.598470 systemd[1]: Listening on iscsiuio.socket. Feb 13 04:49:57.598476 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 04:49:57.598482 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 04:49:57.598487 kernel: tsc: Refined TSC clocksource calibration: 3408.002 MHz Feb 13 04:49:57.598493 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd628962, max_idle_ns: 440795345332 ns Feb 13 04:49:57.598499 kernel: clocksource: Switched to clocksource tsc Feb 13 04:49:57.598504 systemd[1]: Listening on systemd-journald.socket. Feb 13 04:49:57.598511 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 04:49:57.598517 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 04:49:57.598522 systemd[1]: Reached target sockets.target. Feb 13 04:49:57.598528 systemd[1]: Starting iscsiuio.service... Feb 13 04:49:57.598534 systemd[1]: Starting kmod-static-nodes.service... Feb 13 04:49:57.598539 kernel: SCSI subsystem initialized Feb 13 04:49:57.598545 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 04:49:57.598551 kernel: Loading iSCSI transport class v2.0-870. Feb 13 04:49:57.598556 systemd[1]: Starting systemd-journald.service... Feb 13 04:49:57.598563 systemd[1]: Starting systemd-modules-load.service... Feb 13 04:49:57.598571 systemd-journald[268]: Journal started Feb 13 04:49:57.598599 systemd-journald[268]: Runtime Journal (/run/log/journal/1748bdc54c834eb3b327f4a6753e5129) is 8.0M, max 640.1M, 632.1M free. Feb 13 04:49:57.600540 systemd-modules-load[269]: Inserted module 'overlay' Feb 13 04:49:57.624371 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 04:49:57.657401 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 04:49:57.657417 systemd[1]: Started iscsiuio.service. Feb 13 04:49:57.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.682434 kernel: Bridge firewalling registered Feb 13 04:49:57.682449 kernel: audit: type=1130 audit(1707799797.681:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.682457 systemd[1]: Started systemd-journald.service. Feb 13 04:49:57.741228 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 13 04:49:57.901921 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 04:49:57.901953 kernel: audit: type=1130 audit(1707799797.759:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.901982 kernel: device-mapper: uevent: version 1.0.3 Feb 13 04:49:57.902007 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 04:49:57.902030 kernel: audit: type=1130 audit(1707799797.846:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.759693 systemd[1]: Finished kmod-static-nodes.service. Feb 13 04:49:57.954930 kernel: audit: type=1130 audit(1707799797.910:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.847057 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 04:49:58.008109 kernel: audit: type=1130 audit(1707799797.963:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.904206 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 13 04:49:58.062461 kernel: audit: type=1130 audit(1707799798.016:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:57.910762 systemd[1]: Finished systemd-modules-load.service. Feb 13 04:49:57.963673 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 04:49:58.016947 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 04:49:58.062837 systemd[1]: Starting systemd-sysctl.service... Feb 13 04:49:58.063120 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 04:49:58.065875 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 04:49:58.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.066549 systemd[1]: Finished systemd-sysctl.service. Feb 13 04:49:58.115583 kernel: audit: type=1130 audit(1707799798.065:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.128873 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 04:49:58.236099 kernel: audit: type=1130 audit(1707799798.128:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.236116 kernel: audit: type=1130 audit(1707799798.186:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.187053 systemd[1]: Starting dracut-cmdline.service... Feb 13 04:49:58.266482 kernel: iscsi: registered transport (tcp) Feb 13 04:49:58.266493 dracut-cmdline[293]: dracut-dracut-053 Feb 13 04:49:58.266493 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 04:49:58.266493 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 04:49:58.338638 kernel: iscsi: registered transport (qla4xxx) Feb 13 04:49:58.338651 kernel: QLogic iSCSI HBA Driver Feb 13 04:49:58.326269 systemd[1]: Finished dracut-cmdline.service. Feb 13 04:49:58.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.365246 systemd[1]: Starting dracut-pre-udev.service... Feb 13 04:49:58.378998 systemd[1]: Starting iscsid.service... Feb 13 04:49:58.392585 systemd[1]: Started iscsid.service. Feb 13 04:49:58.432482 kernel: raid6: avx2x4 gen() 28180 MB/s Feb 13 04:49:58.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.432564 iscsid[449]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 04:49:58.432564 iscsid[449]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 04:49:58.432564 iscsid[449]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 04:49:58.432564 iscsid[449]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 04:49:58.432564 iscsid[449]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 04:49:58.432564 iscsid[449]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 04:49:58.432564 iscsid[449]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 04:49:58.621484 kernel: raid6: avx2x4 xor() 14080 MB/s Feb 13 04:49:58.621497 kernel: raid6: avx2x2 gen() 49231 MB/s Feb 13 04:49:58.621504 kernel: raid6: avx2x2 xor() 30497 MB/s Feb 13 04:49:58.621511 kernel: raid6: avx2x1 gen() 42729 MB/s Feb 13 04:49:58.621517 kernel: raid6: avx2x1 xor() 26579 MB/s Feb 13 04:49:58.646447 kernel: raid6: sse2x4 gen() 20729 MB/s Feb 13 04:49:58.681446 kernel: raid6: sse2x4 xor() 11879 MB/s Feb 13 04:49:58.716445 kernel: raid6: sse2x2 gen() 21569 MB/s Feb 13 04:49:58.750434 kernel: raid6: sse2x2 xor() 13382 MB/s Feb 13 04:49:58.784433 kernel: raid6: sse2x1 gen() 18229 MB/s Feb 13 04:49:58.836986 kernel: raid6: sse2x1 xor() 8900 MB/s Feb 13 04:49:58.837001 kernel: raid6: using algorithm avx2x2 gen() 49231 MB/s Feb 13 04:49:58.837008 kernel: raid6: .... xor() 30497 MB/s, rmw enabled Feb 13 04:49:58.855434 kernel: raid6: using avx2x2 recovery algorithm Feb 13 04:49:58.902419 kernel: xor: automatically using best checksumming function avx Feb 13 04:49:58.981399 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 04:49:58.986491 systemd[1]: Finished dracut-pre-udev.service. Feb 13 04:49:58.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:58.995000 audit: BPF prog-id=6 op=LOAD Feb 13 04:49:58.995000 audit: BPF prog-id=7 op=LOAD Feb 13 04:49:58.996357 systemd[1]: Starting systemd-udevd.service... Feb 13 04:49:59.004004 systemd-udevd[470]: Using default interface naming scheme 'v252'. Feb 13 04:49:59.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:59.010608 systemd[1]: Started systemd-udevd.service. Feb 13 04:49:59.052494 dracut-pre-trigger[482]: rd.md=0: removing MD RAID activation Feb 13 04:49:59.027045 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 04:49:59.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:59.052914 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 04:49:59.070483 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 04:49:59.147375 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 04:49:59.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:49:59.156511 systemd[1]: Starting dracut-initqueue.service... Feb 13 04:49:59.197460 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 04:49:59.197475 kernel: libata version 3.00 loaded. Feb 13 04:49:59.197486 kernel: ACPI: bus type USB registered Feb 13 04:49:59.222406 kernel: usbcore: registered new interface driver usbfs Feb 13 04:49:59.222457 kernel: usbcore: registered new interface driver hub Feb 13 04:49:59.240767 kernel: usbcore: registered new device driver usb Feb 13 04:49:59.259380 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 04:49:59.294440 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 04:49:59.295370 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 04:49:59.328127 kernel: AES CTR mode by8 optimization enabled Feb 13 04:49:59.328143 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 04:49:59.333370 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 04:49:59.333445 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Feb 13 04:49:59.333508 kernel: pps pps0: new PPS source ptp0 Feb 13 04:49:59.333593 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 04:49:59.333676 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 04:49:59.333756 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bb:81:6a Feb 13 04:49:59.333835 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 04:49:59.333916 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 04:49:59.339429 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 04:49:59.339499 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 04:49:59.359369 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 04:49:59.359445 kernel: scsi host0: ahci Feb 13 04:49:59.359504 kernel: scsi host1: ahci Feb 13 04:49:59.359569 kernel: scsi host2: ahci Feb 13 04:49:59.359623 kernel: scsi host3: ahci Feb 13 04:49:59.359684 kernel: scsi host4: ahci Feb 13 04:49:59.359737 kernel: scsi host5: ahci Feb 13 04:49:59.359787 kernel: scsi host6: ahci Feb 13 04:49:59.359846 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Feb 13 04:49:59.359855 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Feb 13 04:49:59.359863 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Feb 13 04:49:59.359873 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Feb 13 04:49:59.359881 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Feb 13 04:49:59.359889 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Feb 13 04:49:59.359897 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Feb 13 04:49:59.395676 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 04:49:59.395764 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 04:49:59.395828 kernel: pps pps1: new PPS source ptp1 Feb 13 04:49:59.395896 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 04:49:59.395963 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 04:49:59.396024 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bb:81:6b Feb 13 04:49:59.396083 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 04:49:59.396142 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 04:49:59.674373 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 04:49:59.675377 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 04:49:59.675600 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 04:49:59.675781 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 04:49:59.675924 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 04:49:59.676067 kernel: hub 1-0:1.0: USB hub found Feb 13 04:49:59.676248 kernel: hub 1-0:1.0: 16 ports detected Feb 13 04:49:59.676426 kernel: hub 2-0:1.0: USB hub found Feb 13 04:49:59.676586 kernel: hub 2-0:1.0: 10 ports detected Feb 13 04:49:59.676731 kernel: usb: port power management may be unreliable Feb 13 04:49:59.688417 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 04:49:59.729401 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 04:49:59.729486 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 04:49:59.927370 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 04:49:59.927398 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 04:49:59.983425 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 04:49:59.983498 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 04:50:00.014408 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Feb 13 04:50:00.014482 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 04:50:00.041907 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 04:50:00.041978 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 04:50:00.074414 kernel: hub 1-14:1.0: USB hub found Feb 13 04:50:00.074498 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 04:50:00.100305 kernel: hub 1-14:1.0: 4 ports detected Feb 13 04:50:00.100381 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 04:50:00.176235 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 04:50:00.176252 kernel: ata2.00: Features: NCQ-prio Feb 13 04:50:00.176260 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 04:50:00.204907 kernel: ata1.00: Features: NCQ-prio Feb 13 04:50:00.223420 kernel: ata2.00: configured for UDMA/133 Feb 13 04:50:00.223435 kernel: ata1.00: configured for UDMA/133 Feb 13 04:50:00.236413 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 04:50:00.254429 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 04:50:00.288370 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 04:50:00.306973 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:50:00.306989 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 04:50:00.321514 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 04:50:00.321588 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 04:50:00.355417 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 13 04:50:00.355525 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 04:50:00.356913 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 13 04:50:00.356984 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 13 04:50:00.372337 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 13 04:50:00.391638 kernel: port_module: 9 callbacks suppressed Feb 13 04:50:00.391655 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 04:50:00.408417 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 04:50:00.408492 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 04:50:00.421266 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 04:50:00.436369 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 04:50:00.450393 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 04:50:00.452370 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 04:50:00.549835 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:50:00.564008 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:50:00.564024 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 04:50:00.592433 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 13 04:50:00.592509 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 04:50:00.592518 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 04:50:00.620415 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 04:50:00.634269 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 04:50:00.634474 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 13 04:50:00.698456 kernel: usbcore: registered new interface driver usbhid Feb 13 04:50:00.698484 kernel: usbhid: USB HID core driver Feb 13 04:50:00.698492 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sdb6 scanned by (udev-worker) (516) Feb 13 04:50:00.706450 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 04:50:00.771606 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 04:50:00.738429 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 04:50:00.766771 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 04:50:00.784429 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 04:50:00.822543 systemd[1]: Reached target initrd-root-device.target. Feb 13 04:50:00.923863 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 04:50:00.923951 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 04:50:00.923962 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 04:50:00.924027 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 04:50:00.869290 systemd[1]: Starting disk-uuid.service... Feb 13 04:50:00.942758 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 13 04:50:00.931746 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 04:50:01.062470 kernel: audit: type=1130 audit(1707799800.961:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.062485 kernel: audit: type=1131 audit(1707799800.961:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.062493 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 13 04:50:00.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:00.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:00.931805 systemd[1]: Finished disk-uuid.service. Feb 13 04:50:00.961563 systemd[1]: Reached target local-fs-pre.target. Feb 13 04:50:01.070935 systemd[1]: Reached target local-fs.target. Feb 13 04:50:01.083498 systemd[1]: Reached target sysinit.target. Feb 13 04:50:01.097687 systemd[1]: Reached target basic.target. Feb 13 04:50:01.124099 systemd[1]: Starting verity-setup.service... Feb 13 04:50:01.130668 systemd[1]: Finished dracut-initqueue.service. Feb 13 04:50:01.216618 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 04:50:01.216633 kernel: audit: type=1130 audit(1707799801.163:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.165789 systemd[1]: Reached target remote-fs-pre.target. Feb 13 04:50:01.225595 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 04:50:01.233586 systemd[1]: Reached target remote-fs.target. Feb 13 04:50:01.325588 kernel: audit: type=1130 audit(1707799801.271:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.234011 systemd[1]: Starting dracut-pre-mount.service... Feb 13 04:50:01.390577 kernel: audit: type=1130 audit(1707799801.334:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.256008 systemd[1]: Finished dracut-pre-mount.service. Feb 13 04:50:01.271673 systemd[1]: Finished verity-setup.service. Feb 13 04:50:01.335583 systemd[1]: Found device dev-mapper-usr.device. Feb 13 04:50:01.399852 systemd[1]: Mounting sysusr-usr.mount... Feb 13 04:50:01.414755 systemd[1]: Starting systemd-fsck-root.service... Feb 13 04:50:01.435122 systemd-fsck[720]: ROOT: clean, 624/553520 files, 56032/553472 blocks Feb 13 04:50:01.451865 systemd[1]: Finished systemd-fsck-root.service. Feb 13 04:50:01.561469 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 04:50:01.561482 kernel: audit: type=1130 audit(1707799801.470:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.561494 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 04:50:01.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.470895 systemd[1]: Mounting sysroot.mount... Feb 13 04:50:01.570045 systemd[1]: Mounted sysusr-usr.mount. Feb 13 04:50:01.583611 systemd[1]: Mounted sysroot.mount. Feb 13 04:50:01.598451 systemd[1]: Reached target initrd-root-fs.target. Feb 13 04:50:01.620362 systemd[1]: Mounting sysroot-usr.mount... Feb 13 04:50:01.628397 systemd[1]: Mounted sysroot-usr.mount. Feb 13 04:50:01.646297 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 04:50:01.659015 systemd[1]: Starting initrd-setup-root.service... Feb 13 04:50:01.770601 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 04:50:01.770616 kernel: BTRFS info (device sdb6): using free space tree Feb 13 04:50:01.770623 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 04:50:01.770630 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 04:50:01.761053 systemd[1]: Finished initrd-setup-root.service. Feb 13 04:50:01.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.781588 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 04:50:01.849618 kernel: audit: type=1130 audit(1707799801.780:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.840878 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 04:50:01.849765 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 04:50:01.937630 kernel: audit: type=1130 audit(1707799801.875:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.937686 initrd-setup-root-after-ignition[805]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 04:50:01.875633 systemd[1]: Reached target ignition-subsequent.target. Feb 13 04:50:01.947052 systemd[1]: Starting initrd-parse-etc.service... Feb 13 04:50:02.051569 kernel: audit: type=1130 audit(1707799801.984:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:01.974646 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 04:50:01.974697 systemd[1]: Finished initrd-parse-etc.service. Feb 13 04:50:01.984875 systemd[1]: Reached target initrd-fs.target. Feb 13 04:50:02.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.059578 systemd[1]: Reached target initrd.target. Feb 13 04:50:02.059637 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 04:50:02.059987 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 04:50:02.080699 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 04:50:02.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.096950 systemd[1]: Starting initrd-cleanup.service... Feb 13 04:50:02.114712 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 04:50:02.127593 systemd[1]: Stopped target timers.target. Feb 13 04:50:02.145765 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 04:50:02.145878 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 04:50:02.163943 systemd[1]: Stopped target initrd.target. Feb 13 04:50:02.177836 systemd[1]: Stopped target basic.target. Feb 13 04:50:02.191901 systemd[1]: Stopped target ignition-subsequent.target. Feb 13 04:50:02.207900 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 13 04:50:02.225018 systemd[1]: Stopped target initrd-root-device.target. Feb 13 04:50:02.242919 systemd[1]: Stopped target paths.target. Feb 13 04:50:02.256924 systemd[1]: Stopped target remote-fs.target. Feb 13 04:50:02.273013 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 04:50:02.287894 systemd[1]: Stopped target slices.target. Feb 13 04:50:02.303895 systemd[1]: Stopped target sockets.target. Feb 13 04:50:02.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.321915 systemd[1]: Stopped target sysinit.target. Feb 13 04:50:02.337919 systemd[1]: Stopped target local-fs.target. Feb 13 04:50:02.353906 systemd[1]: Stopped target local-fs-pre.target. Feb 13 04:50:02.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.369916 systemd[1]: Stopped target swap.target. Feb 13 04:50:02.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.384856 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 04:50:02.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.488797 iscsid[449]: iscsid shutting down. Feb 13 04:50:02.385188 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 04:50:02.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.401122 systemd[1]: Stopped target cryptsetup.target. Feb 13 04:50:02.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.416914 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 04:50:02.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.421633 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 04:50:02.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.431775 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 04:50:02.432096 systemd[1]: Stopped dracut-initqueue.service. Feb 13 04:50:02.447944 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 04:50:02.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.448255 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 04:50:02.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.466021 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 04:50:02.466337 systemd[1]: Stopped initrd-setup-root.service. Feb 13 04:50:02.481331 systemd[1]: Stopping iscsid.service... Feb 13 04:50:02.495566 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 04:50:02.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.495685 systemd[1]: Stopped systemd-sysctl.service. Feb 13 04:50:02.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.510778 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 04:50:02.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.510866 systemd[1]: Stopped systemd-modules-load.service. Feb 13 04:50:02.525743 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 04:50:02.525865 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 04:50:02.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.540776 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 04:50:02.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.540931 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 04:50:02.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.560358 systemd[1]: Stopping systemd-udevd.service... Feb 13 04:50:02.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.576921 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 04:50:02.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.577315 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 04:50:02.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:02.577359 systemd[1]: Stopped iscsid.service. Feb 13 04:50:02.597816 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 04:50:02.597899 systemd[1]: Stopped systemd-udevd.service. Feb 13 04:50:02.616334 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 04:50:02.616460 systemd[1]: Closed iscsid.socket. Feb 13 04:50:02.631744 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 04:50:02.631838 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 04:50:02.649675 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 04:50:02.649762 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 04:50:02.664701 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 04:50:02.664836 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 04:50:02.680768 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 04:50:02.680900 systemd[1]: Stopped dracut-cmdline.service. Feb 13 04:50:02.697764 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 04:50:02.697897 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 04:50:02.715363 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 04:50:02.946376 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 13 04:50:02.731617 systemd[1]: Stopping iscsiuio.service... Feb 13 04:50:02.746538 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 13 04:50:02.746574 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 13 04:50:02.764713 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 04:50:02.764770 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 04:50:02.780673 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 04:50:02.780763 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 04:50:02.802000 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 13 04:50:02.803214 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 04:50:02.803445 systemd[1]: Stopped iscsiuio.service. Feb 13 04:50:02.814224 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 04:50:02.814460 systemd[1]: Finished initrd-cleanup.service. Feb 13 04:50:02.829111 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 04:50:02.829321 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 04:50:02.849425 systemd[1]: Reached target initrd-switch-root.target. Feb 13 04:50:02.864834 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 04:50:02.864941 systemd[1]: Closed iscsiuio.socket. Feb 13 04:50:02.880200 systemd[1]: Starting initrd-switch-root.service... Feb 13 04:50:02.901228 systemd[1]: Switching root. Feb 13 04:50:02.946770 systemd-journald[268]: Journal stopped Feb 13 04:50:06.943139 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 04:50:06.943152 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 04:50:06.943161 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 04:50:06.943166 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 04:50:06.943171 kernel: SELinux: policy capability open_perms=1 Feb 13 04:50:06.943176 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 04:50:06.943183 kernel: SELinux: policy capability always_check_network=0 Feb 13 04:50:06.943188 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 04:50:06.943193 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 04:50:06.943199 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 04:50:06.943204 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 04:50:06.943210 systemd[1]: Successfully loaded SELinux policy in 295.669ms. Feb 13 04:50:06.943217 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.428ms. Feb 13 04:50:06.943224 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 04:50:06.943232 systemd[1]: Detected architecture x86-64. Feb 13 04:50:06.943238 systemd[1]: Detected first boot. Feb 13 04:50:06.943243 systemd[1]: Hostname set to . Feb 13 04:50:06.943250 systemd[1]: Initializing machine ID from random generator. Feb 13 04:50:06.943256 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 04:50:06.943262 systemd[1]: Populated /etc with preset unit settings. Feb 13 04:50:06.943268 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 04:50:06.943275 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 04:50:06.943282 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 04:50:06.943288 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 04:50:06.943294 systemd[1]: Stopped initrd-switch-root.service. Feb 13 04:50:06.943300 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 04:50:06.943307 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 04:50:06.943314 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 04:50:06.943321 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 04:50:06.943327 systemd[1]: Created slice system-getty.slice. Feb 13 04:50:06.943332 systemd[1]: Created slice system-modprobe.slice. Feb 13 04:50:06.943338 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 04:50:06.943344 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 04:50:06.943351 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 04:50:06.943356 systemd[1]: Created slice user.slice. Feb 13 04:50:06.943362 systemd[1]: Started systemd-ask-password-console.path. Feb 13 04:50:06.943372 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 04:50:06.943396 systemd[1]: Set up automount boot.automount. Feb 13 04:50:06.943402 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 04:50:06.943408 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 04:50:06.943430 systemd[1]: Stopped target initrd-fs.target. Feb 13 04:50:06.943436 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 04:50:06.943443 systemd[1]: Reached target integritysetup.target. Feb 13 04:50:06.943449 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 04:50:06.943456 systemd[1]: Reached target remote-fs.target. Feb 13 04:50:06.943463 systemd[1]: Reached target slices.target. Feb 13 04:50:06.943469 systemd[1]: Reached target swap.target. Feb 13 04:50:06.943475 systemd[1]: Reached target torcx.target. Feb 13 04:50:06.943481 systemd[1]: Reached target veritysetup.target. Feb 13 04:50:06.943488 systemd[1]: Listening on systemd-coredump.socket. Feb 13 04:50:06.943494 systemd[1]: Listening on systemd-initctl.socket. Feb 13 04:50:06.943500 systemd[1]: Listening on systemd-networkd.socket. Feb 13 04:50:06.943508 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 04:50:06.943514 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 04:50:06.943521 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 04:50:06.943527 systemd[1]: Mounting dev-hugepages.mount... Feb 13 04:50:06.943533 systemd[1]: Mounting dev-mqueue.mount... Feb 13 04:50:06.943540 systemd[1]: Mounting media.mount... Feb 13 04:50:06.943547 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 04:50:06.943554 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 04:50:06.943560 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 04:50:06.943567 systemd[1]: Mounting tmp.mount... Feb 13 04:50:06.943573 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 04:50:06.943579 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 04:50:06.943586 systemd[1]: Starting kmod-static-nodes.service... Feb 13 04:50:06.943592 systemd[1]: Starting modprobe@configfs.service... Feb 13 04:50:06.943599 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 04:50:06.943606 systemd[1]: Starting modprobe@drm.service... Feb 13 04:50:06.943613 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 04:50:06.943619 systemd[1]: Starting modprobe@fuse.service... Feb 13 04:50:06.943626 kernel: fuse: init (API version 7.34) Feb 13 04:50:06.943632 systemd[1]: Starting modprobe@loop.service... Feb 13 04:50:06.943638 kernel: loop: module loaded Feb 13 04:50:06.943644 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 04:50:06.943651 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 04:50:06.943658 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 04:50:06.943665 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 04:50:06.943671 kernel: kauditd_printk_skb: 51 callbacks suppressed Feb 13 04:50:06.943677 kernel: audit: type=1131 audit(1707799806.585:72): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.943683 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 04:50:06.943690 kernel: audit: type=1131 audit(1707799806.673:73): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.943695 systemd[1]: Stopped systemd-journald.service. Feb 13 04:50:06.943702 kernel: audit: type=1130 audit(1707799806.737:74): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.943709 kernel: audit: type=1131 audit(1707799806.737:75): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.943714 kernel: audit: type=1334 audit(1707799806.823:76): prog-id=13 op=LOAD Feb 13 04:50:06.943720 kernel: audit: type=1334 audit(1707799806.841:77): prog-id=14 op=LOAD Feb 13 04:50:06.943726 kernel: audit: type=1334 audit(1707799806.859:78): prog-id=15 op=LOAD Feb 13 04:50:06.943732 kernel: audit: type=1334 audit(1707799806.877:79): prog-id=11 op=UNLOAD Feb 13 04:50:06.943738 systemd[1]: Starting systemd-journald.service... Feb 13 04:50:06.943744 kernel: audit: type=1334 audit(1707799806.877:80): prog-id=12 op=UNLOAD Feb 13 04:50:06.943750 systemd[1]: Starting systemd-modules-load.service... Feb 13 04:50:06.943757 kernel: audit: type=1305 audit(1707799806.941:81): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 04:50:06.943765 systemd-journald[946]: Journal started Feb 13 04:50:06.943789 systemd-journald[946]: Runtime Journal (/run/log/journal/e90559d575c04285a018ab3720945707) is 8.0M, max 640.1M, 632.1M free. Feb 13 04:50:03.371000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 04:50:03.660000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 04:50:03.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 04:50:03.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 04:50:03.662000 audit: BPF prog-id=8 op=LOAD Feb 13 04:50:03.662000 audit: BPF prog-id=8 op=UNLOAD Feb 13 04:50:03.662000 audit: BPF prog-id=9 op=LOAD Feb 13 04:50:03.662000 audit: BPF prog-id=9 op=UNLOAD Feb 13 04:50:03.759000 audit[839]: AVC avc: denied { associate } for pid=839 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 04:50:03.759000 audit[839]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001d989c a1=c00015adf8 a2=c000163ac0 a3=32 items=0 ppid=822 pid=839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:03.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 04:50:03.784000 audit[839]: AVC avc: denied { associate } for pid=839 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 04:50:03.784000 audit[839]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001d9975 a2=1ed a3=0 items=2 ppid=822 pid=839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:03.784000 audit: CWD cwd="/" Feb 13 04:50:03.784000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:03.784000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:03.784000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 04:50:05.339000 audit: BPF prog-id=10 op=LOAD Feb 13 04:50:05.339000 audit: BPF prog-id=3 op=UNLOAD Feb 13 04:50:05.339000 audit: BPF prog-id=11 op=LOAD Feb 13 04:50:05.339000 audit: BPF prog-id=12 op=LOAD Feb 13 04:50:05.339000 audit: BPF prog-id=4 op=UNLOAD Feb 13 04:50:05.339000 audit: BPF prog-id=5 op=UNLOAD Feb 13 04:50:05.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:05.386000 audit: BPF prog-id=10 op=UNLOAD Feb 13 04:50:05.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:05.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:06.823000 audit: BPF prog-id=13 op=LOAD Feb 13 04:50:06.841000 audit: BPF prog-id=14 op=LOAD Feb 13 04:50:06.859000 audit: BPF prog-id=15 op=LOAD Feb 13 04:50:06.877000 audit: BPF prog-id=11 op=UNLOAD Feb 13 04:50:06.877000 audit: BPF prog-id=12 op=UNLOAD Feb 13 04:50:06.941000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 04:50:03.754363 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 04:50:05.337974 systemd[1]: Queued start job for default target multi-user.target. Feb 13 04:50:03.755057 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 04:50:05.337981 systemd[1]: Unnecessary job was removed for dev-sdb6.device. Feb 13 04:50:03.755090 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 04:50:05.340485 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 04:50:03.755134 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 04:50:03.755150 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 04:50:03.755194 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 04:50:03.755214 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 04:50:03.756137 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 04:50:03.756201 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 04:50:03.756222 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 04:50:03.756944 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 04:50:03.756997 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 04:50:03.757026 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 04:50:03.757049 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 04:50:03.757074 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 04:50:03.757094 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 04:50:04.945110 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:50:04.945255 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:50:04.945309 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:50:04.945410 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:50:04.945441 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 04:50:04.945475 /usr/lib/systemd/system-generators/torcx-generator[839]: time="2024-02-13T04:50:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 04:50:06.941000 audit[946]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff3ed37b40 a2=4000 a3=7fff3ed37bdc items=0 ppid=1 pid=946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:06.941000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 04:50:07.022558 systemd[1]: Starting systemd-network-generator.service... Feb 13 04:50:07.049383 systemd[1]: Starting systemd-remount-fs.service... Feb 13 04:50:07.076414 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 04:50:07.119170 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 04:50:07.119212 systemd[1]: Stopped verity-setup.service. Feb 13 04:50:07.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.164412 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 04:50:07.184555 systemd[1]: Started systemd-journald.service. Feb 13 04:50:07.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.192901 systemd[1]: Mounted dev-hugepages.mount. Feb 13 04:50:07.200753 systemd[1]: Mounted dev-mqueue.mount. Feb 13 04:50:07.207608 systemd[1]: Mounted media.mount. Feb 13 04:50:07.214616 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 04:50:07.223592 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 04:50:07.232602 systemd[1]: Mounted tmp.mount. Feb 13 04:50:07.239672 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 04:50:07.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.247703 systemd[1]: Finished kmod-static-nodes.service. Feb 13 04:50:07.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.255705 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 04:50:07.255816 systemd[1]: Finished modprobe@configfs.service. Feb 13 04:50:07.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.264809 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 04:50:07.264943 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 04:50:07.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.274006 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 04:50:07.274253 systemd[1]: Finished modprobe@drm.service. Feb 13 04:50:07.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.284233 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 04:50:07.284555 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 04:50:07.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.294257 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 04:50:07.294576 systemd[1]: Finished modprobe@fuse.service. Feb 13 04:50:07.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.303294 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 04:50:07.303710 systemd[1]: Finished modprobe@loop.service. Feb 13 04:50:07.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.314219 systemd[1]: Finished systemd-modules-load.service. Feb 13 04:50:07.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.323150 systemd[1]: Finished systemd-network-generator.service. Feb 13 04:50:07.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.333160 systemd[1]: Finished systemd-remount-fs.service. Feb 13 04:50:07.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.342162 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 04:50:07.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.351675 systemd[1]: Reached target network-pre.target. Feb 13 04:50:07.362181 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 04:50:07.371045 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 04:50:07.378580 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 04:50:07.379582 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 04:50:07.387017 systemd[1]: Starting systemd-journal-flush.service... Feb 13 04:50:07.390993 systemd-journald[946]: Time spent on flushing to /var/log/journal/e90559d575c04285a018ab3720945707 is 10.909ms for 1265 entries. Feb 13 04:50:07.390993 systemd-journald[946]: System Journal (/var/log/journal/e90559d575c04285a018ab3720945707) is 8.0M, max 195.6M, 187.6M free. Feb 13 04:50:07.425469 systemd-journald[946]: Received client request to flush runtime journal. Feb 13 04:50:07.402474 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 04:50:07.403054 systemd[1]: Starting systemd-random-seed.service... Feb 13 04:50:07.418467 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 04:50:07.418974 systemd[1]: Starting systemd-sysctl.service... Feb 13 04:50:07.426211 systemd[1]: Starting systemd-sysusers.service... Feb 13 04:50:07.433992 systemd[1]: Starting systemd-udev-settle.service... Feb 13 04:50:07.441568 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 04:50:07.449529 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 04:50:07.457568 systemd[1]: Finished systemd-journal-flush.service. Feb 13 04:50:07.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.465581 systemd[1]: Finished systemd-random-seed.service. Feb 13 04:50:07.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.473569 systemd[1]: Finished systemd-sysctl.service. Feb 13 04:50:07.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.481562 systemd[1]: Finished systemd-sysusers.service. Feb 13 04:50:07.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.490573 systemd[1]: Reached target first-boot-complete.target. Feb 13 04:50:07.499099 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 04:50:07.508408 udevadm[962]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 13 04:50:07.518629 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 04:50:07.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.685458 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 04:50:07.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.694000 audit: BPF prog-id=16 op=LOAD Feb 13 04:50:07.694000 audit: BPF prog-id=17 op=LOAD Feb 13 04:50:07.694000 audit: BPF prog-id=6 op=UNLOAD Feb 13 04:50:07.695000 audit: BPF prog-id=7 op=UNLOAD Feb 13 04:50:07.695685 systemd[1]: Starting systemd-udevd.service... Feb 13 04:50:07.706898 systemd-udevd[965]: Using default interface naming scheme 'v252'. Feb 13 04:50:07.727104 systemd[1]: Started systemd-udevd.service. Feb 13 04:50:07.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.738655 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 04:50:07.739000 audit: BPF prog-id=18 op=LOAD Feb 13 04:50:07.739969 systemd[1]: Starting systemd-networkd.service... Feb 13 04:50:07.762000 audit: BPF prog-id=19 op=LOAD Feb 13 04:50:07.780793 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 04:50:07.780903 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 04:50:07.780943 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 04:50:07.801000 audit: BPF prog-id=20 op=LOAD Feb 13 04:50:07.801000 audit: BPF prog-id=21 op=LOAD Feb 13 04:50:07.802375 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 04:50:07.802604 systemd[1]: Starting systemd-userdbd.service... Feb 13 04:50:07.821372 kernel: ACPI: button: Power Button [PWRF] Feb 13 04:50:07.841557 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 04:50:07.856085 systemd[1]: Started systemd-userdbd.service. Feb 13 04:50:07.870379 kernel: IPMI message handler: version 39.2 Feb 13 04:50:07.780000 audit[975]: AVC avc: denied { confidentiality } for pid=975 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 04:50:07.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:07.780000 audit[975]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff89581c010 a1=df92c a2=7ff8975c2bc5 a3=5 items=312 ppid=965 pid=975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:07.780000 audit: CWD cwd="/" Feb 13 04:50:07.780000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=1 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=2 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=3 name=(null) inode=10795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=4 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=5 name=(null) inode=10796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=6 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=7 name=(null) inode=10797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=8 name=(null) inode=10797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=9 name=(null) inode=10798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=10 name=(null) inode=10797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=11 name=(null) inode=10799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=12 name=(null) inode=10797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=13 name=(null) inode=10800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=14 name=(null) inode=10797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=15 name=(null) inode=10801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=16 name=(null) inode=10797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=17 name=(null) inode=10802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=18 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=19 name=(null) inode=10803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=20 name=(null) inode=10803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=21 name=(null) inode=10804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=22 name=(null) inode=10803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=23 name=(null) inode=10805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=24 name=(null) inode=10803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=25 name=(null) inode=10806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=26 name=(null) inode=10803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=27 name=(null) inode=10807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=28 name=(null) inode=10803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=29 name=(null) inode=10808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=30 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=31 name=(null) inode=10809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=32 name=(null) inode=10809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=33 name=(null) inode=10810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=34 name=(null) inode=10809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=35 name=(null) inode=10811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=36 name=(null) inode=10809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=37 name=(null) inode=10812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=38 name=(null) inode=10809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=39 name=(null) inode=10813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=40 name=(null) inode=10809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=41 name=(null) inode=10814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=42 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=43 name=(null) inode=10815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=44 name=(null) inode=10815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=45 name=(null) inode=10816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=46 name=(null) inode=10815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=47 name=(null) inode=10817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=48 name=(null) inode=10815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=49 name=(null) inode=10818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=50 name=(null) inode=10815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=51 name=(null) inode=10819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=52 name=(null) inode=10815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=53 name=(null) inode=10820 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=54 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=55 name=(null) inode=10821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=56 name=(null) inode=10821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=57 name=(null) inode=10822 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=58 name=(null) inode=10821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=59 name=(null) inode=10823 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=60 name=(null) inode=10821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=61 name=(null) inode=10824 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=62 name=(null) inode=10821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=63 name=(null) inode=10825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=64 name=(null) inode=10821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=65 name=(null) inode=10826 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=66 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=67 name=(null) inode=10827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=68 name=(null) inode=10827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=69 name=(null) inode=10828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=70 name=(null) inode=10827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=71 name=(null) inode=10829 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=72 name=(null) inode=10827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=73 name=(null) inode=10830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=74 name=(null) inode=10827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=75 name=(null) inode=10831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=76 name=(null) inode=10827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=77 name=(null) inode=10832 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=78 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=79 name=(null) inode=10833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=80 name=(null) inode=10833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=81 name=(null) inode=10834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=82 name=(null) inode=10833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=83 name=(null) inode=10835 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=84 name=(null) inode=10833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=85 name=(null) inode=10836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=86 name=(null) inode=10833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=87 name=(null) inode=10837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=88 name=(null) inode=10833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=89 name=(null) inode=10838 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=90 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=91 name=(null) inode=10839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=92 name=(null) inode=10839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=93 name=(null) inode=10840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=94 name=(null) inode=10839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=95 name=(null) inode=10841 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=96 name=(null) inode=10839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=97 name=(null) inode=10842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=98 name=(null) inode=10839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=99 name=(null) inode=10843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=100 name=(null) inode=10839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=101 name=(null) inode=10844 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=102 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=103 name=(null) inode=10845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=104 name=(null) inode=10845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=105 name=(null) inode=10846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=106 name=(null) inode=10845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=107 name=(null) inode=10847 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=108 name=(null) inode=10845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=109 name=(null) inode=10848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=110 name=(null) inode=10845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=111 name=(null) inode=10849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=112 name=(null) inode=10845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=113 name=(null) inode=10850 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=114 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=115 name=(null) inode=10851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=116 name=(null) inode=10851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=117 name=(null) inode=10852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=118 name=(null) inode=10851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=119 name=(null) inode=10853 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=120 name=(null) inode=10851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=121 name=(null) inode=10854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=122 name=(null) inode=10851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=123 name=(null) inode=10855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=124 name=(null) inode=10851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=125 name=(null) inode=10856 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=126 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=127 name=(null) inode=10857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=128 name=(null) inode=10857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=129 name=(null) inode=10858 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=130 name=(null) inode=10857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=131 name=(null) inode=10859 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=132 name=(null) inode=10857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=133 name=(null) inode=10860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=134 name=(null) inode=10857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=135 name=(null) inode=10861 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=136 name=(null) inode=10857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=137 name=(null) inode=10862 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=138 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=139 name=(null) inode=10863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=140 name=(null) inode=10863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=141 name=(null) inode=10864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=142 name=(null) inode=10863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=143 name=(null) inode=10865 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=144 name=(null) inode=10863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=145 name=(null) inode=10866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=146 name=(null) inode=10863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=147 name=(null) inode=10867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=148 name=(null) inode=10863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=149 name=(null) inode=10868 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=150 name=(null) inode=10794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=151 name=(null) inode=10869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=152 name=(null) inode=10869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=153 name=(null) inode=10870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=154 name=(null) inode=10869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=155 name=(null) inode=10871 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=156 name=(null) inode=10869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=157 name=(null) inode=10872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=158 name=(null) inode=10869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=159 name=(null) inode=10873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=160 name=(null) inode=10869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=161 name=(null) inode=10874 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=162 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=163 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=164 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=165 name=(null) inode=10876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=166 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=167 name=(null) inode=10877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=168 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=169 name=(null) inode=10878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=170 name=(null) inode=10878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=171 name=(null) inode=10879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=172 name=(null) inode=10878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=173 name=(null) inode=10880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=174 name=(null) inode=10878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=175 name=(null) inode=10881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=176 name=(null) inode=10878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=177 name=(null) inode=10882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=178 name=(null) inode=10878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=179 name=(null) inode=10883 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=180 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=181 name=(null) inode=10884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=182 name=(null) inode=10884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=183 name=(null) inode=10885 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=184 name=(null) inode=10884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=185 name=(null) inode=10886 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=186 name=(null) inode=10884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=187 name=(null) inode=10887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=188 name=(null) inode=10884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=189 name=(null) inode=10888 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=190 name=(null) inode=10884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=191 name=(null) inode=10889 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=192 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=193 name=(null) inode=10890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=194 name=(null) inode=10890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=195 name=(null) inode=10891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=196 name=(null) inode=10890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=197 name=(null) inode=10892 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=198 name=(null) inode=10890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=199 name=(null) inode=10893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=200 name=(null) inode=10890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=201 name=(null) inode=10894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=202 name=(null) inode=10890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=203 name=(null) inode=10895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=204 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=205 name=(null) inode=10896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=206 name=(null) inode=10896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=207 name=(null) inode=10897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=208 name=(null) inode=10896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=209 name=(null) inode=10898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=210 name=(null) inode=10896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=211 name=(null) inode=10899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=212 name=(null) inode=10896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=213 name=(null) inode=10900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=214 name=(null) inode=10896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=215 name=(null) inode=10901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=216 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=217 name=(null) inode=10902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=218 name=(null) inode=10902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=219 name=(null) inode=10903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=220 name=(null) inode=10902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=221 name=(null) inode=10904 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=222 name=(null) inode=10902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=223 name=(null) inode=10905 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=224 name=(null) inode=10902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=225 name=(null) inode=10906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=226 name=(null) inode=10902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=227 name=(null) inode=10907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=228 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=229 name=(null) inode=10908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=230 name=(null) inode=10908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=231 name=(null) inode=10909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=232 name=(null) inode=10908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=233 name=(null) inode=10910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=234 name=(null) inode=10908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=235 name=(null) inode=10911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=236 name=(null) inode=10908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=237 name=(null) inode=10912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=238 name=(null) inode=10908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=239 name=(null) inode=10913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=240 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=241 name=(null) inode=10914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=242 name=(null) inode=10914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=243 name=(null) inode=10915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=244 name=(null) inode=10914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=245 name=(null) inode=10916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=246 name=(null) inode=10914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=247 name=(null) inode=10917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=248 name=(null) inode=10914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=249 name=(null) inode=10918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=250 name=(null) inode=10914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=251 name=(null) inode=10919 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=252 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=253 name=(null) inode=10920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=254 name=(null) inode=10920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=255 name=(null) inode=10921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=256 name=(null) inode=10920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=257 name=(null) inode=10922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=258 name=(null) inode=10920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=259 name=(null) inode=10923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=260 name=(null) inode=10920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=261 name=(null) inode=10924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=262 name=(null) inode=10920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=263 name=(null) inode=10925 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=264 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=265 name=(null) inode=10926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=266 name=(null) inode=10926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=267 name=(null) inode=10927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=268 name=(null) inode=10926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=269 name=(null) inode=10928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=270 name=(null) inode=10926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=271 name=(null) inode=10929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=272 name=(null) inode=10926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=273 name=(null) inode=10930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=274 name=(null) inode=10926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=275 name=(null) inode=10931 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=276 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=277 name=(null) inode=10932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=278 name=(null) inode=10932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=279 name=(null) inode=10933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=280 name=(null) inode=10932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=281 name=(null) inode=10934 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=282 name=(null) inode=10932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=283 name=(null) inode=10935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=284 name=(null) inode=10932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=285 name=(null) inode=10936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=286 name=(null) inode=10932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=287 name=(null) inode=10937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=288 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=289 name=(null) inode=10938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=290 name=(null) inode=10938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=291 name=(null) inode=10939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=292 name=(null) inode=10938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=293 name=(null) inode=10940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=294 name=(null) inode=10938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=295 name=(null) inode=10941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=296 name=(null) inode=10938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=297 name=(null) inode=10942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=298 name=(null) inode=10938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=299 name=(null) inode=10943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=300 name=(null) inode=10875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=301 name=(null) inode=10944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=302 name=(null) inode=10944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=303 name=(null) inode=10945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=304 name=(null) inode=10944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=305 name=(null) inode=10946 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=306 name=(null) inode=10944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=307 name=(null) inode=10947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=308 name=(null) inode=10944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=309 name=(null) inode=10948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=310 name=(null) inode=10944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PATH item=311 name=(null) inode=10949 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:50:07.780000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 04:50:07.917378 kernel: ipmi device interface Feb 13 04:50:07.917436 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 04:50:07.956380 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 04:50:07.956716 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 04:50:07.956805 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 04:50:07.958504 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Feb 13 04:50:08.057650 kernel: ipmi_si: IPMI System Interface driver Feb 13 04:50:08.057744 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 04:50:08.057815 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 04:50:08.075183 systemd-networkd[1019]: bond0: netdev ready Feb 13 04:50:08.077237 systemd-networkd[1019]: lo: Link UP Feb 13 04:50:08.077239 systemd-networkd[1019]: lo: Gained carrier Feb 13 04:50:08.077599 systemd-networkd[1019]: Enumeration completed Feb 13 04:50:08.077681 systemd[1]: Started systemd-networkd.service. Feb 13 04:50:08.077861 systemd-networkd[1019]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 04:50:08.078777 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 04:50:08.078822 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 04:50:08.078728 systemd-networkd[1019]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:91.network. Feb 13 04:50:08.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:08.113135 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 04:50:08.117421 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 04:50:08.117445 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 04:50:08.199409 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 04:50:08.199506 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 04:50:08.199518 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 04:50:08.222376 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 04:50:08.261807 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 04:50:08.300437 kernel: intel_rapl_common: Found RAPL domain package Feb 13 04:50:08.300473 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 04:50:08.300565 kernel: intel_rapl_common: Found RAPL domain core Feb 13 04:50:08.300576 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 04:50:08.320411 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 04:50:08.320434 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 04:50:08.354109 systemd-networkd[1019]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:90.network. Feb 13 04:50:08.354379 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 04:50:08.412414 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 04:50:08.548439 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 04:50:08.548887 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 04:50:08.589405 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 04:50:08.589433 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 04:50:08.631552 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 04:50:08.652423 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 04:50:08.682467 systemd-networkd[1019]: bond0: Link UP Feb 13 04:50:08.766925 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 04:50:08.766980 kernel: bond0: active interface up! Feb 13 04:50:08.798387 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 13 04:50:08.799043 systemd-networkd[1019]: enp1s0f1np1: Link UP Feb 13 04:50:08.799196 systemd-networkd[1019]: enp1s0f0np0: Link UP Feb 13 04:50:08.799299 systemd-networkd[1019]: enp1s0f1np1: Gained carrier Feb 13 04:50:08.800253 systemd-networkd[1019]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:de:84:90.network. Feb 13 04:50:08.828752 systemd[1]: Finished systemd-udev-settle.service. Feb 13 04:50:08.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:08.838066 systemd[1]: Starting lvm2-activation-early.service... Feb 13 04:50:08.854683 lvm[1077]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 04:50:08.888780 systemd[1]: Finished lvm2-activation-early.service. Feb 13 04:50:08.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:08.897497 systemd[1]: Reached target cryptsetup.target. Feb 13 04:50:08.913693 systemd[1]: Starting lvm2-activation.service... Feb 13 04:50:08.915813 lvm[1078]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 04:50:08.925370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:08.949450 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:08.972372 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:08.994369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:08.994808 systemd[1]: Finished lvm2-activation.service. Feb 13 04:50:09.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.011487 systemd[1]: Reached target local-fs-pre.target. Feb 13 04:50:09.017368 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.034470 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 04:50:09.034485 systemd[1]: Reached target local-fs.target. Feb 13 04:50:09.040370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.056487 systemd[1]: Reached target machines.target. Feb 13 04:50:09.063369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.080022 systemd[1]: Starting ldconfig.service... Feb 13 04:50:09.085369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.101950 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 04:50:09.101970 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 04:50:09.102581 systemd[1]: Starting systemd-boot-update.service... Feb 13 04:50:09.107371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.124619 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 04:50:09.130009 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 04:50:09.130084 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 04:50:09.130107 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 04:50:09.130370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.130653 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 04:50:09.131010 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1080 (bootctl) Feb 13 04:50:09.132015 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 04:50:09.151370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.158099 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 04:50:09.159860 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 04:50:09.161642 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 04:50:09.172410 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.172740 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 04:50:09.173570 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 04:50:09.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.173786 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 04:50:09.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.193400 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.214370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.234369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.235054 systemd-fsck[1088]: fsck.fat 4.2 (2021-01-31) Feb 13 04:50:09.235054 systemd-fsck[1088]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 13 04:50:09.235809 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 04:50:09.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.255410 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.256200 systemd[1]: Mounting boot.mount... Feb 13 04:50:09.275371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.294374 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.314370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.315915 systemd[1]: Mounted boot.mount. Feb 13 04:50:09.334370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.346215 systemd[1]: Finished systemd-boot-update.service. Feb 13 04:50:09.353370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.372369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.374783 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 04:50:09.380116 ldconfig[1079]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 04:50:09.391368 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.407597 systemd[1]: Finished ldconfig.service. Feb 13 04:50:09.410368 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:09.426244 systemd[1]: Starting audit-rules.service... Feb 13 04:50:09.430369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.442000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 04:50:09.442000 audit[1109]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcaf457170 a2=420 a3=0 items=0 ppid=1094 pid=1109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:09.442000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 04:50:09.443231 augenrules[1109]: No rules Feb 13 04:50:09.446035 systemd[1]: Starting clean-ca-certificates.service... Feb 13 04:50:09.449404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.466983 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 04:50:09.468423 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.487116 systemd[1]: Starting systemd-resolved.service... Feb 13 04:50:09.487369 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.505212 systemd[1]: Starting systemd-timesyncd.service... Feb 13 04:50:09.505371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.521947 systemd[1]: Starting systemd-update-utmp.service... Feb 13 04:50:09.523424 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.538707 systemd[1]: Finished audit-rules.service. Feb 13 04:50:09.540423 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.555591 systemd[1]: Finished clean-ca-certificates.service. Feb 13 04:50:09.557406 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.574415 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.574610 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 04:50:09.591425 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.594115 systemd[1]: Finished systemd-update-utmp.service. Feb 13 04:50:09.607371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.623411 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.624032 systemd[1]: Starting systemd-update-done.service... Feb 13 04:50:09.638372 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.648021 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 04:50:09.648181 systemd[1]: Finished systemd-update-done.service. Feb 13 04:50:09.652371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.667420 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.671202 systemd[1]: Started systemd-timesyncd.service. Feb 13 04:50:09.672615 systemd-resolved[1116]: Positive Trust Anchors: Feb 13 04:50:09.672620 systemd-resolved[1116]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 04:50:09.672638 systemd-resolved[1116]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 04:50:09.681421 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.691010 systemd-resolved[1116]: Using system hostname 'ci-3510.3.2-a-89e2fcf2e7'. Feb 13 04:50:09.695412 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.706073 systemd[1]: Reached target time-set.target. Feb 13 04:50:09.709483 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.724485 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.737398 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.750553 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.763500 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.774407 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.785399 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.796412 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.808407 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.819402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.830400 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.842406 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.854401 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.866400 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.878411 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.890408 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.901408 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.912408 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.913936 systemd-networkd[1019]: bond0: Gained carrier Feb 13 04:50:09.914045 systemd-networkd[1019]: enp1s0f0np0: Gained carrier Feb 13 04:50:09.914095 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:09.914952 systemd[1]: Started systemd-resolved.service. Feb 13 04:50:09.924402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:50:09.924425 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 04:50:09.933615 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:09.933724 systemd-networkd[1019]: enp1s0f1np1: Link DOWN Feb 13 04:50:09.933727 systemd-networkd[1019]: enp1s0f1np1: Lost carrier Feb 13 04:50:09.941777 systemd[1]: Reached target network.target. Feb 13 04:50:09.943514 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:09.943618 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:09.950403 systemd[1]: Reached target nss-lookup.target. Feb 13 04:50:09.959414 systemd[1]: Reached target sysinit.target. Feb 13 04:50:09.967538 systemd[1]: Started motdgen.path. Feb 13 04:50:09.975540 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 04:50:09.986575 systemd[1]: Started logrotate.timer. Feb 13 04:50:09.993627 systemd[1]: Started mdadm.timer. Feb 13 04:50:10.000461 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 04:50:10.008547 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 04:50:10.008619 systemd[1]: Reached target paths.target. Feb 13 04:50:10.015564 systemd[1]: Reached target timers.target. Feb 13 04:50:10.023094 systemd[1]: Listening on dbus.socket. Feb 13 04:50:10.029986 systemd[1]: Starting docker.socket... Feb 13 04:50:10.037837 systemd[1]: Listening on sshd.socket. Feb 13 04:50:10.044491 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 04:50:10.044731 systemd[1]: Listening on docker.socket. Feb 13 04:50:10.051479 systemd[1]: Reached target sockets.target. Feb 13 04:50:10.059397 systemd[1]: Reached target basic.target. Feb 13 04:50:10.066553 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 04:50:10.066568 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 04:50:10.067027 systemd[1]: Starting containerd.service... Feb 13 04:50:10.075009 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 04:50:10.084059 systemd[1]: Starting coreos-metadata.service... Feb 13 04:50:10.092963 systemd[1]: Starting dbus.service... Feb 13 04:50:10.100988 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 04:50:10.110463 systemd[1]: Starting extend-filesystems.service... Feb 13 04:50:10.117611 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 04:50:10.119686 jq[1130]: false Feb 13 04:50:10.120328 systemd[1]: Starting motdgen.service... Feb 13 04:50:10.128034 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 04:50:10.131688 extend-filesystems[1131]: Found sda Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb1 Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb2 Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb3 Feb 13 04:50:10.142501 extend-filesystems[1131]: Found usr Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb4 Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb6 Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb7 Feb 13 04:50:10.142501 extend-filesystems[1131]: Found sdb9 Feb 13 04:50:10.142501 extend-filesystems[1131]: Checking size of /dev/sdb9 Feb 13 04:50:10.142501 extend-filesystems[1131]: Resized partition /dev/sdb9 Feb 13 04:50:10.321450 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 13 04:50:10.321482 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 04:50:10.321579 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 04:50:10.321594 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 04:50:10.321605 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 04:50:10.321615 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 04:50:10.321631 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 04:50:10.137328 dbus-daemon[1129]: [system] SELinux support is enabled Feb 13 04:50:10.136150 systemd[1]: Starting sshd-keygen.service... Feb 13 04:50:10.321852 coreos-metadata[1125]: Feb 13 04:50:10.162 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 04:50:10.321945 coreos-metadata[1126]: Feb 13 04:50:10.162 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 04:50:10.322031 extend-filesystems[1152]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 04:50:10.316593 dbus-daemon[1129]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 04:50:10.157870 systemd[1]: Starting systemd-logind.service... Feb 13 04:50:10.172422 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 04:50:10.337962 update_engine[1161]: I0213 04:50:10.244791 1161 main.cc:92] Flatcar Update Engine starting Feb 13 04:50:10.337962 update_engine[1161]: I0213 04:50:10.248025 1161 update_check_scheduler.cc:74] Next update check in 6m27s Feb 13 04:50:10.173211 systemd[1]: Starting tcsd.service... Feb 13 04:50:10.338139 jq[1162]: true Feb 13 04:50:10.182373 systemd-logind[1157]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 04:50:10.182383 systemd-logind[1157]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 04:50:10.338400 jq[1164]: false Feb 13 04:50:10.182393 systemd-logind[1157]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.324769160Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.333687426Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.333746965Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334310605Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.1 Feb 13 04:50:10.338487 env[1165]: 48-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334325941Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334427796Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter Feb 13 04:50:10.338487 env[1165]: : skip plugin" type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334437660Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334446449Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334451910Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334497908Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338487 env[1165]: time="2024-02-13T04:50:10.334664110Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:50:10.182543 systemd-logind[1157]: New seat seat0. Feb 13 04:50:10.338813 env[1165]: time="2024-02-13T04:50:10.334735523Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 04:50:10.338813 env[1165]: time="2024-02-13T04:50:10.334745292Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 04:50:10.338813 env[1165]: time="2024-02-13T04:50:10.334770051Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 04:50:10.338813 env[1165]: time="2024-02-13T04:50:10.334778462Z" level=info msg="metadata content store policy set" policy=shared Feb 13 04:50:10.185747 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 04:50:10.186164 systemd[1]: Starting update-engine.service... Feb 13 04:50:10.214537 systemd-networkd[1019]: enp1s0f1np1: Link UP Feb 13 04:50:10.214685 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:10.214693 systemd-networkd[1019]: enp1s0f1np1: Gained carrier Feb 13 04:50:10.214724 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:10.244037 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 04:50:10.250792 systemd[1]: Started dbus.service. Feb 13 04:50:10.258556 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:10.258598 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:10.258658 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:10.275053 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 04:50:10.275139 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 04:50:10.275286 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 04:50:10.275361 systemd[1]: Finished motdgen.service. Feb 13 04:50:10.292518 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 04:50:10.292586 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 04:50:10.316962 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 13 04:50:10.317041 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 13 04:50:10.321209 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 04:50:10.321295 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 04:50:10.321359 systemd[1]: Started update-engine.service. Feb 13 04:50:10.332195 systemd[1]: Started systemd-logind.service. Feb 13 04:50:10.347122 systemd[1]: Started locksmithd.service. Feb 13 04:50:10.347494 env[1165]: time="2024-02-13T04:50:10.347463847Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 04:50:10.347494 env[1165]: time="2024-02-13T04:50:10.347478553Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 04:50:10.347494 env[1165]: time="2024-02-13T04:50:10.347486978Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 04:50:10.347553 env[1165]: time="2024-02-13T04:50:10.347507622Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347553 env[1165]: time="2024-02-13T04:50:10.347517320Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347553 env[1165]: time="2024-02-13T04:50:10.347525546Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347553 env[1165]: time="2024-02-13T04:50:10.347532164Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347553 env[1165]: time="2024-02-13T04:50:10.347539137Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347553 env[1165]: time="2024-02-13T04:50:10.347546360Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347649 env[1165]: time="2024-02-13T04:50:10.347556818Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347649 env[1165]: time="2024-02-13T04:50:10.347568196Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347649 env[1165]: time="2024-02-13T04:50:10.347575746Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 04:50:10.347649 env[1165]: time="2024-02-13T04:50:10.347624376Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 04:50:10.347708 env[1165]: time="2024-02-13T04:50:10.347679659Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 04:50:10.347882 env[1165]: time="2024-02-13T04:50:10.347844855Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 04:50:10.347882 env[1165]: time="2024-02-13T04:50:10.347866875Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.347882 env[1165]: time="2024-02-13T04:50:10.347875883Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 04:50:10.347936 env[1165]: time="2024-02-13T04:50:10.347902333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.347936 env[1165]: time="2024-02-13T04:50:10.347910317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.347936 env[1165]: time="2024-02-13T04:50:10.347917946Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.347936 env[1165]: time="2024-02-13T04:50:10.347924415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.347936 env[1165]: time="2024-02-13T04:50:10.347930710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348007 env[1165]: time="2024-02-13T04:50:10.347937334Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348007 env[1165]: time="2024-02-13T04:50:10.347943859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348007 env[1165]: time="2024-02-13T04:50:10.347949853Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348007 env[1165]: time="2024-02-13T04:50:10.347957558Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 04:50:10.348076 env[1165]: time="2024-02-13T04:50:10.348025072Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348076 env[1165]: time="2024-02-13T04:50:10.348033914Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348076 env[1165]: time="2024-02-13T04:50:10.348043021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348076 env[1165]: time="2024-02-13T04:50:10.348053811Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 04:50:10.348076 env[1165]: time="2024-02-13T04:50:10.348061587Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 04:50:10.348076 env[1165]: time="2024-02-13T04:50:10.348068468Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 04:50:10.348163 env[1165]: time="2024-02-13T04:50:10.348078042Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 04:50:10.348163 env[1165]: time="2024-02-13T04:50:10.348098401Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 04:50:10.348232 env[1165]: time="2024-02-13T04:50:10.348207466Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.348238628Z" level=info msg="Connect containerd service" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.348256052Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.348892491Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.348976690Z" level=info msg="Start subscribing containerd event" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349003716Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349008218Z" level=info msg="Start recovering state" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349026202Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349047969Z" level=info msg="containerd successfully booted in 0.024625s" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349051643Z" level=info msg="Start event monitor" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349065682Z" level=info msg="Start snapshots syncer" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349070994Z" level=info msg="Start cni network conf syncer for default" Feb 13 04:50:10.351056 env[1165]: time="2024-02-13T04:50:10.349075158Z" level=info msg="Start streaming server" Feb 13 04:50:10.353519 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 04:50:10.353626 systemd[1]: Reached target system-config.target. Feb 13 04:50:10.361461 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 04:50:10.361554 systemd[1]: Reached target user-config.target. Feb 13 04:50:10.371382 systemd[1]: Started containerd.service. Feb 13 04:50:10.411896 locksmithd[1183]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 04:50:10.569187 sshd_keygen[1153]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 04:50:10.582239 systemd[1]: Finished sshd-keygen.service. Feb 13 04:50:10.590413 systemd[1]: Starting issuegen.service... Feb 13 04:50:10.598645 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 04:50:10.598717 systemd[1]: Finished issuegen.service. Feb 13 04:50:10.607223 systemd[1]: Starting systemd-user-sessions.service... Feb 13 04:50:10.615672 systemd[1]: Finished systemd-user-sessions.service. Feb 13 04:50:10.628369 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 13 04:50:10.630134 systemd[1]: Started getty@tty1.service. Feb 13 04:50:10.637035 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 04:50:10.645571 systemd[1]: Reached target getty.target. Feb 13 04:50:10.655557 extend-filesystems[1152]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 13 04:50:10.655557 extend-filesystems[1152]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 04:50:10.655557 extend-filesystems[1152]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 13 04:50:10.688524 extend-filesystems[1131]: Resized filesystem in /dev/sdb9 Feb 13 04:50:10.655963 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 04:50:10.656051 systemd[1]: Finished extend-filesystems.service. Feb 13 04:50:10.944533 systemd-networkd[1019]: bond0: Gained IPv6LL Feb 13 04:50:10.944785 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:11.776752 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:11.776874 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:11.777699 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 04:50:11.787790 systemd[1]: Reached target network-online.target. Feb 13 04:50:12.181451 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 04:50:15.656934 login[1209]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 04:50:15.664877 systemd-logind[1157]: New session 1 of user core. Feb 13 04:50:15.665661 systemd[1]: Created slice user-500.slice. Feb 13 04:50:15.666271 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 04:50:15.667013 login[1208]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 04:50:15.669091 systemd-logind[1157]: New session 2 of user core. Feb 13 04:50:15.671556 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 04:50:15.672313 systemd[1]: Starting user@500.service... Feb 13 04:50:15.674355 (systemd)[1214]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:15.740273 systemd[1214]: Queued start job for default target default.target. Feb 13 04:50:15.740513 systemd[1214]: Reached target paths.target. Feb 13 04:50:15.740530 systemd[1214]: Reached target sockets.target. Feb 13 04:50:15.740543 systemd[1214]: Reached target timers.target. Feb 13 04:50:15.740554 systemd[1214]: Reached target basic.target. Feb 13 04:50:15.740582 systemd[1214]: Reached target default.target. Feb 13 04:50:15.740603 systemd[1214]: Startup finished in 63ms. Feb 13 04:50:15.740641 systemd[1]: Started user@500.service. Feb 13 04:50:15.741239 systemd[1]: Started session-1.scope. Feb 13 04:50:15.741621 systemd[1]: Started session-2.scope. Feb 13 04:50:16.321259 coreos-metadata[1125]: Feb 13 04:50:16.321 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 04:50:16.321646 coreos-metadata[1126]: Feb 13 04:50:16.321 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 04:50:16.775413 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 04:50:16.782400 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 04:50:17.321799 coreos-metadata[1126]: Feb 13 04:50:17.321 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 04:50:17.322578 coreos-metadata[1125]: Feb 13 04:50:17.321 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 04:50:17.354217 coreos-metadata[1125]: Feb 13 04:50:17.354 INFO Fetch successful Feb 13 04:50:17.354589 coreos-metadata[1126]: Feb 13 04:50:17.354 INFO Fetch successful Feb 13 04:50:17.381012 systemd[1]: Finished coreos-metadata.service. Feb 13 04:50:17.381954 systemd[1]: Starting etcd-member.service... Feb 13 04:50:17.382010 unknown[1125]: wrote ssh authorized keys file for user: core Feb 13 04:50:17.382681 systemd[1]: Started packet-phone-home.service. Feb 13 04:50:17.389958 curl[1237]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 04:50:17.390132 curl[1237]: Dload Upload Total Spent Left Speed Feb 13 04:50:17.399335 update-ssh-keys[1238]: Updated "/home/core/.ssh/authorized_keys" Feb 13 04:50:17.399686 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 04:50:17.401089 systemd[1]: Starting docker.service... Feb 13 04:50:17.418783 env[1253]: time="2024-02-13T04:50:17.418727677Z" level=info msg="Starting up" Feb 13 04:50:17.419340 env[1253]: time="2024-02-13T04:50:17.419304709Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 04:50:17.419340 env[1253]: time="2024-02-13T04:50:17.419313867Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 04:50:17.419391 env[1253]: time="2024-02-13T04:50:17.419343600Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 04:50:17.419391 env[1253]: time="2024-02-13T04:50:17.419349654Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 04:50:17.420243 env[1253]: time="2024-02-13T04:50:17.420205554Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 04:50:17.420243 env[1253]: time="2024-02-13T04:50:17.420213224Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 04:50:17.420243 env[1253]: time="2024-02-13T04:50:17.420220181Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 04:50:17.420243 env[1253]: time="2024-02-13T04:50:17.420225247Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 04:50:17.434288 env[1253]: time="2024-02-13T04:50:17.434248643Z" level=info msg="Loading containers: start." Feb 13 04:50:17.534398 kernel: Initializing XFRM netlink socket Feb 13 04:50:17.595663 env[1253]: time="2024-02-13T04:50:17.595619414Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 04:50:17.595729 curl[1237]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 04:50:17.596454 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:17.596475 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 04:50:17.596514 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:17.600088 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:17.600194 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:17.654395 systemd-networkd[1019]: docker0: Link UP Feb 13 04:50:17.654573 systemd-timesyncd[1117]: Network configuration changed, trying to establish connection. Feb 13 04:50:17.660148 env[1253]: time="2024-02-13T04:50:17.660102090Z" level=info msg="Loading containers: done." Feb 13 04:50:17.667980 env[1253]: time="2024-02-13T04:50:17.667942078Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 04:50:17.668188 env[1253]: time="2024-02-13T04:50:17.668145700Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 04:50:17.668091 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1121919733-merged.mount: Deactivated successfully. Feb 13 04:50:17.668397 env[1253]: time="2024-02-13T04:50:17.668257235Z" level=info msg="Daemon has completed initialization" Feb 13 04:50:17.679558 systemd[1]: Started docker.service. Feb 13 04:50:17.688781 env[1253]: time="2024-02-13T04:50:17.688706199Z" level=info msg="API listen on /run/docker.sock" Feb 13 04:50:17.690385 etcd-wrapper[1242]: Error response from daemon: No such container: etcd-member Feb 13 04:50:17.737444 etcd-wrapper[1377]: Error: No such container: etcd-member Feb 13 04:50:17.825334 etcd-wrapper[1399]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 04:50:18.233471 systemd[1]: Created slice system-sshd.slice. Feb 13 04:50:18.236671 systemd[1]: Started sshd@0-139.178.90.101:22-139.178.68.195:39110.service. Feb 13 04:50:18.292489 sshd[1412]: Accepted publickey for core from 139.178.68.195 port 39110 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:18.295624 sshd[1412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:18.305851 systemd-logind[1157]: New session 3 of user core. Feb 13 04:50:18.308295 systemd[1]: Started session-3.scope. Feb 13 04:50:18.374438 systemd[1]: Started sshd@1-139.178.90.101:22-139.178.68.195:39112.service. Feb 13 04:50:18.404903 sshd[1417]: Accepted publickey for core from 139.178.68.195 port 39112 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:18.405588 sshd[1417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:18.407934 systemd-logind[1157]: New session 4 of user core. Feb 13 04:50:18.408398 systemd[1]: Started session-4.scope. Feb 13 04:50:18.472181 sshd[1417]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:18.478832 systemd[1]: sshd@1-139.178.90.101:22-139.178.68.195:39112.service: Deactivated successfully. Feb 13 04:50:18.480501 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 04:50:18.482285 systemd-logind[1157]: Session 4 logged out. Waiting for processes to exit. Feb 13 04:50:18.484734 systemd[1]: Started sshd@2-139.178.90.101:22-139.178.68.195:39128.service. Feb 13 04:50:18.487141 systemd-logind[1157]: Removed session 4. Feb 13 04:50:18.541497 sshd[1423]: Accepted publickey for core from 139.178.68.195 port 39128 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:18.544689 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:18.554871 systemd-logind[1157]: New session 5 of user core. Feb 13 04:50:18.557234 systemd[1]: Started session-5.scope. Feb 13 04:50:18.636597 sshd[1423]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:18.642163 systemd[1]: sshd@2-139.178.90.101:22-139.178.68.195:39128.service: Deactivated successfully. Feb 13 04:50:18.643942 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 04:50:18.645634 systemd-logind[1157]: Session 5 logged out. Waiting for processes to exit. Feb 13 04:50:18.647962 systemd-logind[1157]: Removed session 5. Feb 13 04:50:19.121206 etcd-wrapper[1399]: v3.5.0: Pulling from coreos/etcd Feb 13 04:50:19.440991 etcd-wrapper[1399]: 1813d21adc01: Pulling fs layer Feb 13 04:50:19.440991 etcd-wrapper[1399]: 6e96907ab677: Pulling fs layer Feb 13 04:50:19.440991 etcd-wrapper[1399]: 444ed0ea8673: Pulling fs layer Feb 13 04:50:19.440991 etcd-wrapper[1399]: 0fd2df5633f0: Pulling fs layer Feb 13 04:50:19.440991 etcd-wrapper[1399]: 8cc22b9456bb: Pulling fs layer Feb 13 04:50:19.440991 etcd-wrapper[1399]: 7ac70aecd290: Pulling fs layer Feb 13 04:50:19.440991 etcd-wrapper[1399]: 4b376c64dfe4: Pulling fs layer Feb 13 04:50:19.441809 etcd-wrapper[1399]: 7ac70aecd290: Waiting Feb 13 04:50:19.441809 etcd-wrapper[1399]: 8cc22b9456bb: Waiting Feb 13 04:50:19.441809 etcd-wrapper[1399]: 4b376c64dfe4: Waiting Feb 13 04:50:19.795056 etcd-wrapper[1399]: 444ed0ea8673: Verifying Checksum Feb 13 04:50:19.795056 etcd-wrapper[1399]: 444ed0ea8673: Download complete Feb 13 04:50:19.811505 etcd-wrapper[1399]: 6e96907ab677: Verifying Checksum Feb 13 04:50:19.811505 etcd-wrapper[1399]: 6e96907ab677: Download complete Feb 13 04:50:19.866448 etcd-wrapper[1399]: 1813d21adc01: Verifying Checksum Feb 13 04:50:19.866448 etcd-wrapper[1399]: 1813d21adc01: Download complete Feb 13 04:50:20.116655 etcd-wrapper[1399]: 8cc22b9456bb: Verifying Checksum Feb 13 04:50:20.116655 etcd-wrapper[1399]: 8cc22b9456bb: Download complete Feb 13 04:50:20.123408 etcd-wrapper[1399]: 0fd2df5633f0: Verifying Checksum Feb 13 04:50:20.123408 etcd-wrapper[1399]: 0fd2df5633f0: Download complete Feb 13 04:50:20.170108 etcd-wrapper[1399]: 7ac70aecd290: Verifying Checksum Feb 13 04:50:20.170108 etcd-wrapper[1399]: 7ac70aecd290: Download complete Feb 13 04:50:20.435502 etcd-wrapper[1399]: 1813d21adc01: Pull complete Feb 13 04:50:20.469416 etcd-wrapper[1399]: 4b376c64dfe4: Verifying Checksum Feb 13 04:50:20.699614 systemd[1]: var-lib-docker-overlay2-48b9bd89e5af0f527760900549a249bb14a6a4e91ebd0f28fe922e636d3abfd6-merged.mount: Deactivated successfully. Feb 13 04:50:20.925945 etcd-wrapper[1399]: 6e96907ab677: Pull complete Feb 13 04:50:21.082484 systemd[1]: var-lib-docker-overlay2-43753495d32982c6a013db95f2f67fbf633e01e4754bad2024653ef6d3caf59c-merged.mount: Deactivated successfully. Feb 13 04:50:21.130111 etcd-wrapper[1399]: 444ed0ea8673: Pull complete Feb 13 04:50:21.393966 etcd-wrapper[1399]: 0fd2df5633f0: Pull complete Feb 13 04:50:21.423115 etcd-wrapper[1399]: 8cc22b9456bb: Pull complete Feb 13 04:50:21.440247 systemd[1]: var-lib-docker-overlay2-2f855616b5cb67aec65918e400d74f8a90444e55bf886d1b4dc6a2ddf918e239-merged.mount: Deactivated successfully. Feb 13 04:50:21.442822 systemd[1]: var-lib-docker-overlay2-64e6453a2de11c71af27b3c6a430c4a64b9b076fc0483ef474fb18918fe5fcab-merged.mount: Deactivated successfully. Feb 13 04:50:21.446414 etcd-wrapper[1399]: 7ac70aecd290: Pull complete Feb 13 04:50:21.465231 systemd[1]: var-lib-docker-overlay2-169e0b3b20028b5f8d08541e1a25b083b532b3c850bd4cb91bbf7a360b9ddd7c-merged.mount: Deactivated successfully. Feb 13 04:50:21.467912 etcd-wrapper[1399]: 4b376c64dfe4: Pull complete Feb 13 04:50:21.470764 etcd-wrapper[1399]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 04:50:21.471787 etcd-wrapper[1399]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 04:50:21.511984 env[1165]: time="2024-02-13T04:50:21.511944583Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:50:21.511984 env[1165]: time="2024-02-13T04:50:21.511967641Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:50:21.511984 env[1165]: time="2024-02-13T04:50:21.511975381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:50:21.512280 env[1165]: time="2024-02-13T04:50:21.512055228Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/4fc43b060ec6d7728ab616fb22a60bdff9e84490c7b3ba4a4e5e6be244b8fd65 pid=1586 runtime=io.containerd.runc.v2 Feb 13 04:50:21.518597 systemd[1]: Started docker-4fc43b060ec6d7728ab616fb22a60bdff9e84490c7b3ba4a4e5e6be244b8fd65.scope. Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"info","ts":1707799821.5512123,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"info","ts":1707799821.5512607,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"e90559d575c04285a018ab3720945707"} Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"warn","ts":1707799821.5512786,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"warn","ts":1707799821.5512836,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"warn","ts":1707799821.5512877,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"warn","ts":1707799821.551291,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 04:50:21.551400 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.551Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.35:2379"]} Feb 13 04:50:21.551620 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.551Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 04:50:21.551764 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.551Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 04:50:21.551994 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.551Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"e90559d575c04285a018ab3720945707","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"e90559d575c04285a018ab3720945707=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 04:50:21.553057 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.552Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"672.252µs"} Feb 13 04:50:21.554281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.554Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 04:50:21.554281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.554Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 04:50:21.554281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.554Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 04:50:21.554281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.554Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 04:50:21.554281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.554Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 04:50:21.554281 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.554Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 04:50:21.555336 etcd-wrapper[1399]: {"level":"warn","ts":"2024-02-13T04:50:21.555Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 04:50:21.556156 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.555Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 04:50:21.556498 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.556Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 04:50:21.556754 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.556Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 04:50:21.556829 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.556Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 04:50:21.556982 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.556Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 04:50:21.557010 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.556Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 04:50:21.557985 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.557Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 04:50:21.557985 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.557Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 04:50:21.557985 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:21.557Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 04:50:22.055061 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 04:50:22.056026 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.054Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 04:50:22.056149 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.055Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 04:50:22.056149 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.055Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 04:50:22.056149 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.055Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:e90559d575c04285a018ab3720945707 ClientURLs:[http://10.67.80.35:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 04:50:22.056149 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.055Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 04:50:22.056149 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.055Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 04:50:22.056706 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.056Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 04:50:22.056706 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.056Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 04:50:22.056726 systemd[1]: Started etcd-member.service. Feb 13 04:50:22.057554 systemd[1]: Reached target multi-user.target. Feb 13 04:50:22.058316 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T04:50:22.057Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 04:50:22.061272 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 04:50:22.065646 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 04:50:22.065734 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 04:50:22.065862 systemd[1]: Startup finished in 1.908s (kernel) + 6.218s (initrd) + 19.011s (userspace) = 27.139s. Feb 13 04:50:22.442583 systemd[1]: var-lib-docker-overlay2-3d6ae5de131f53105d110561dc65833f9b5dc33900e7307f99516db27f4de886\x2dinit-merged.mount: Deactivated successfully. Feb 13 04:50:28.645360 systemd[1]: Started sshd@3-139.178.90.101:22-139.178.68.195:51736.service. Feb 13 04:50:28.676773 sshd[1634]: Accepted publickey for core from 139.178.68.195 port 51736 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:28.677712 sshd[1634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:28.681111 systemd-logind[1157]: New session 6 of user core. Feb 13 04:50:28.681880 systemd[1]: Started session-6.scope. Feb 13 04:50:28.737968 sshd[1634]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:28.739377 systemd[1]: sshd@3-139.178.90.101:22-139.178.68.195:51736.service: Deactivated successfully. Feb 13 04:50:28.739704 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 04:50:28.740060 systemd-logind[1157]: Session 6 logged out. Waiting for processes to exit. Feb 13 04:50:28.740570 systemd[1]: Started sshd@4-139.178.90.101:22-139.178.68.195:51740.service. Feb 13 04:50:28.740967 systemd-logind[1157]: Removed session 6. Feb 13 04:50:28.771683 sshd[1640]: Accepted publickey for core from 139.178.68.195 port 51740 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:28.772683 sshd[1640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:28.776196 systemd-logind[1157]: New session 7 of user core. Feb 13 04:50:28.776926 systemd[1]: Started session-7.scope. Feb 13 04:50:28.833183 sshd[1640]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:28.839778 systemd[1]: sshd@4-139.178.90.101:22-139.178.68.195:51740.service: Deactivated successfully. Feb 13 04:50:28.840200 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 04:50:28.840639 systemd-logind[1157]: Session 7 logged out. Waiting for processes to exit. Feb 13 04:50:28.841060 systemd[1]: Started sshd@5-139.178.90.101:22-139.178.68.195:51754.service. Feb 13 04:50:28.841401 systemd-logind[1157]: Removed session 7. Feb 13 04:50:28.872388 sshd[1646]: Accepted publickey for core from 139.178.68.195 port 51754 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:28.873395 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:28.877038 systemd-logind[1157]: New session 8 of user core. Feb 13 04:50:28.877780 systemd[1]: Started session-8.scope. Feb 13 04:50:28.933556 sshd[1646]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:28.935093 systemd[1]: sshd@5-139.178.90.101:22-139.178.68.195:51754.service: Deactivated successfully. Feb 13 04:50:28.935396 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 04:50:28.935760 systemd-logind[1157]: Session 8 logged out. Waiting for processes to exit. Feb 13 04:50:28.936242 systemd[1]: Started sshd@6-139.178.90.101:22-139.178.68.195:51758.service. Feb 13 04:50:28.936721 systemd-logind[1157]: Removed session 8. Feb 13 04:50:28.967793 sshd[1653]: Accepted publickey for core from 139.178.68.195 port 51758 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:28.968875 sshd[1653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:28.972761 systemd-logind[1157]: New session 9 of user core. Feb 13 04:50:28.973572 systemd[1]: Started session-9.scope. Feb 13 04:50:29.057659 sudo[1656]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 04:50:29.058255 sudo[1656]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:50:29.071781 dbus-daemon[1129]: \xd0͡\x8c\xa5U: received setenforce notice (enforcing=1296447360) Feb 13 04:50:29.076685 sudo[1656]: pam_unix(sudo:session): session closed for user root Feb 13 04:50:29.081877 sshd[1653]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:29.088823 systemd[1]: sshd@6-139.178.90.101:22-139.178.68.195:51758.service: Deactivated successfully. Feb 13 04:50:29.090510 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 04:50:29.092284 systemd-logind[1157]: Session 9 logged out. Waiting for processes to exit. Feb 13 04:50:29.094897 systemd[1]: Started sshd@7-139.178.90.101:22-139.178.68.195:51762.service. Feb 13 04:50:29.097354 systemd-logind[1157]: Removed session 9. Feb 13 04:50:29.164796 sshd[1660]: Accepted publickey for core from 139.178.68.195 port 51762 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:29.168059 sshd[1660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:29.178446 systemd-logind[1157]: New session 10 of user core. Feb 13 04:50:29.180902 systemd[1]: Started session-10.scope. Feb 13 04:50:29.254609 sudo[1664]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 04:50:29.254728 sudo[1664]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:50:29.256560 sudo[1664]: pam_unix(sudo:session): session closed for user root Feb 13 04:50:29.258868 sudo[1663]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 04:50:29.258975 sudo[1663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:50:29.264349 systemd[1]: Stopping audit-rules.service... Feb 13 04:50:29.264000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 04:50:29.265230 auditctl[1667]: No rules Feb 13 04:50:29.265603 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 04:50:29.265786 systemd[1]: Stopped audit-rules.service. Feb 13 04:50:29.267490 systemd[1]: Starting audit-rules.service... Feb 13 04:50:29.270696 kernel: kauditd_printk_skb: 367 callbacks suppressed Feb 13 04:50:29.270743 kernel: audit: type=1305 audit(1707799829.264:130): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 04:50:29.264000 audit[1667]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3d5981c0 a2=420 a3=0 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:29.288238 augenrules[1684]: No rules Feb 13 04:50:29.288708 systemd[1]: Finished audit-rules.service. Feb 13 04:50:29.289323 sudo[1663]: pam_unix(sudo:session): session closed for user root Feb 13 04:50:29.290213 sshd[1660]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:29.292837 systemd[1]: sshd@7-139.178.90.101:22-139.178.68.195:51762.service: Deactivated successfully. Feb 13 04:50:29.293467 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 04:50:29.294087 systemd-logind[1157]: Session 10 logged out. Waiting for processes to exit. Feb 13 04:50:29.295291 systemd[1]: Started sshd@8-139.178.90.101:22-139.178.68.195:51764.service. Feb 13 04:50:29.296152 systemd-logind[1157]: Removed session 10. Feb 13 04:50:29.317234 kernel: audit: type=1300 audit(1707799829.264:130): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3d5981c0 a2=420 a3=0 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:29.317289 kernel: audit: type=1327 audit(1707799829.264:130): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 04:50:29.264000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 04:50:29.326798 kernel: audit: type=1131 audit(1707799829.265:131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.349279 kernel: audit: type=1130 audit(1707799829.288:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.351982 sshd[1690]: Accepted publickey for core from 139.178.68.195 port 51764 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:29.352669 sshd[1690]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:29.355043 systemd-logind[1157]: New session 11 of user core. Feb 13 04:50:29.356102 systemd[1]: Started session-11.scope. Feb 13 04:50:29.371742 kernel: audit: type=1106 audit(1707799829.288:133): pid=1663 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.288000 audit[1663]: USER_END pid=1663 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.397799 kernel: audit: type=1104 audit(1707799829.289:134): pid=1663 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.289000 audit[1663]: CRED_DISP pid=1663 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.403298 sshd[1690]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:29.405477 systemd[1]: sshd@8-139.178.90.101:22-139.178.68.195:51764.service: Deactivated successfully. Feb 13 04:50:29.405997 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 04:50:29.406525 systemd-logind[1157]: Session 11 logged out. Waiting for processes to exit. Feb 13 04:50:29.407456 systemd[1]: Started sshd@9-139.178.90.101:22-139.178.68.195:51770.service. Feb 13 04:50:29.408147 systemd-logind[1157]: Removed session 11. Feb 13 04:50:29.421443 kernel: audit: type=1106 audit(1707799829.290:135): pid=1660 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.290000 audit[1660]: USER_END pid=1660 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.453745 kernel: audit: type=1104 audit(1707799829.290:136): pid=1660 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.290000 audit[1660]: CRED_DISP pid=1660 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.479000 sshd[1698]: Accepted publickey for core from 139.178.68.195 port 51770 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:50:29.479796 kernel: audit: type=1131 audit(1707799829.292:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-139.178.68.195:51762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-139.178.68.195:51762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.479983 sshd[1698]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:50:29.482505 systemd-logind[1157]: New session 12 of user core. Feb 13 04:50:29.483615 systemd[1]: Started session-12.scope. Feb 13 04:50:29.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-139.178.68.195:51764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.351000 audit[1690]: USER_ACCT pid=1690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.352000 audit[1690]: CRED_ACQ pid=1690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.352000 audit[1690]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa5968090 a2=3 a3=0 items=0 ppid=1 pid=1690 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:29.352000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 04:50:29.358000 audit[1690]: USER_START pid=1690 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.358000 audit[1692]: CRED_ACQ pid=1692 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.403000 audit[1690]: USER_END pid=1690 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.403000 audit[1690]: CRED_DISP pid=1690 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-139.178.68.195:51764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-139.178.68.195:51770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.478000 audit[1698]: USER_ACCT pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.479000 audit[1698]: CRED_ACQ pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.479000 audit[1698]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff57a09e70 a2=3 a3=0 items=0 ppid=1 pid=1698 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:50:29.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 04:50:29.485000 audit[1698]: USER_START pid=1698 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.486000 audit[1700]: CRED_ACQ pid=1700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.865020 sshd[1698]: pam_unix(sshd:session): session closed for user core Feb 13 04:50:29.867000 audit[1698]: USER_END pid=1698 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.867000 audit[1698]: CRED_DISP pid=1698 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:50:29.870960 systemd[1]: sshd@9-139.178.90.101:22-139.178.68.195:51770.service: Deactivated successfully. Feb 13 04:50:29.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-139.178.68.195:51770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:50:29.872645 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 04:50:29.874391 systemd-logind[1157]: Session 12 logged out. Waiting for processes to exit. Feb 13 04:50:29.876686 systemd-logind[1157]: Removed session 12. Feb 13 04:50:48.593086 systemd-resolved[1116]: Clock change detected. Flushing caches. Feb 13 04:50:48.593457 systemd-timesyncd[1117]: Contacted time server [2600:3c02:e000:bc::123:0]:123 (2.flatcar.pool.ntp.org). Feb 13 04:50:48.593595 systemd-timesyncd[1117]: Initial clock synchronization to Tue 2024-02-13 04:50:48.592914 UTC. Feb 13 04:50:56.401929 update_engine[1161]: I0213 04:50:56.401811 1161 update_attempter.cc:509] Updating boot flags... Feb 13 04:51:15.749958 systemd[1]: Started sshd@10-139.178.90.101:22-61.177.172.136:19404.service. Feb 13 04:51:15.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-61.177.172.136:19404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:15.755585 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 13 04:51:15.755623 kernel: audit: type=1130 audit(1707799875.748:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-61.177.172.136:19404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:16.758366 sshd[1736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 04:51:16.757000 audit[1736]: USER_AUTH pid=1736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:16.836426 kernel: audit: type=1100 audit(1707799876.757:157): pid=1736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:18.545846 sshd[1736]: Failed password for root from 61.177.172.136 port 19404 ssh2 Feb 13 04:51:20.123000 audit[1736]: USER_AUTH pid=1736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:20.203337 kernel: audit: type=1100 audit(1707799880.123:158): pid=1736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:22.127101 sshd[1736]: Failed password for root from 61.177.172.136 port 19404 ssh2 Feb 13 04:51:23.490000 audit[1736]: USER_AUTH pid=1736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:23.572195 kernel: audit: type=1100 audit(1707799883.490:159): pid=1736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:25.904754 sshd[1736]: Failed password for root from 61.177.172.136 port 19404 ssh2 Feb 13 04:51:26.855386 sshd[1736]: Received disconnect from 61.177.172.136 port 19404:11: [preauth] Feb 13 04:51:26.855386 sshd[1736]: Disconnected from authenticating user root 61.177.172.136 port 19404 [preauth] Feb 13 04:51:26.855948 sshd[1736]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 04:51:26.858017 systemd[1]: sshd@10-139.178.90.101:22-61.177.172.136:19404.service: Deactivated successfully. Feb 13 04:51:26.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-61.177.172.136:19404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:26.945364 kernel: audit: type=1131 audit(1707799886.858:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-61.177.172.136:19404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:27.016905 systemd[1]: Started sshd@11-139.178.90.101:22-61.177.172.136:36261.service. Feb 13 04:51:27.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-61.177.172.136:36261 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:27.106375 kernel: audit: type=1130 audit(1707799887.016:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-61.177.172.136:36261 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:28.049750 sshd[1741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 04:51:28.049000 audit[1741]: USER_AUTH pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:28.141357 kernel: audit: type=1100 audit(1707799888.049:162): pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:29.817029 sshd[1741]: Failed password for root from 61.177.172.136 port 36261 ssh2 Feb 13 04:51:31.418000 audit[1741]: ANOM_LOGIN_FAILURES pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:31.419249 sshd[1741]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 04:51:31.419000 audit[1741]: USER_AUTH pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:31.573250 kernel: audit: type=2100 audit(1707799891.418:163): pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:31.573282 kernel: audit: type=1100 audit(1707799891.419:164): pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:33.597562 sshd[1741]: Failed password for root from 61.177.172.136 port 36261 ssh2 Feb 13 04:51:34.787000 audit[1741]: USER_AUTH pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:34.880378 kernel: audit: type=1100 audit(1707799894.787:165): pid=1741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:51:37.378752 sshd[1741]: Failed password for root from 61.177.172.136 port 36261 ssh2 Feb 13 04:51:38.157448 sshd[1741]: Received disconnect from 61.177.172.136 port 36261:11: [preauth] Feb 13 04:51:38.157448 sshd[1741]: Disconnected from authenticating user root 61.177.172.136 port 36261 [preauth] Feb 13 04:51:38.157960 sshd[1741]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 04:51:38.160312 systemd[1]: sshd@11-139.178.90.101:22-61.177.172.136:36261.service: Deactivated successfully. Feb 13 04:51:38.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-61.177.172.136:36261 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:38.253244 kernel: audit: type=1131 audit(1707799898.159:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-61.177.172.136:36261 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:38.312920 systemd[1]: Started sshd@12-139.178.90.101:22-61.177.172.136:51674.service. Feb 13 04:51:38.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-61.177.172.136:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:38.405389 kernel: audit: type=1130 audit(1707799898.311:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-61.177.172.136:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:49.568300 systemd[1]: Started sshd@13-139.178.90.101:22-61.177.172.136:61617.service. Feb 13 04:51:49.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-61.177.172.136:61617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:49.660251 kernel: audit: type=1130 audit(1707799909.567:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-61.177.172.136:61617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:54.470458 sshd[1745]: Connection reset by 61.177.172.136 port 51674 [preauth] Feb 13 04:51:54.472306 systemd[1]: sshd@12-139.178.90.101:22-61.177.172.136:51674.service: Deactivated successfully. Feb 13 04:51:54.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-61.177.172.136:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:54.565391 kernel: audit: type=1131 audit(1707799914.471:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-61.177.172.136:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:59.896897 systemd[1]: Started sshd@14-139.178.90.101:22-61.177.172.136:23337.service. Feb 13 04:51:59.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-61.177.172.136:23337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:51:59.988265 kernel: audit: type=1130 audit(1707799919.895:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-61.177.172.136:23337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:52:01.664957 sshd[1751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 04:52:01.664000 audit[1751]: USER_AUTH pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:52:01.757195 kernel: audit: type=1100 audit(1707799921.664:171): pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:52:03.296574 sshd[1751]: Failed password for root from 61.177.172.136 port 23337 ssh2 Feb 13 04:52:05.030000 audit[1751]: USER_AUTH pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:52:05.124377 kernel: audit: type=1100 audit(1707799925.030:172): pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:52:07.877835 sshd[1751]: Failed password for root from 61.177.172.136 port 23337 ssh2 Feb 13 04:52:08.397000 audit[1751]: USER_AUTH pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:52:08.491382 kernel: audit: type=1100 audit(1707799928.397:173): pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 04:52:10.657458 sshd[1751]: Failed password for root from 61.177.172.136 port 23337 ssh2 Feb 13 04:52:11.764615 sshd[1751]: Received disconnect from 61.177.172.136 port 23337:11: [preauth] Feb 13 04:52:11.764615 sshd[1751]: Disconnected from authenticating user root 61.177.172.136 port 23337 [preauth] Feb 13 04:52:11.765132 sshd[1751]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 04:52:11.767183 systemd[1]: sshd@14-139.178.90.101:22-61.177.172.136:23337.service: Deactivated successfully. Feb 13 04:52:11.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-61.177.172.136:23337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:52:11.861392 kernel: audit: type=1131 audit(1707799931.766:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-61.177.172.136:23337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:53:49.573611 sshd[1748]: Timeout before authentication for 61.177.172.136 port 61617 Feb 13 04:53:49.575073 systemd[1]: sshd@13-139.178.90.101:22-61.177.172.136:61617.service: Deactivated successfully. Feb 13 04:53:49.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-61.177.172.136:61617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:53:49.668194 kernel: audit: type=1131 audit(1707800029.575:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-61.177.172.136:61617 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:21.083510 systemd[1]: Started sshd@15-139.178.90.101:22-124.230.124.250:46266.service. Feb 13 04:54:21.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-124.230.124.250:46266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:21.088275 sshd[1762]: kex_exchange_identification: Connection closed by remote host Feb 13 04:54:21.088275 sshd[1762]: Connection closed by 124.230.124.250 port 46266 Feb 13 04:54:21.088492 systemd[1]: sshd@15-139.178.90.101:22-124.230.124.250:46266.service: Deactivated successfully. Feb 13 04:54:21.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-124.230.124.250:46266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:21.268006 kernel: audit: type=1130 audit(1707800061.082:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-124.230.124.250:46266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:21.268039 kernel: audit: type=1131 audit(1707800061.087:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-124.230.124.250:46266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:28.279651 systemd[1]: Started sshd@16-139.178.90.101:22-124.230.124.250:55278.service. Feb 13 04:54:28.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-124.230.124.250:55278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:28.372384 kernel: audit: type=1130 audit(1707800068.278:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-124.230.124.250:55278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:30.942217 sshd[1769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 04:54:30.941000 audit[1769]: USER_AUTH pid=1769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 04:54:31.036243 kernel: audit: type=1100 audit(1707800070.941:179): pid=1769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 04:54:32.694646 sshd[1769]: Failed password for root from 124.230.124.250 port 55278 ssh2 Feb 13 04:54:34.330899 sshd[1769]: Connection closed by authenticating user root 124.230.124.250 port 55278 [preauth] Feb 13 04:54:34.333428 systemd[1]: sshd@16-139.178.90.101:22-124.230.124.250:55278.service: Deactivated successfully. Feb 13 04:54:34.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-124.230.124.250:55278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:34.427385 kernel: audit: type=1131 audit(1707800074.332:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-124.230.124.250:55278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:49.528289 systemd[1]: Started sshd@17-139.178.90.101:22-124.230.124.250:59582.service. Feb 13 04:54:49.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-124.230.124.250:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:54:49.621386 kernel: audit: type=1130 audit(1707800089.527:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-124.230.124.250:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:16.185981 systemd[1]: Started sshd@18-139.178.90.101:22-121.5.191.87:38912.service. Feb 13 04:55:16.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-121.5.191.87:38912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:16.279374 kernel: audit: type=1130 audit(1707800116.184:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-121.5.191.87:38912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:36.598583 systemd[1]: Started sshd@19-139.178.90.101:22-118.195.184.139:10952.service. Feb 13 04:55:36.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-118.195.184.139:10952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:36.690254 kernel: audit: type=1130 audit(1707800136.598:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-118.195.184.139:10952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:38.151827 sshd[1781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 04:55:38.150000 audit[1781]: USER_AUTH pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 04:55:38.245376 kernel: audit: type=1100 audit(1707800138.150:184): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 04:55:39.904253 sshd[1781]: Failed password for root from 118.195.184.139 port 10952 ssh2 Feb 13 04:55:41.509518 sshd[1781]: Received disconnect from 118.195.184.139 port 10952:11: Bye Bye [preauth] Feb 13 04:55:41.509518 sshd[1781]: Disconnected from authenticating user root 118.195.184.139 port 10952 [preauth] Feb 13 04:55:41.511941 systemd[1]: sshd@19-139.178.90.101:22-118.195.184.139:10952.service: Deactivated successfully. Feb 13 04:55:41.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-118.195.184.139:10952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:41.605385 kernel: audit: type=1131 audit(1707800141.512:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-118.195.184.139:10952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:31.223153 systemd[1]: Started sshd@20-139.178.90.101:22-101.43.243.60:37980.service. Feb 13 04:56:31.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-101.43.243.60:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:31.315249 kernel: audit: type=1130 audit(1707800191.222:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-101.43.243.60:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:32.890823 sshd[1785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 04:56:32.889000 audit[1785]: USER_AUTH pid=1785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 04:56:32.983371 kernel: audit: type=1100 audit(1707800192.889:187): pid=1785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 04:56:34.723571 sshd[1785]: Failed password for root from 101.43.243.60 port 37980 ssh2 Feb 13 04:56:36.259290 sshd[1785]: Received disconnect from 101.43.243.60 port 37980:11: Bye Bye [preauth] Feb 13 04:56:36.259290 sshd[1785]: Disconnected from authenticating user root 101.43.243.60 port 37980 [preauth] Feb 13 04:56:36.261783 systemd[1]: sshd@20-139.178.90.101:22-101.43.243.60:37980.service: Deactivated successfully. Feb 13 04:56:36.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-101.43.243.60:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:36.354198 kernel: audit: type=1131 audit(1707800196.261:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-101.43.243.60:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:38.475776 update_engine[1161]: I0213 04:56:38.475661 1161 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 04:56:38.475776 update_engine[1161]: I0213 04:56:38.475739 1161 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 04:56:38.477752 update_engine[1161]: I0213 04:56:38.477669 1161 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 04:56:38.478696 update_engine[1161]: I0213 04:56:38.478616 1161 omaha_request_params.cc:62] Current group set to lts Feb 13 04:56:38.478939 update_engine[1161]: I0213 04:56:38.478899 1161 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 04:56:38.478939 update_engine[1161]: I0213 04:56:38.478919 1161 update_attempter.cc:643] Scheduling an action processor start. Feb 13 04:56:38.479163 update_engine[1161]: I0213 04:56:38.478951 1161 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 04:56:38.479163 update_engine[1161]: I0213 04:56:38.479019 1161 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 04:56:38.479163 update_engine[1161]: I0213 04:56:38.479154 1161 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 04:56:38.479643 update_engine[1161]: I0213 04:56:38.479171 1161 omaha_request_action.cc:271] Request: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: Feb 13 04:56:38.479643 update_engine[1161]: I0213 04:56:38.479182 1161 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 04:56:38.480584 locksmithd[1183]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 04:56:38.482360 update_engine[1161]: I0213 04:56:38.482275 1161 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 04:56:38.482566 update_engine[1161]: E0213 04:56:38.482491 1161 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 04:56:38.482680 update_engine[1161]: I0213 04:56:38.482643 1161 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 04:56:48.395819 update_engine[1161]: I0213 04:56:48.395697 1161 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 04:56:48.396647 update_engine[1161]: I0213 04:56:48.396152 1161 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 04:56:48.396647 update_engine[1161]: E0213 04:56:48.396397 1161 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 04:56:48.396647 update_engine[1161]: I0213 04:56:48.396569 1161 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 04:56:49.533356 sshd[1773]: Timeout before authentication for 124.230.124.250 port 59582 Feb 13 04:56:49.534824 systemd[1]: sshd@17-139.178.90.101:22-124.230.124.250:59582.service: Deactivated successfully. Feb 13 04:56:49.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-124.230.124.250:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:49.628332 kernel: audit: type=1131 audit(1707800209.534:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-124.230.124.250:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:49.888277 systemd[1]: Started sshd@21-139.178.90.101:22-124.230.124.250:52984.service. Feb 13 04:56:49.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-124.230.124.250:52984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:49.980385 kernel: audit: type=1130 audit(1707800209.887:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-124.230.124.250:52984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:51.337233 sshd[1793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 04:56:51.336000 audit[1793]: USER_AUTH pid=1793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 04:56:51.430387 kernel: audit: type=1100 audit(1707800211.336:191): pid=1793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 04:56:53.445996 sshd[1793]: Failed password for root from 124.230.124.250 port 52984 ssh2 Feb 13 04:56:54.722697 sshd[1793]: Connection closed by authenticating user root 124.230.124.250 port 52984 [preauth] Feb 13 04:56:54.725126 systemd[1]: sshd@21-139.178.90.101:22-124.230.124.250:52984.service: Deactivated successfully. Feb 13 04:56:54.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-124.230.124.250:52984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:54.818252 kernel: audit: type=1131 audit(1707800214.724:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-124.230.124.250:52984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:58.386971 update_engine[1161]: I0213 04:56:58.386847 1161 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 04:56:58.387792 update_engine[1161]: I0213 04:56:58.387351 1161 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 04:56:58.387792 update_engine[1161]: E0213 04:56:58.387548 1161 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 04:56:58.387792 update_engine[1161]: I0213 04:56:58.387737 1161 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 04:57:08.387576 update_engine[1161]: I0213 04:57:08.387456 1161 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.387881 1161 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 04:57:08.388566 update_engine[1161]: E0213 04:57:08.388084 1161 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388265 1161 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388283 1161 omaha_request_action.cc:621] Omaha request response: Feb 13 04:57:08.388566 update_engine[1161]: E0213 04:57:08.388424 1161 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388453 1161 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388463 1161 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388471 1161 update_attempter.cc:306] Processing Done. Feb 13 04:57:08.388566 update_engine[1161]: E0213 04:57:08.388497 1161 update_attempter.cc:619] Update failed. Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388505 1161 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388515 1161 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 04:57:08.388566 update_engine[1161]: I0213 04:57:08.388525 1161 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.388679 1161 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.388731 1161 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.388741 1161 omaha_request_action.cc:271] Request: Feb 13 04:57:08.390033 update_engine[1161]: Feb 13 04:57:08.390033 update_engine[1161]: Feb 13 04:57:08.390033 update_engine[1161]: Feb 13 04:57:08.390033 update_engine[1161]: Feb 13 04:57:08.390033 update_engine[1161]: Feb 13 04:57:08.390033 update_engine[1161]: Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.388751 1161 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389029 1161 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 04:57:08.390033 update_engine[1161]: E0213 04:57:08.389207 1161 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389374 1161 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389390 1161 omaha_request_action.cc:621] Omaha request response: Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389401 1161 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389410 1161 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389417 1161 update_attempter.cc:306] Processing Done. Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389425 1161 update_attempter.cc:310] Error event sent. Feb 13 04:57:08.390033 update_engine[1161]: I0213 04:57:08.389453 1161 update_check_scheduler.cc:74] Next update check in 46m4s Feb 13 04:57:08.391716 locksmithd[1183]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 04:57:08.391716 locksmithd[1183]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 04:57:16.191132 sshd[1776]: Timeout before authentication for 121.5.191.87 port 38912 Feb 13 04:57:16.192664 systemd[1]: sshd@18-139.178.90.101:22-121.5.191.87:38912.service: Deactivated successfully. Feb 13 04:57:16.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-121.5.191.87:38912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:16.285368 kernel: audit: type=1131 audit(1707800236.192:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-121.5.191.87:38912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:35.212231 systemd[1]: Started sshd@22-139.178.90.101:22-180.101.88.197:38843.service. Feb 13 04:57:35.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-180.101.88.197:38843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:35.305251 kernel: audit: type=1130 audit(1707800255.211:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-180.101.88.197:38843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:36.619182 sshd[1800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:36.618000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:36.710230 kernel: audit: type=1100 audit(1707800256.618:195): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:38.572266 sshd[1800]: Failed password for root from 180.101.88.197 port 38843 ssh2 Feb 13 04:57:39.982000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:40.076375 kernel: audit: type=1100 audit(1707800259.982:196): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:42.347620 sshd[1800]: Failed password for root from 180.101.88.197 port 38843 ssh2 Feb 13 04:57:43.346000 audit[1800]: ANOM_LOGIN_FAILURES pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:43.348237 sshd[1800]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 04:57:43.347000 audit[1800]: USER_AUTH pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:43.413268 kernel: audit: type=2100 audit(1707800263.346:197): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:43.413317 kernel: audit: type=1100 audit(1707800263.347:198): pid=1800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:45.596999 sshd[1800]: Failed password for root from 180.101.88.197 port 38843 ssh2 Feb 13 04:57:46.711721 sshd[1800]: Received disconnect from 180.101.88.197 port 38843:11: [preauth] Feb 13 04:57:46.711721 sshd[1800]: Disconnected from authenticating user root 180.101.88.197 port 38843 [preauth] Feb 13 04:57:46.712250 sshd[1800]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:46.714281 systemd[1]: sshd@22-139.178.90.101:22-180.101.88.197:38843.service: Deactivated successfully. Feb 13 04:57:46.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-180.101.88.197:38843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:46.807375 kernel: audit: type=1131 audit(1707800266.713:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-180.101.88.197:38843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:46.867074 systemd[1]: Started sshd@23-139.178.90.101:22-180.101.88.197:49952.service. Feb 13 04:57:46.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-180.101.88.197:49952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:46.960240 kernel: audit: type=1130 audit(1707800266.865:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-180.101.88.197:49952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:47.879961 sshd[1804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:47.879000 audit[1804]: USER_AUTH pid=1804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:47.973379 kernel: audit: type=1100 audit(1707800267.879:201): pid=1804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:50.344853 sshd[1804]: Failed password for root from 180.101.88.197 port 49952 ssh2 Feb 13 04:57:51.244000 audit[1804]: USER_AUTH pid=1804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:51.339378 kernel: audit: type=1100 audit(1707800271.244:202): pid=1804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:53.258656 sshd[1804]: Failed password for root from 180.101.88.197 port 49952 ssh2 Feb 13 04:57:54.610000 audit[1804]: USER_AUTH pid=1804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:54.704389 kernel: audit: type=1100 audit(1707800274.610:203): pid=1804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:55.701235 sshd[1804]: Failed password for root from 180.101.88.197 port 49952 ssh2 Feb 13 04:57:56.369839 sshd[1804]: Received disconnect from 180.101.88.197 port 49952:11: [preauth] Feb 13 04:57:56.369839 sshd[1804]: Disconnected from authenticating user root 180.101.88.197 port 49952 [preauth] Feb 13 04:57:56.370370 sshd[1804]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:56.372518 systemd[1]: sshd@23-139.178.90.101:22-180.101.88.197:49952.service: Deactivated successfully. Feb 13 04:57:56.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-180.101.88.197:49952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:56.466271 kernel: audit: type=1131 audit(1707800276.371:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-180.101.88.197:49952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:56.510291 systemd[1]: Started sshd@24-139.178.90.101:22-180.101.88.197:54537.service. Feb 13 04:57:56.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-180.101.88.197:54537 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:56.602237 kernel: audit: type=1130 audit(1707800276.509:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-180.101.88.197:54537 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:57.485523 sshd[1808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:57.484000 audit[1808]: USER_AUTH pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:57.578377 kernel: audit: type=1100 audit(1707800277.484:206): pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:59.654264 sshd[1808]: Failed password for root from 180.101.88.197 port 54537 ssh2 Feb 13 04:58:00.843000 audit[1808]: USER_AUTH pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:00.938386 kernel: audit: type=1100 audit(1707800280.843:207): pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:02.426385 sshd[1808]: Failed password for root from 180.101.88.197 port 54537 ssh2 Feb 13 04:58:02.597000 audit[1808]: USER_AUTH pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:02.691379 kernel: audit: type=1100 audit(1707800282.597:208): pid=1808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:04.455464 sshd[1808]: Failed password for root from 180.101.88.197 port 54537 ssh2 Feb 13 04:58:05.142439 systemd[1]: Started sshd@25-139.178.90.101:22-2.57.122.87:55306.service. Feb 13 04:58:05.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-2.57.122.87:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:05.236401 kernel: audit: type=1130 audit(1707800285.141:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-2.57.122.87:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:05.904907 sshd[1813]: Invalid user hlwang from 2.57.122.87 port 55306 Feb 13 04:58:05.957887 sshd[1808]: Received disconnect from 180.101.88.197 port 54537:11: [preauth] Feb 13 04:58:05.957887 sshd[1808]: Disconnected from authenticating user root 180.101.88.197 port 54537 [preauth] Feb 13 04:58:05.958396 sshd[1808]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:58:05.960369 systemd[1]: sshd@24-139.178.90.101:22-180.101.88.197:54537.service: Deactivated successfully. Feb 13 04:58:05.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-180.101.88.197:54537 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:06.054382 kernel: audit: type=1131 audit(1707800285.959:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-180.101.88.197:54537 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:06.086777 sshd[1813]: pam_faillock(sshd:auth): User unknown Feb 13 04:58:06.086991 sshd[1813]: pam_unix(sshd:auth): check pass; user unknown Feb 13 04:58:06.087010 sshd[1813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 04:58:06.087195 sshd[1813]: pam_faillock(sshd:auth): User unknown Feb 13 04:58:06.086000 audit[1813]: USER_AUTH pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 04:58:06.179272 kernel: audit: type=1100 audit(1707800286.086:211): pid=1813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 04:58:07.492992 sshd[1813]: Failed password for invalid user hlwang from 2.57.122.87 port 55306 ssh2 Feb 13 04:58:08.205751 sshd[1813]: Connection closed by invalid user hlwang 2.57.122.87 port 55306 [preauth] Feb 13 04:58:08.208207 systemd[1]: sshd@25-139.178.90.101:22-2.57.122.87:55306.service: Deactivated successfully. Feb 13 04:58:08.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-2.57.122.87:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:08.301281 kernel: audit: type=1131 audit(1707800288.207:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-2.57.122.87:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:18.914481 systemd[1]: Started sshd@26-139.178.90.101:22-104.250.49.150:52416.service. Feb 13 04:58:18.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-104.250.49.150:52416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:19.007387 kernel: audit: type=1130 audit(1707800298.913:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-104.250.49.150:52416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:19.787013 sshd[1818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 04:58:19.786000 audit[1818]: USER_AUTH pid=1818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 04:58:19.880377 kernel: audit: type=1100 audit(1707800299.786:214): pid=1818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 04:58:21.644360 sshd[1818]: Failed password for root from 104.250.49.150 port 52416 ssh2 Feb 13 04:58:23.144929 sshd[1818]: Received disconnect from 104.250.49.150 port 52416:11: Bye Bye [preauth] Feb 13 04:58:23.144929 sshd[1818]: Disconnected from authenticating user root 104.250.49.150 port 52416 [preauth] Feb 13 04:58:23.147279 systemd[1]: sshd@26-139.178.90.101:22-104.250.49.150:52416.service: Deactivated successfully. Feb 13 04:58:23.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-104.250.49.150:52416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:23.241392 kernel: audit: type=1131 audit(1707800303.146:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-104.250.49.150:52416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:29.636834 systemd[1]: Started sshd@27-139.178.90.101:22-132.255.50.81:7313.service. Feb 13 04:58:29.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-132.255.50.81:7313 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:29.730392 kernel: audit: type=1130 audit(1707800309.635:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-132.255.50.81:7313 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:30.710779 sshd[1826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 04:58:30.709000 audit[1826]: USER_AUTH pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 04:58:30.803379 kernel: audit: type=1100 audit(1707800310.709:217): pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 04:58:32.743574 sshd[1826]: Failed password for root from 132.255.50.81 port 7313 ssh2 Feb 13 04:58:34.108531 sshd[1826]: Received disconnect from 132.255.50.81 port 7313:11: Bye Bye [preauth] Feb 13 04:58:34.108531 sshd[1826]: Disconnected from authenticating user root 132.255.50.81 port 7313 [preauth] Feb 13 04:58:34.110972 systemd[1]: sshd@27-139.178.90.101:22-132.255.50.81:7313.service: Deactivated successfully. Feb 13 04:58:34.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-132.255.50.81:7313 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:34.205377 kernel: audit: type=1131 audit(1707800314.110:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-132.255.50.81:7313 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:55.956824 systemd[1]: Started sshd@28-139.178.90.101:22-43.138.31.228:47828.service. Feb 13 04:58:55.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-43.138.31.228:47828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:56.050273 kernel: audit: type=1130 audit(1707800335.955:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-43.138.31.228:47828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:05.298016 systemd[1]: Started sshd@29-139.178.90.101:22-124.230.124.250:52586.service. Feb 13 05:00:05.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-124.230.124.250:52586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:05.391368 kernel: audit: type=1130 audit(1707800405.296:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-124.230.124.250:52586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:09.915072 systemd[1]: Started sshd@30-139.178.90.101:22-218.92.0.76:51934.service. Feb 13 05:00:09.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.76:51934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:10.008406 kernel: audit: type=1130 audit(1707800409.913:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.76:51934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:11.423585 sshd[1836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:11.422000 audit[1836]: USER_AUTH pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:11.515219 kernel: audit: type=1100 audit(1707800411.422:222): pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:13.321404 sshd[1836]: Failed password for root from 218.92.0.76 port 51934 ssh2 Feb 13 05:00:14.795000 audit[1836]: USER_AUTH pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:14.887361 kernel: audit: type=1100 audit(1707800414.795:223): pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:16.438248 sshd[1836]: Failed password for root from 218.92.0.76 port 51934 ssh2 Feb 13 05:00:18.167000 audit[1836]: ANOM_LOGIN_FAILURES pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:18.168661 sshd[1836]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:00:18.167000 audit[1836]: USER_AUTH pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:18.324008 kernel: audit: type=2100 audit(1707800418.167:224): pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:18.324044 kernel: audit: type=1100 audit(1707800418.167:225): pid=1836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:19.694887 sshd[1836]: Failed password for root from 218.92.0.76 port 51934 ssh2 Feb 13 05:00:19.932944 sshd[1836]: Received disconnect from 218.92.0.76 port 51934:11: [preauth] Feb 13 05:00:19.932944 sshd[1836]: Disconnected from authenticating user root 218.92.0.76 port 51934 [preauth] Feb 13 05:00:19.933492 sshd[1836]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:19.935478 systemd[1]: sshd@30-139.178.90.101:22-218.92.0.76:51934.service: Deactivated successfully. Feb 13 05:00:19.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.76:51934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:20.029289 kernel: audit: type=1131 audit(1707800419.934:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.76:51934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:20.076095 systemd[1]: Started sshd@31-139.178.90.101:22-218.92.0.76:59555.service. Feb 13 05:00:20.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-218.92.0.76:59555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:20.169387 kernel: audit: type=1130 audit(1707800420.075:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-218.92.0.76:59555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.049443 sshd[1841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:21.048000 audit[1841]: ANOM_LOGIN_FAILURES pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.049688 sshd[1841]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:00:21.048000 audit[1841]: USER_AUTH pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:21.205590 kernel: audit: type=2100 audit(1707800421.048:228): pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.205622 kernel: audit: type=1100 audit(1707800421.048:229): pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:22.986604 sshd[1841]: Failed password for root from 218.92.0.76 port 59555 ssh2 Feb 13 05:00:24.408000 audit[1841]: USER_AUTH pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:24.500374 kernel: audit: type=1100 audit(1707800424.408:230): pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:26.091434 sshd[1841]: Failed password for root from 218.92.0.76 port 59555 ssh2 Feb 13 05:00:27.767000 audit[1841]: USER_AUTH pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:27.861387 kernel: audit: type=1100 audit(1707800427.767:231): pid=1841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:29.530576 sshd[1841]: Failed password for root from 218.92.0.76 port 59555 ssh2 Feb 13 05:00:31.127367 sshd[1841]: Received disconnect from 218.92.0.76 port 59555:11: [preauth] Feb 13 05:00:31.127367 sshd[1841]: Disconnected from authenticating user root 218.92.0.76 port 59555 [preauth] Feb 13 05:00:31.127906 sshd[1841]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:31.129872 systemd[1]: sshd@31-139.178.90.101:22-218.92.0.76:59555.service: Deactivated successfully. Feb 13 05:00:31.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-218.92.0.76:59555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:31.223379 kernel: audit: type=1131 audit(1707800431.129:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-218.92.0.76:59555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:31.321723 systemd[1]: Started sshd@32-139.178.90.101:22-218.92.0.76:24749.service. Feb 13 05:00:31.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.76:24749 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:31.415242 kernel: audit: type=1130 audit(1707800431.320:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.76:24749 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:32.426547 sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:32.425000 audit[1845]: USER_AUTH pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:32.517231 kernel: audit: type=1100 audit(1707800432.425:234): pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:34.208795 sshd[1845]: Failed password for root from 218.92.0.76 port 24749 ssh2 Feb 13 05:00:35.807000 audit[1845]: USER_AUTH pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:35.899380 kernel: audit: type=1100 audit(1707800435.807:235): pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:38.001666 sshd[1845]: Failed password for root from 218.92.0.76 port 24749 ssh2 Feb 13 05:00:39.189000 audit[1845]: USER_AUTH pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:39.280244 kernel: audit: type=1100 audit(1707800439.189:236): pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:40.931185 sshd[1845]: Failed password for root from 218.92.0.76 port 24749 ssh2 Feb 13 05:00:42.572235 sshd[1845]: Received disconnect from 218.92.0.76 port 24749:11: [preauth] Feb 13 05:00:42.572235 sshd[1845]: Disconnected from authenticating user root 218.92.0.76 port 24749 [preauth] Feb 13 05:00:42.572795 sshd[1845]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:42.574803 systemd[1]: sshd@32-139.178.90.101:22-218.92.0.76:24749.service: Deactivated successfully. Feb 13 05:00:42.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.76:24749 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:42.668385 kernel: audit: type=1131 audit(1707800442.575:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.76:24749 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:55.961862 sshd[1830]: Timeout before authentication for 43.138.31.228 port 47828 Feb 13 05:00:55.963330 systemd[1]: sshd@28-139.178.90.101:22-43.138.31.228:47828.service: Deactivated successfully. Feb 13 05:00:55.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-43.138.31.228:47828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:56.057274 kernel: audit: type=1131 audit(1707800455.963:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-43.138.31.228:47828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:01:22.634215 systemd[1]: Started sshd@33-139.178.90.101:22-134.175.129.189:48092.service. Feb 13 05:01:22.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-134.175.129.189:48092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:01:22.727371 kernel: audit: type=1130 audit(1707800482.633:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-134.175.129.189:48092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:01:24.338007 sshd[1855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:01:24.337000 audit[1855]: USER_AUTH pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:01:24.431268 kernel: audit: type=1100 audit(1707800484.337:240): pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:01:25.924603 sshd[1855]: Failed password for root from 134.175.129.189 port 48092 ssh2 Feb 13 05:01:26.103544 sshd[1855]: Received disconnect from 134.175.129.189 port 48092:11: Bye Bye [preauth] Feb 13 05:01:26.103544 sshd[1855]: Disconnected from authenticating user root 134.175.129.189 port 48092 [preauth] Feb 13 05:01:26.105982 systemd[1]: sshd@33-139.178.90.101:22-134.175.129.189:48092.service: Deactivated successfully. Feb 13 05:01:26.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-134.175.129.189:48092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:01:26.198379 kernel: audit: type=1131 audit(1707800486.105:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-134.175.129.189:48092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:05.303129 sshd[1834]: Timeout before authentication for 124.230.124.250 port 52586 Feb 13 05:02:05.304626 systemd[1]: sshd@29-139.178.90.101:22-124.230.124.250:52586.service: Deactivated successfully. Feb 13 05:02:05.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-124.230.124.250:52586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:05.398389 kernel: audit: type=1131 audit(1707800525.303:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-124.230.124.250:52586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:05.662786 systemd[1]: Started sshd@34-139.178.90.101:22-124.230.124.250:36206.service. Feb 13 05:02:05.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-124.230.124.250:36206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:05.755427 kernel: audit: type=1130 audit(1707800525.661:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-124.230.124.250:36206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:18.742879 systemd[1]: Started sshd@35-139.178.90.101:22-104.250.49.150:39866.service. Feb 13 05:02:18.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-104.250.49.150:39866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:18.836391 kernel: audit: type=1130 audit(1707800538.741:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-104.250.49.150:39866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:21.263206 sshd[1863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:02:21.262000 audit[1863]: USER_AUTH pid=1863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:02:21.356386 kernel: audit: type=1100 audit(1707800541.262:245): pid=1863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:02:23.341559 sshd[1863]: Failed password for root from 104.250.49.150 port 39866 ssh2 Feb 13 05:02:24.620845 sshd[1863]: Received disconnect from 104.250.49.150 port 39866:11: Bye Bye [preauth] Feb 13 05:02:24.620845 sshd[1863]: Disconnected from authenticating user root 104.250.49.150 port 39866 [preauth] Feb 13 05:02:24.623325 systemd[1]: sshd@35-139.178.90.101:22-104.250.49.150:39866.service: Deactivated successfully. Feb 13 05:02:24.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-104.250.49.150:39866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:24.717391 kernel: audit: type=1131 audit(1707800544.622:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-104.250.49.150:39866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:55.514341 systemd[1]: Started sshd@36-139.178.90.101:22-118.195.184.139:9444.service. Feb 13 05:02:55.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-118.195.184.139:9444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:55.608411 kernel: audit: type=1130 audit(1707800575.513:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-118.195.184.139:9444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:02:57.084810 sshd[1868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:02:57.083000 audit[1868]: USER_AUTH pid=1868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:02:57.178382 kernel: audit: type=1100 audit(1707800577.083:248): pid=1868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:02:59.439422 sshd[1868]: Failed password for root from 118.195.184.139 port 9444 ssh2 Feb 13 05:03:00.447757 sshd[1868]: Received disconnect from 118.195.184.139 port 9444:11: Bye Bye [preauth] Feb 13 05:03:00.447757 sshd[1868]: Disconnected from authenticating user root 118.195.184.139 port 9444 [preauth] Feb 13 05:03:00.450166 systemd[1]: sshd@36-139.178.90.101:22-118.195.184.139:9444.service: Deactivated successfully. Feb 13 05:03:00.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-118.195.184.139:9444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:00.544391 kernel: audit: type=1131 audit(1707800580.450:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-118.195.184.139:9444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:09.903140 systemd[1]: Started sshd@37-139.178.90.101:22-134.175.129.189:34642.service. Feb 13 05:03:09.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-134.175.129.189:34642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:09.996287 kernel: audit: type=1130 audit(1707800589.903:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-134.175.129.189:34642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:20.867803 systemd[1]: Started sshd@38-139.178.90.101:22-101.43.243.60:53552.service. Feb 13 05:03:20.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-101.43.243.60:53552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:20.960378 kernel: audit: type=1130 audit(1707800600.867:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-101.43.243.60:53552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:45.910254 systemd[1]: Started sshd@39-139.178.90.101:22-118.195.184.139:37128.service. Feb 13 05:03:45.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-118.195.184.139:37128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:46.003247 kernel: audit: type=1130 audit(1707800625.909:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-118.195.184.139:37128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:46.801019 sshd[1877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:03:46.800000 audit[1877]: USER_AUTH pid=1877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:03:46.894374 kernel: audit: type=1100 audit(1707800626.800:253): pid=1877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:03:49.215547 sshd[1877]: Failed password for root from 118.195.184.139 port 37128 ssh2 Feb 13 05:03:50.161888 sshd[1877]: Received disconnect from 118.195.184.139 port 37128:11: Bye Bye [preauth] Feb 13 05:03:50.161888 sshd[1877]: Disconnected from authenticating user root 118.195.184.139 port 37128 [preauth] Feb 13 05:03:50.164323 systemd[1]: sshd@39-139.178.90.101:22-118.195.184.139:37128.service: Deactivated successfully. Feb 13 05:03:50.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-118.195.184.139:37128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:50.258390 kernel: audit: type=1131 audit(1707800630.163:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-118.195.184.139:37128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:52.803419 sshd[1875]: Connection closed by 101.43.243.60 port 53552 [preauth] Feb 13 05:03:52.805142 systemd[1]: sshd@38-139.178.90.101:22-101.43.243.60:53552.service: Deactivated successfully. Feb 13 05:03:52.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-101.43.243.60:53552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:52.898253 kernel: audit: type=1131 audit(1707800632.804:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-101.43.243.60:53552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:05.444533 systemd[1]: Started sshd@40-139.178.90.101:22-101.43.243.60:32792.service. Feb 13 05:04:05.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-101.43.243.60:32792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:05.538389 kernel: audit: type=1130 audit(1707800645.443:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-101.43.243.60:32792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:05.668311 sshd[1861]: Timeout before authentication for 124.230.124.250 port 36206 Feb 13 05:04:05.669735 systemd[1]: sshd@34-139.178.90.101:22-124.230.124.250:36206.service: Deactivated successfully. Feb 13 05:04:05.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-124.230.124.250:36206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:05.769278 kernel: audit: type=1131 audit(1707800645.669:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-124.230.124.250:36206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:06.025021 systemd[1]: Started sshd@41-139.178.90.101:22-124.230.124.250:43510.service. Feb 13 05:04:06.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-124.230.124.250:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:06.118390 kernel: audit: type=1130 audit(1707800646.023:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-124.230.124.250:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:06.297041 sshd[1885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:04:06.296000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:04:06.397257 kernel: audit: type=1100 audit(1707800646.296:259): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:04:07.476413 sshd[1889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:04:07.475000 audit[1889]: ANOM_LOGIN_FAILURES pid=1889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:07.476656 sshd[1889]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:04:07.475000 audit[1889]: USER_AUTH pid=1889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:04:07.635447 kernel: audit: type=2100 audit(1707800647.475:260): pid=1889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:07.635481 kernel: audit: type=1100 audit(1707800647.475:261): pid=1889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:04:08.124483 sshd[1885]: Failed password for root from 101.43.243.60 port 32792 ssh2 Feb 13 05:04:09.108003 sshd[1889]: Failed password for root from 124.230.124.250 port 43510 ssh2 Feb 13 05:04:09.658029 sshd[1885]: Received disconnect from 101.43.243.60 port 32792:11: Bye Bye [preauth] Feb 13 05:04:09.658029 sshd[1885]: Disconnected from authenticating user root 101.43.243.60 port 32792 [preauth] Feb 13 05:04:09.660508 systemd[1]: sshd@40-139.178.90.101:22-101.43.243.60:32792.service: Deactivated successfully. Feb 13 05:04:09.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-101.43.243.60:32792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:09.754400 kernel: audit: type=1131 audit(1707800649.659:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-101.43.243.60:32792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:10.862763 sshd[1889]: Connection closed by authenticating user root 124.230.124.250 port 43510 [preauth] Feb 13 05:04:10.865329 systemd[1]: sshd@41-139.178.90.101:22-124.230.124.250:43510.service: Deactivated successfully. Feb 13 05:04:10.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-124.230.124.250:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:10.959378 kernel: audit: type=1131 audit(1707800650.864:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-124.230.124.250:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:17.995183 systemd[1]: Started sshd@42-139.178.90.101:22-134.175.129.189:45428.service. Feb 13 05:04:17.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-134.175.129.189:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:18.088333 kernel: audit: type=1130 audit(1707800657.994:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-134.175.129.189:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:29.392831 systemd[1]: Started sshd@43-139.178.90.101:22-104.250.49.150:49534.service. Feb 13 05:04:29.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-104.250.49.150:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:29.485237 kernel: audit: type=1130 audit(1707800669.391:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-104.250.49.150:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:33.178458 sshd[1897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:04:33.177000 audit[1897]: ANOM_LOGIN_FAILURES pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:33.178698 sshd[1897]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:04:33.177000 audit[1897]: USER_AUTH pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:04:33.334800 kernel: audit: type=2100 audit(1707800673.177:266): pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:33.334831 kernel: audit: type=1100 audit(1707800673.177:267): pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:04:35.713354 sshd[1897]: Failed password for root from 104.250.49.150 port 49534 ssh2 Feb 13 05:04:36.542424 sshd[1897]: Received disconnect from 104.250.49.150 port 49534:11: Bye Bye [preauth] Feb 13 05:04:36.542424 sshd[1897]: Disconnected from authenticating user root 104.250.49.150 port 49534 [preauth] Feb 13 05:04:36.544879 systemd[1]: sshd@43-139.178.90.101:22-104.250.49.150:49534.service: Deactivated successfully. Feb 13 05:04:36.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-104.250.49.150:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:36.639387 kernel: audit: type=1131 audit(1707800676.544:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-104.250.49.150:49534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:41.921010 systemd[1]: Started sshd@44-139.178.90.101:22-118.195.184.139:48032.service. Feb 13 05:04:41.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-118.195.184.139:48032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:42.014387 kernel: audit: type=1130 audit(1707800681.919:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-118.195.184.139:48032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:42.288447 systemd[1]: Started sshd@45-139.178.90.101:22-101.43.243.60:40258.service. Feb 13 05:04:42.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-101.43.243.60:40258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:42.382384 kernel: audit: type=1130 audit(1707800682.287:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-101.43.243.60:40258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:43.148918 sshd[1904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:04:43.148000 audit[1904]: USER_AUTH pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:04:43.242376 kernel: audit: type=1100 audit(1707800683.148:271): pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:04:43.574870 sshd[1902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:04:43.574000 audit[1902]: USER_AUTH pid=1902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:04:43.668385 kernel: audit: type=1100 audit(1707800683.574:272): pid=1902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:04:44.720422 sshd[1904]: Failed password for root from 101.43.243.60 port 40258 ssh2 Feb 13 05:04:44.899884 sshd[1904]: Received disconnect from 101.43.243.60 port 40258:11: Bye Bye [preauth] Feb 13 05:04:44.899884 sshd[1904]: Disconnected from authenticating user root 101.43.243.60 port 40258 [preauth] Feb 13 05:04:44.902317 systemd[1]: sshd@45-139.178.90.101:22-101.43.243.60:40258.service: Deactivated successfully. Feb 13 05:04:44.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-101.43.243.60:40258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:44.996386 kernel: audit: type=1131 audit(1707800684.901:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-101.43.243.60:40258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:45.146652 sshd[1902]: Failed password for root from 118.195.184.139 port 48032 ssh2 Feb 13 05:04:45.327889 sshd[1902]: Received disconnect from 118.195.184.139 port 48032:11: Bye Bye [preauth] Feb 13 05:04:45.327889 sshd[1902]: Disconnected from authenticating user root 118.195.184.139 port 48032 [preauth] Feb 13 05:04:45.330288 systemd[1]: sshd@44-139.178.90.101:22-118.195.184.139:48032.service: Deactivated successfully. Feb 13 05:04:45.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-118.195.184.139:48032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:45.430276 kernel: audit: type=1131 audit(1707800685.329:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-118.195.184.139:48032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:09.910044 sshd[1873]: Timeout before authentication for 134.175.129.189 port 34642 Feb 13 05:05:09.911550 systemd[1]: sshd@37-139.178.90.101:22-134.175.129.189:34642.service: Deactivated successfully. Feb 13 05:05:09.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-134.175.129.189:34642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:09.915570 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 05:05:10.005251 kernel: audit: type=1131 audit(1707800709.910:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-134.175.129.189:34642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:10.009312 systemd-tmpfiles[1911]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 05:05:10.009523 systemd-tmpfiles[1911]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 05:05:10.010176 systemd-tmpfiles[1911]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 05:05:10.020792 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 05:05:10.020873 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 05:05:10.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:10.021761 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 05:05:10.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:10.198744 kernel: audit: type=1130 audit(1707800710.019:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:10.198776 kernel: audit: type=1131 audit(1707800710.019:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:16.139190 systemd[1]: Started sshd@46-139.178.90.101:22-101.43.243.60:47724.service. Feb 13 05:05:16.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-101.43.243.60:47724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:16.232386 kernel: audit: type=1130 audit(1707800716.138:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-101.43.243.60:47724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:17.066766 sshd[1914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:05:17.065000 audit[1914]: USER_AUTH pid=1914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:05:17.159374 kernel: audit: type=1100 audit(1707800717.065:279): pid=1914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:05:18.973450 sshd[1914]: Failed password for root from 101.43.243.60 port 47724 ssh2 Feb 13 05:05:20.434295 sshd[1914]: Received disconnect from 101.43.243.60 port 47724:11: Bye Bye [preauth] Feb 13 05:05:20.434295 sshd[1914]: Disconnected from authenticating user root 101.43.243.60 port 47724 [preauth] Feb 13 05:05:20.436785 systemd[1]: sshd@46-139.178.90.101:22-101.43.243.60:47724.service: Deactivated successfully. Feb 13 05:05:20.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-101.43.243.60:47724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:20.530385 kernel: audit: type=1131 audit(1707800720.436:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-101.43.243.60:47724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:26.858270 systemd[1]: Started sshd@47-139.178.90.101:22-134.175.129.189:56212.service. Feb 13 05:05:26.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-134.175.129.189:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:26.951384 kernel: audit: type=1130 audit(1707800726.857:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-134.175.129.189:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:28.608439 sshd[1920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:05:28.607000 audit[1920]: USER_AUTH pid=1920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:05:28.701364 kernel: audit: type=1100 audit(1707800728.607:282): pid=1920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:05:30.691973 sshd[1920]: Failed password for root from 134.175.129.189 port 56212 ssh2 Feb 13 05:05:31.988856 sshd[1920]: Received disconnect from 134.175.129.189 port 56212:11: Bye Bye [preauth] Feb 13 05:05:31.988856 sshd[1920]: Disconnected from authenticating user root 134.175.129.189 port 56212 [preauth] Feb 13 05:05:31.991270 systemd[1]: sshd@47-139.178.90.101:22-134.175.129.189:56212.service: Deactivated successfully. Feb 13 05:05:31.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-134.175.129.189:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:32.084230 kernel: audit: type=1131 audit(1707800731.990:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-134.175.129.189:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:35.768285 systemd[1]: Started sshd@48-139.178.90.101:22-118.195.184.139:32729.service. Feb 13 05:05:35.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-118.195.184.139:32729 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:35.861366 kernel: audit: type=1130 audit(1707800735.767:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-118.195.184.139:32729 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:37.404704 sshd[1924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:05:37.403000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:05:37.497237 kernel: audit: type=1100 audit(1707800737.403:285): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:05:39.056743 sshd[1924]: Failed password for root from 118.195.184.139 port 32729 ssh2 Feb 13 05:05:40.761463 sshd[1924]: Received disconnect from 118.195.184.139 port 32729:11: Bye Bye [preauth] Feb 13 05:05:40.761463 sshd[1924]: Disconnected from authenticating user root 118.195.184.139 port 32729 [preauth] Feb 13 05:05:40.763959 systemd[1]: sshd@48-139.178.90.101:22-118.195.184.139:32729.service: Deactivated successfully. Feb 13 05:05:40.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-118.195.184.139:32729 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:40.858404 kernel: audit: type=1131 audit(1707800740.763:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-118.195.184.139:32729 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:47.564452 systemd[1]: Started sshd@49-139.178.90.101:22-101.43.243.60:55190.service. Feb 13 05:05:47.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-101.43.243.60:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:47.657373 kernel: audit: type=1130 audit(1707800747.563:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-101.43.243.60:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:48.516543 sshd[1932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:05:48.515000 audit[1932]: USER_AUTH pid=1932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:05:48.608381 kernel: audit: type=1100 audit(1707800748.515:288): pid=1932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:05:50.679518 sshd[1932]: Failed password for root from 101.43.243.60 port 55190 ssh2 Feb 13 05:05:51.891448 sshd[1932]: Received disconnect from 101.43.243.60 port 55190:11: Bye Bye [preauth] Feb 13 05:05:51.891448 sshd[1932]: Disconnected from authenticating user root 101.43.243.60 port 55190 [preauth] Feb 13 05:05:51.894082 systemd[1]: sshd@49-139.178.90.101:22-101.43.243.60:55190.service: Deactivated successfully. Feb 13 05:05:51.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-101.43.243.60:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:51.987391 kernel: audit: type=1131 audit(1707800751.893:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-101.43.243.60:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:18.000559 sshd[1895]: Timeout before authentication for 134.175.129.189 port 45428 Feb 13 05:06:18.001979 systemd[1]: sshd@42-139.178.90.101:22-134.175.129.189:45428.service: Deactivated successfully. Feb 13 05:06:18.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-134.175.129.189:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:18.096394 kernel: audit: type=1131 audit(1707800778.001:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-134.175.129.189:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:20.406478 systemd[1]: Started sshd@50-139.178.90.101:22-101.43.243.60:34424.service. Feb 13 05:06:20.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-101.43.243.60:34424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:20.500393 kernel: audit: type=1130 audit(1707800780.405:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-101.43.243.60:34424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:21.342701 sshd[1937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:06:21.341000 audit[1937]: USER_AUTH pid=1937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:06:21.436272 kernel: audit: type=1100 audit(1707800781.341:292): pid=1937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:06:23.370747 sshd[1937]: Failed password for root from 101.43.243.60 port 34424 ssh2 Feb 13 05:06:24.708752 sshd[1937]: Received disconnect from 101.43.243.60 port 34424:11: Bye Bye [preauth] Feb 13 05:06:24.708752 sshd[1937]: Disconnected from authenticating user root 101.43.243.60 port 34424 [preauth] Feb 13 05:06:24.711291 systemd[1]: sshd@50-139.178.90.101:22-101.43.243.60:34424.service: Deactivated successfully. Feb 13 05:06:24.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-101.43.243.60:34424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:24.805395 kernel: audit: type=1131 audit(1707800784.711:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-101.43.243.60:34424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:27.205795 systemd[1]: Started sshd@51-139.178.90.101:22-118.195.184.139:11348.service. Feb 13 05:06:27.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-118.195.184.139:11348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:27.298402 kernel: audit: type=1130 audit(1707800787.205:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-118.195.184.139:11348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:32.737771 systemd[1]: Started sshd@52-139.178.90.101:22-134.175.129.189:38754.service. Feb 13 05:06:32.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-134.175.129.189:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:32.830256 kernel: audit: type=1130 audit(1707800792.737:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-134.175.129.189:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:34.515999 sshd[1943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:06:34.516000 audit[1943]: USER_AUTH pid=1943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:06:34.608377 kernel: audit: type=1100 audit(1707800794.516:296): pid=1943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:06:36.659996 sshd[1943]: Failed password for root from 134.175.129.189 port 38754 ssh2 Feb 13 05:06:37.901636 sshd[1943]: Received disconnect from 134.175.129.189 port 38754:11: Bye Bye [preauth] Feb 13 05:06:37.901636 sshd[1943]: Disconnected from authenticating user root 134.175.129.189 port 38754 [preauth] Feb 13 05:06:37.904020 systemd[1]: sshd@52-139.178.90.101:22-134.175.129.189:38754.service: Deactivated successfully. Feb 13 05:06:37.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-134.175.129.189:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:37.998387 kernel: audit: type=1131 audit(1707800797.904:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-134.175.129.189:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:38.623929 systemd[1]: Started sshd@53-139.178.90.101:22-104.250.49.150:59203.service. Feb 13 05:06:38.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-104.250.49.150:59203 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:38.717235 kernel: audit: type=1130 audit(1707800798.623:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-104.250.49.150:59203 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:40.313606 sshd[1947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:06:40.313000 audit[1947]: USER_AUTH pid=1947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:06:40.406392 kernel: audit: type=1100 audit(1707800800.313:299): pid=1947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:06:42.281831 sshd[1947]: Failed password for root from 104.250.49.150 port 59203 ssh2 Feb 13 05:06:44.375900 sshd[1947]: Received disconnect from 104.250.49.150 port 59203:11: Bye Bye [preauth] Feb 13 05:06:44.375900 sshd[1947]: Disconnected from authenticating user root 104.250.49.150 port 59203 [preauth] Feb 13 05:06:44.378337 systemd[1]: sshd@53-139.178.90.101:22-104.250.49.150:59203.service: Deactivated successfully. Feb 13 05:06:44.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-104.250.49.150:59203 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:44.471394 kernel: audit: type=1131 audit(1707800804.378:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-104.250.49.150:59203 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:50.215469 systemd[1]: Started sshd@54-139.178.90.101:22-101.43.243.60:41870.service. Feb 13 05:06:50.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-101.43.243.60:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:50.308194 kernel: audit: type=1130 audit(1707800810.215:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-101.43.243.60:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:51.099713 sshd[1951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:06:51.099000 audit[1951]: USER_AUTH pid=1951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:06:51.191227 kernel: audit: type=1100 audit(1707800811.099:302): pid=1951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:06:52.575568 sshd[1951]: Failed password for root from 101.43.243.60 port 41870 ssh2 Feb 13 05:06:53.042375 sshd[1951]: Received disconnect from 101.43.243.60 port 41870:11: Bye Bye [preauth] Feb 13 05:06:53.042375 sshd[1951]: Disconnected from authenticating user root 101.43.243.60 port 41870 [preauth] Feb 13 05:06:53.044840 systemd[1]: sshd@54-139.178.90.101:22-101.43.243.60:41870.service: Deactivated successfully. Feb 13 05:06:53.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-101.43.243.60:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:53.138371 kernel: audit: type=1131 audit(1707800813.045:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-101.43.243.60:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:10.827032 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T05:07:10.826Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1296} Feb 13 05:07:10.847242 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T05:07:10.846Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1296,"took":"19.738686ms"} Feb 13 05:07:18.879920 systemd[1]: Started sshd@55-139.178.90.101:22-118.195.184.139:11349.service. Feb 13 05:07:18.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-118.195.184.139:11349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:18.973377 kernel: audit: type=1130 audit(1707800838.878:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-118.195.184.139:11349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:23.649920 systemd[1]: Started sshd@56-139.178.90.101:22-101.43.243.60:49332.service. Feb 13 05:07:23.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-101.43.243.60:49332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:23.743256 kernel: audit: type=1130 audit(1707800843.648:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-101.43.243.60:49332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:23.887310 systemd[1]: Started sshd@57-139.178.90.101:22-132.255.50.81:13894.service. Feb 13 05:07:23.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:13894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:23.981388 kernel: audit: type=1130 audit(1707800843.886:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:13894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:24.513861 sshd[1958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:07:24.512000 audit[1958]: USER_AUTH pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:07:24.606235 kernel: audit: type=1100 audit(1707800844.512:307): pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:07:24.890342 sshd[1961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:07:24.889000 audit[1961]: USER_AUTH pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:07:24.991405 kernel: audit: type=1100 audit(1707800844.889:308): pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:07:26.522091 sshd[1958]: Failed password for root from 101.43.243.60 port 49332 ssh2 Feb 13 05:07:26.881569 systemd[1]: Started sshd@58-139.178.90.101:22-134.175.129.189:49520.service. Feb 13 05:07:26.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-134.175.129.189:49520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:26.898333 sshd[1961]: Failed password for root from 132.255.50.81 port 13894 ssh2 Feb 13 05:07:26.975278 kernel: audit: type=1130 audit(1707800846.880:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-134.175.129.189:49520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:27.821349 sshd[1964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:07:27.820000 audit[1964]: USER_AUTH pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:07:27.875056 sshd[1958]: Received disconnect from 101.43.243.60 port 49332:11: Bye Bye [preauth] Feb 13 05:07:27.875056 sshd[1958]: Disconnected from authenticating user root 101.43.243.60 port 49332 [preauth] Feb 13 05:07:27.875726 systemd[1]: sshd@56-139.178.90.101:22-101.43.243.60:49332.service: Deactivated successfully. Feb 13 05:07:27.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-101.43.243.60:49332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:28.007557 kernel: audit: type=1100 audit(1707800847.820:310): pid=1964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:07:28.007589 kernel: audit: type=1131 audit(1707800847.874:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-101.43.243.60:49332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:28.272887 sshd[1961]: Received disconnect from 132.255.50.81 port 13894:11: Bye Bye [preauth] Feb 13 05:07:28.272887 sshd[1961]: Disconnected from authenticating user root 132.255.50.81 port 13894 [preauth] Feb 13 05:07:28.275298 systemd[1]: sshd@57-139.178.90.101:22-132.255.50.81:13894.service: Deactivated successfully. Feb 13 05:07:28.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:13894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:28.368254 kernel: audit: type=1131 audit(1707800848.274:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:13894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:29.909672 sshd[1964]: Failed password for root from 134.175.129.189 port 49520 ssh2 Feb 13 05:07:31.194993 sshd[1964]: Received disconnect from 134.175.129.189 port 49520:11: Bye Bye [preauth] Feb 13 05:07:31.194993 sshd[1964]: Disconnected from authenticating user root 134.175.129.189 port 49520 [preauth] Feb 13 05:07:31.197469 systemd[1]: sshd@58-139.178.90.101:22-134.175.129.189:49520.service: Deactivated successfully. Feb 13 05:07:31.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-134.175.129.189:49520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:31.291272 kernel: audit: type=1131 audit(1707800851.196:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-134.175.129.189:49520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:57.565771 systemd[1]: Started sshd@59-139.178.90.101:22-101.43.243.60:56802.service. Feb 13 05:07:57.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-101.43.243.60:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:57.659381 kernel: audit: type=1130 audit(1707800877.564:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-101.43.243.60:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:07:58.451482 sshd[1972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:07:58.450000 audit[1972]: USER_AUTH pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:07:58.544249 kernel: audit: type=1100 audit(1707800878.450:315): pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:08:00.795913 sshd[1972]: Failed password for root from 101.43.243.60 port 56802 ssh2 Feb 13 05:08:01.810108 sshd[1972]: Received disconnect from 101.43.243.60 port 56802:11: Bye Bye [preauth] Feb 13 05:08:01.810108 sshd[1972]: Disconnected from authenticating user root 101.43.243.60 port 56802 [preauth] Feb 13 05:08:01.812588 systemd[1]: sshd@59-139.178.90.101:22-101.43.243.60:56802.service: Deactivated successfully. Feb 13 05:08:01.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-101.43.243.60:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:01.906270 kernel: audit: type=1131 audit(1707800881.811:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-101.43.243.60:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:13.188703 systemd[1]: Started sshd@60-139.178.90.101:22-118.195.184.139:19780.service. Feb 13 05:08:13.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-118.195.184.139:19780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:13.281382 kernel: audit: type=1130 audit(1707800893.187:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-118.195.184.139:19780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:16.004013 systemd[1]: Started sshd@61-139.178.90.101:22-2.57.122.87:57368.service. Feb 13 05:08:16.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-2.57.122.87:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:16.097390 kernel: audit: type=1130 audit(1707800896.002:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-2.57.122.87:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:16.792247 sshd[1978]: Invalid user hlwang from 2.57.122.87 port 57368 Feb 13 05:08:16.981756 sshd[1978]: pam_faillock(sshd:auth): User unknown Feb 13 05:08:16.982895 sshd[1978]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:08:16.982983 sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:08:16.983890 sshd[1978]: pam_faillock(sshd:auth): User unknown Feb 13 05:08:16.982000 audit[1978]: USER_AUTH pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:08:17.077396 kernel: audit: type=1100 audit(1707800896.982:319): pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:08:18.796343 sshd[1978]: Failed password for invalid user hlwang from 2.57.122.87 port 57368 ssh2 Feb 13 05:08:19.102599 sshd[1978]: Connection closed by invalid user hlwang 2.57.122.87 port 57368 [preauth] Feb 13 05:08:19.104997 systemd[1]: sshd@61-139.178.90.101:22-2.57.122.87:57368.service: Deactivated successfully. Feb 13 05:08:19.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-2.57.122.87:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:19.199401 kernel: audit: type=1131 audit(1707800899.104:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-2.57.122.87:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:27.211241 sshd[1941]: Timeout before authentication for 118.195.184.139 port 11348 Feb 13 05:08:27.212639 systemd[1]: sshd@51-139.178.90.101:22-118.195.184.139:11348.service: Deactivated successfully. Feb 13 05:08:27.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-118.195.184.139:11348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:27.305209 kernel: audit: type=1131 audit(1707800907.211:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-118.195.184.139:11348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:28.548161 systemd[1]: Started sshd@62-139.178.90.101:22-124.230.124.250:40144.service. Feb 13 05:08:28.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-124.230.124.250:40144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:28.602865 systemd[1]: Started sshd@63-139.178.90.101:22-101.43.243.60:36024.service. Feb 13 05:08:28.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-101.43.243.60:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:28.733574 kernel: audit: type=1130 audit(1707800908.547:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-124.230.124.250:40144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:28.733612 kernel: audit: type=1130 audit(1707800908.601:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-101.43.243.60:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:29.585126 sshd[1986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:08:29.584000 audit[1986]: USER_AUTH pid=1986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:08:29.677380 kernel: audit: type=1100 audit(1707800909.584:324): pid=1986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:08:31.848566 sshd[1986]: Failed password for root from 101.43.243.60 port 36024 ssh2 Feb 13 05:08:32.976130 sshd[1986]: Received disconnect from 101.43.243.60 port 36024:11: Bye Bye [preauth] Feb 13 05:08:32.976130 sshd[1986]: Disconnected from authenticating user root 101.43.243.60 port 36024 [preauth] Feb 13 05:08:32.978650 systemd[1]: sshd@63-139.178.90.101:22-101.43.243.60:36024.service: Deactivated successfully. Feb 13 05:08:32.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-101.43.243.60:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:33.072389 kernel: audit: type=1131 audit(1707800912.978:325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-101.43.243.60:36024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:38.799684 systemd[1]: Started sshd@64-139.178.90.101:22-134.175.129.189:60314.service. Feb 13 05:08:38.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-134.175.129.189:60314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:38.892384 kernel: audit: type=1130 audit(1707800918.799:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-134.175.129.189:60314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:40.602053 sshd[1992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:08:40.602000 audit[1992]: USER_AUTH pid=1992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:08:40.694385 kernel: audit: type=1100 audit(1707800920.602:327): pid=1992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:08:42.710573 sshd[1992]: Failed password for root from 134.175.129.189 port 60314 ssh2 Feb 13 05:08:43.978945 sshd[1992]: Received disconnect from 134.175.129.189 port 60314:11: Bye Bye [preauth] Feb 13 05:08:43.978945 sshd[1992]: Disconnected from authenticating user root 134.175.129.189 port 60314 [preauth] Feb 13 05:08:43.981423 systemd[1]: sshd@64-139.178.90.101:22-134.175.129.189:60314.service: Deactivated successfully. Feb 13 05:08:43.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-134.175.129.189:60314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:44.075315 kernel: audit: type=1131 audit(1707800923.981:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-134.175.129.189:60314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:47.849522 systemd[1]: Started sshd@65-139.178.90.101:22-104.250.49.150:40631.service. Feb 13 05:08:47.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:40631 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:47.943281 kernel: audit: type=1130 audit(1707800927.849:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:40631 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:50.214381 sshd[1996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:08:50.214000 audit[1996]: USER_AUTH pid=1996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:08:50.307253 kernel: audit: type=1100 audit(1707800930.214:330): pid=1996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:08:52.362923 sshd[1996]: Failed password for root from 104.250.49.150 port 40631 ssh2 Feb 13 05:08:53.571438 sshd[1996]: Received disconnect from 104.250.49.150 port 40631:11: Bye Bye [preauth] Feb 13 05:08:53.571438 sshd[1996]: Disconnected from authenticating user root 104.250.49.150 port 40631 [preauth] Feb 13 05:08:53.573897 systemd[1]: sshd@65-139.178.90.101:22-104.250.49.150:40631.service: Deactivated successfully. Feb 13 05:08:53.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:40631 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:53.667399 kernel: audit: type=1131 audit(1707800933.574:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:40631 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:57.513889 systemd[1]: Started sshd@66-139.178.90.101:22-101.43.243.60:43484.service. Feb 13 05:08:57.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-101.43.243.60:43484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:57.607393 kernel: audit: type=1130 audit(1707800937.512:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-101.43.243.60:43484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:58.541317 sshd[2000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:08:58.540000 audit[2000]: USER_AUTH pid=2000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:08:58.634396 kernel: audit: type=1100 audit(1707800938.540:333): pid=2000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:09:00.454045 sshd[2000]: Failed password for root from 101.43.243.60 port 43484 ssh2 Feb 13 05:09:01.939529 sshd[2000]: Received disconnect from 101.43.243.60 port 43484:11: Bye Bye [preauth] Feb 13 05:09:01.939529 sshd[2000]: Disconnected from authenticating user root 101.43.243.60 port 43484 [preauth] Feb 13 05:09:01.942024 systemd[1]: sshd@66-139.178.90.101:22-101.43.243.60:43484.service: Deactivated successfully. Feb 13 05:09:01.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-101.43.243.60:43484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:02.036252 kernel: audit: type=1131 audit(1707800941.941:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-101.43.243.60:43484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:05.391258 systemd[1]: Started sshd@67-139.178.90.101:22-118.195.184.139:29533.service. Feb 13 05:09:05.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-118.195.184.139:29533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:05.484403 kernel: audit: type=1130 audit(1707800945.390:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-118.195.184.139:29533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:07.014578 sshd[2005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:09:07.013000 audit[2005]: USER_AUTH pid=2005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:09:07.107251 kernel: audit: type=1100 audit(1707800947.013:336): pid=2005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:09:09.163301 sshd[2005]: Failed password for root from 118.195.184.139 port 29533 ssh2 Feb 13 05:09:10.371932 sshd[2005]: Received disconnect from 118.195.184.139 port 29533:11: Bye Bye [preauth] Feb 13 05:09:10.371932 sshd[2005]: Disconnected from authenticating user root 118.195.184.139 port 29533 [preauth] Feb 13 05:09:10.374338 systemd[1]: sshd@67-139.178.90.101:22-118.195.184.139:29533.service: Deactivated successfully. Feb 13 05:09:10.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-118.195.184.139:29533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:10.467385 kernel: audit: type=1131 audit(1707800950.373:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-118.195.184.139:29533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:18.884851 sshd[1956]: Timeout before authentication for 118.195.184.139 port 11349 Feb 13 05:09:18.886534 systemd[1]: sshd@55-139.178.90.101:22-118.195.184.139:11349.service: Deactivated successfully. Feb 13 05:09:18.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-118.195.184.139:11349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:18.981395 kernel: audit: type=1131 audit(1707800958.885:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-118.195.184.139:11349 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:23.231958 systemd[1]: Started sshd@68-139.178.90.101:22-132.255.50.81:30881.service. Feb 13 05:09:23.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-132.255.50.81:30881 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:23.324389 kernel: audit: type=1130 audit(1707800963.230:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-132.255.50.81:30881 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:24.314377 sshd[2010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:09:24.313000 audit[2010]: USER_AUTH pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:09:24.407395 kernel: audit: type=1100 audit(1707800964.313:340): pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:09:26.463099 sshd[2010]: Failed password for root from 132.255.50.81 port 30881 ssh2 Feb 13 05:09:27.713480 sshd[2010]: Received disconnect from 132.255.50.81 port 30881:11: Bye Bye [preauth] Feb 13 05:09:27.713480 sshd[2010]: Disconnected from authenticating user root 132.255.50.81 port 30881 [preauth] Feb 13 05:09:27.715947 systemd[1]: sshd@68-139.178.90.101:22-132.255.50.81:30881.service: Deactivated successfully. Feb 13 05:09:27.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-132.255.50.81:30881 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:27.810293 kernel: audit: type=1131 audit(1707800967.715:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-132.255.50.81:30881 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:28.775671 systemd[1]: Started sshd@69-139.178.90.101:22-101.43.243.60:50936.service. Feb 13 05:09:28.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-101.43.243.60:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:28.868390 kernel: audit: type=1130 audit(1707800968.774:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-101.43.243.60:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:29.693243 sshd[2016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:09:29.692000 audit[2016]: USER_AUTH pid=2016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:09:29.786368 kernel: audit: type=1100 audit(1707800969.692:343): pid=2016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:09:31.862185 sshd[2016]: Failed password for root from 101.43.243.60 port 50936 ssh2 Feb 13 05:09:33.063827 sshd[2016]: Received disconnect from 101.43.243.60 port 50936:11: Bye Bye [preauth] Feb 13 05:09:33.063827 sshd[2016]: Disconnected from authenticating user root 101.43.243.60 port 50936 [preauth] Feb 13 05:09:33.066349 systemd[1]: sshd@69-139.178.90.101:22-101.43.243.60:50936.service: Deactivated successfully. Feb 13 05:09:33.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-101.43.243.60:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:33.160261 kernel: audit: type=1131 audit(1707800973.065:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-101.43.243.60:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:38.511480 sshd[1984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:09:38.510000 audit[1984]: USER_AUTH pid=1984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:09:38.605390 kernel: audit: type=1100 audit(1707800978.510:345): pid=1984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:09:40.916061 sshd[1984]: Failed password for root from 124.230.124.250 port 40144 ssh2 Feb 13 05:09:41.895860 sshd[1984]: Connection closed by authenticating user root 124.230.124.250 port 40144 [preauth] Feb 13 05:09:41.898285 systemd[1]: sshd@62-139.178.90.101:22-124.230.124.250:40144.service: Deactivated successfully. Feb 13 05:09:41.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-124.230.124.250:40144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:41.990229 kernel: audit: type=1131 audit(1707800981.897:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-124.230.124.250:40144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:44.843614 systemd[1]: Started sshd@70-139.178.90.101:22-134.175.129.189:42846.service. Feb 13 05:09:44.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-134.175.129.189:42846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:44.937384 kernel: audit: type=1130 audit(1707800984.842:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-134.175.129.189:42846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:45.094555 systemd[1]: Started sshd@71-139.178.90.101:22-124.230.124.250:60426.service. Feb 13 05:09:45.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-124.230.124.250:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:45.188251 kernel: audit: type=1130 audit(1707800985.093:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-124.230.124.250:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:46.033532 sshd[2025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:09:46.032000 audit[2025]: USER_AUTH pid=2025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:09:46.127377 kernel: audit: type=1100 audit(1707800986.032:349): pid=2025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:09:46.622565 sshd[2023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:09:46.621000 audit[2023]: USER_AUTH pid=2023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:09:46.715249 kernel: audit: type=1100 audit(1707800986.621:350): pid=2023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:09:48.202387 sshd[2025]: Failed password for root from 124.230.124.250 port 60426 ssh2 Feb 13 05:09:48.791384 sshd[2023]: Failed password for root from 134.175.129.189 port 42846 ssh2 Feb 13 05:09:49.426743 sshd[2025]: Connection closed by authenticating user root 124.230.124.250 port 60426 [preauth] Feb 13 05:09:49.429159 systemd[1]: sshd@71-139.178.90.101:22-124.230.124.250:60426.service: Deactivated successfully. Feb 13 05:09:49.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-124.230.124.250:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:49.523376 kernel: audit: type=1131 audit(1707800989.428:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-124.230.124.250:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:49.992359 sshd[2023]: Received disconnect from 134.175.129.189 port 42846:11: Bye Bye [preauth] Feb 13 05:09:49.992359 sshd[2023]: Disconnected from authenticating user root 134.175.129.189 port 42846 [preauth] Feb 13 05:09:49.994832 systemd[1]: sshd@70-139.178.90.101:22-134.175.129.189:42846.service: Deactivated successfully. Feb 13 05:09:49.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-134.175.129.189:42846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:50.088389 kernel: audit: type=1131 audit(1707800989.994:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-134.175.129.189:42846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:58.412511 systemd[1]: Started sshd@72-139.178.90.101:22-101.43.243.60:58384.service. Feb 13 05:09:58.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-101.43.243.60:58384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:58.417110 systemd[1]: Started sshd@73-139.178.90.101:22-118.195.184.139:19422.service. Feb 13 05:09:58.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-118.195.184.139:19422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:58.596672 kernel: audit: type=1130 audit(1707800998.411:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-101.43.243.60:58384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:58.596705 kernel: audit: type=1130 audit(1707800998.415:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-118.195.184.139:19422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:59.334564 sshd[2032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:09:59.333000 audit[2032]: USER_AUTH pid=2032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:09:59.428387 kernel: audit: type=1100 audit(1707800999.333:355): pid=2032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:09:59.647388 systemd[1]: Started sshd@74-139.178.90.101:22-61.177.172.136:39161.service. Feb 13 05:09:59.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-61.177.172.136:39161 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:59.741391 kernel: audit: type=1130 audit(1707800999.646:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-61.177.172.136:39161 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:00.065485 sshd[2034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:10:00.064000 audit[2034]: USER_AUTH pid=2034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:10:00.159386 kernel: audit: type=1100 audit(1707801000.064:357): pid=2034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:10:00.678873 sshd[2038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:00.677000 audit[2038]: USER_AUTH pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:00.772381 kernel: audit: type=1100 audit(1707801000.677:358): pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:00.956374 sshd[2032]: Failed password for root from 101.43.243.60 port 58384 ssh2 Feb 13 05:10:02.710413 sshd[2032]: Received disconnect from 101.43.243.60 port 58384:11: Bye Bye [preauth] Feb 13 05:10:02.710413 sshd[2032]: Disconnected from authenticating user root 101.43.243.60 port 58384 [preauth] Feb 13 05:10:02.712942 systemd[1]: sshd@72-139.178.90.101:22-101.43.243.60:58384.service: Deactivated successfully. Feb 13 05:10:02.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-101.43.243.60:58384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:02.806230 kernel: audit: type=1131 audit(1707801002.712:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-101.43.243.60:58384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:02.825880 sshd[2034]: Failed password for root from 118.195.184.139 port 19422 ssh2 Feb 13 05:10:03.414594 sshd[2034]: Received disconnect from 118.195.184.139 port 19422:11: Bye Bye [preauth] Feb 13 05:10:03.414594 sshd[2034]: Disconnected from authenticating user root 118.195.184.139 port 19422 [preauth] Feb 13 05:10:03.417107 systemd[1]: sshd@73-139.178.90.101:22-118.195.184.139:19422.service: Deactivated successfully. Feb 13 05:10:03.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-118.195.184.139:19422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:03.438333 sshd[2038]: Failed password for root from 61.177.172.136 port 39161 ssh2 Feb 13 05:10:03.511392 kernel: audit: type=1131 audit(1707801003.416:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-118.195.184.139:19422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:04.047000 audit[2038]: USER_AUTH pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:04.141286 kernel: audit: type=1100 audit(1707801004.047:361): pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:06.020580 sshd[2038]: Failed password for root from 61.177.172.136 port 39161 ssh2 Feb 13 05:10:07.416000 audit[2038]: USER_AUTH pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:07.510377 kernel: audit: type=1100 audit(1707801007.416:362): pid=2038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:09.134750 sshd[2038]: Failed password for root from 61.177.172.136 port 39161 ssh2 Feb 13 05:10:10.786465 sshd[2038]: Received disconnect from 61.177.172.136 port 39161:11: [preauth] Feb 13 05:10:10.786465 sshd[2038]: Disconnected from authenticating user root 61.177.172.136 port 39161 [preauth] Feb 13 05:10:10.787007 sshd[2038]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:10.789000 systemd[1]: sshd@74-139.178.90.101:22-61.177.172.136:39161.service: Deactivated successfully. Feb 13 05:10:10.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-61.177.172.136:39161 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:10.882248 kernel: audit: type=1131 audit(1707801010.788:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-61.177.172.136:39161 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:10.933091 systemd[1]: Started sshd@75-139.178.90.101:22-61.177.172.136:56574.service. Feb 13 05:10:10.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-61.177.172.136:56574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.026307 kernel: audit: type=1130 audit(1707801010.931:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-61.177.172.136:56574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.027959 systemd[1]: Started sshd@76-139.178.90.101:22-218.92.0.27:62760.service. Feb 13 05:10:11.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-218.92.0.27:62760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.121400 kernel: audit: type=1130 audit(1707801011.026:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-218.92.0.27:62760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:12.868941 sshd[2046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:12.868000 audit[2046]: USER_AUTH pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:12.961378 kernel: audit: type=1100 audit(1707801012.868:366): pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:13.193930 sshd[1976]: Timeout before authentication for 118.195.184.139 port 19780 Feb 13 05:10:13.195340 systemd[1]: sshd@60-139.178.90.101:22-118.195.184.139:19780.service: Deactivated successfully. Feb 13 05:10:13.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-118.195.184.139:19780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:13.295392 kernel: audit: type=1131 audit(1707801013.194:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-118.195.184.139:19780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:15.609675 sshd[2046]: Failed password for root from 218.92.0.27 port 62760 ssh2 Feb 13 05:10:16.250000 audit[2046]: USER_AUTH pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:16.345381 kernel: audit: type=1100 audit(1707801016.250:368): pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:18.204880 sshd[2046]: Failed password for root from 218.92.0.27 port 62760 ssh2 Feb 13 05:10:19.633000 audit[2046]: USER_AUTH pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:19.727379 kernel: audit: type=1100 audit(1707801019.633:369): pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:21.667825 sshd[2046]: Failed password for root from 218.92.0.27 port 62760 ssh2 Feb 13 05:10:22.152143 systemd[1]: Started sshd@77-139.178.90.101:22-61.177.172.136:21716.service. Feb 13 05:10:22.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-61.177.172.136:21716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:22.245255 kernel: audit: type=1130 audit(1707801022.151:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-61.177.172.136:21716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.016686 sshd[2046]: Received disconnect from 218.92.0.27 port 62760:11: [preauth] Feb 13 05:10:23.016686 sshd[2046]: Disconnected from authenticating user root 218.92.0.27 port 62760 [preauth] Feb 13 05:10:23.017225 sshd[2046]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:23.019169 systemd[1]: sshd@76-139.178.90.101:22-218.92.0.27:62760.service: Deactivated successfully. Feb 13 05:10:23.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-218.92.0.27:62760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.106724 sshd[2052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:23.106000 audit[2052]: USER_AUTH pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:23.171182 systemd[1]: Started sshd@78-139.178.90.101:22-218.92.0.27:28046.service. Feb 13 05:10:23.204643 kernel: audit: type=1131 audit(1707801023.018:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-218.92.0.27:62760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.204728 kernel: audit: type=1100 audit(1707801023.106:372): pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:23.204751 kernel: audit: type=1130 audit(1707801023.171:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.27:28046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.27:28046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:24.663952 sshd[2056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:24.663000 audit[2056]: USER_AUTH pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:24.687329 sshd[2052]: Failed password for root from 61.177.172.136 port 21716 ssh2 Feb 13 05:10:24.756378 kernel: audit: type=1100 audit(1707801024.663:374): pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:24.856000 audit[2052]: USER_AUTH pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:24.955283 kernel: audit: type=1100 audit(1707801024.856:375): pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:27.384555 sshd[2056]: Failed password for root from 218.92.0.27 port 28046 ssh2 Feb 13 05:10:27.577458 sshd[2052]: Failed password for root from 61.177.172.136 port 21716 ssh2 Feb 13 05:10:28.038000 audit[2056]: USER_AUTH pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:28.130231 kernel: audit: type=1100 audit(1707801028.038:376): pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:28.213000 audit[2052]: USER_AUTH pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:28.308391 kernel: audit: type=1100 audit(1707801028.213:377): pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:30.307606 sshd[2056]: Failed password for root from 218.92.0.27 port 28046 ssh2 Feb 13 05:10:30.480087 sshd[2052]: Failed password for root from 61.177.172.136 port 21716 ssh2 Feb 13 05:10:31.413000 audit[2056]: USER_AUTH pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:31.505385 kernel: audit: type=1100 audit(1707801031.413:378): pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:31.569612 sshd[2052]: Received disconnect from 61.177.172.136 port 21716:11: [preauth] Feb 13 05:10:31.569612 sshd[2052]: Disconnected from authenticating user root 61.177.172.136 port 21716 [preauth] Feb 13 05:10:31.569795 sshd[2052]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:31.570530 systemd[1]: sshd@77-139.178.90.101:22-61.177.172.136:21716.service: Deactivated successfully. Feb 13 05:10:31.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-61.177.172.136:21716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:31.663266 kernel: audit: type=1131 audit(1707801031.570:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-61.177.172.136:21716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:31.732932 systemd[1]: Started sshd@79-139.178.90.101:22-61.177.172.136:28139.service. Feb 13 05:10:31.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-61.177.172.136:28139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:31.808906 systemd[1]: Started sshd@80-139.178.90.101:22-101.43.243.60:37616.service. Feb 13 05:10:31.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-101.43.243.60:37616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:31.917637 kernel: audit: type=1130 audit(1707801031.732:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-61.177.172.136:28139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:31.917696 kernel: audit: type=1130 audit(1707801031.808:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-101.43.243.60:37616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:32.722379 sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:10:32.722000 audit[2065]: USER_AUTH pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:10:32.729590 sshd[2062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:32.729000 audit[2062]: USER_AUTH pid=2062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:32.904711 kernel: audit: type=1100 audit(1707801032.722:382): pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:10:32.904742 kernel: audit: type=1100 audit(1707801032.729:383): pid=2062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:33.426410 sshd[2056]: Failed password for root from 218.92.0.27 port 28046 ssh2 Feb 13 05:10:34.539991 sshd[2065]: Failed password for root from 101.43.243.60 port 37616 ssh2 Feb 13 05:10:34.546634 sshd[2062]: Failed password for root from 61.177.172.136 port 28139 ssh2 Feb 13 05:10:34.787138 sshd[2056]: Received disconnect from 218.92.0.27 port 28046:11: [preauth] Feb 13 05:10:34.787138 sshd[2056]: Disconnected from authenticating user root 218.92.0.27 port 28046 [preauth] Feb 13 05:10:34.787685 sshd[2056]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:34.789691 systemd[1]: sshd@78-139.178.90.101:22-218.92.0.27:28046.service: Deactivated successfully. Feb 13 05:10:34.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.27:28046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:34.883395 kernel: audit: type=1131 audit(1707801034.789:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.27:28046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:34.946434 systemd[1]: Started sshd@81-139.178.90.101:22-218.92.0.27:37927.service. Feb 13 05:10:34.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.27:37927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:35.039194 kernel: audit: type=1130 audit(1707801034.946:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.27:37927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:35.953097 sshd[2070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:35.953000 audit[2070]: USER_AUTH pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:36.045376 kernel: audit: type=1100 audit(1707801035.953:386): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:36.089328 sshd[2065]: Received disconnect from 101.43.243.60 port 37616:11: Bye Bye [preauth] Feb 13 05:10:36.089328 sshd[2065]: Disconnected from authenticating user root 101.43.243.60 port 37616 [preauth] Feb 13 05:10:36.089965 systemd[1]: sshd@80-139.178.90.101:22-101.43.243.60:37616.service: Deactivated successfully. Feb 13 05:10:36.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-101.43.243.60:37616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:36.095000 audit[2062]: USER_AUTH pid=2062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:36.274001 kernel: audit: type=1131 audit(1707801036.089:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-101.43.243.60:37616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:36.274036 kernel: audit: type=1100 audit(1707801036.095:388): pid=2062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:38.182076 sshd[2070]: Failed password for root from 218.92.0.27 port 37927 ssh2 Feb 13 05:10:38.795985 sshd[2062]: Failed password for root from 61.177.172.136 port 28139 ssh2 Feb 13 05:10:39.323000 audit[2070]: USER_AUTH pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:39.416293 kernel: audit: type=1100 audit(1707801039.323:389): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:39.461000 audit[2062]: USER_AUTH pid=2062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:39.553386 kernel: audit: type=1100 audit(1707801039.461:390): pid=2062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:41.767578 sshd[2070]: Failed password for root from 218.92.0.27 port 37927 ssh2 Feb 13 05:10:41.906386 sshd[2062]: Failed password for root from 61.177.172.136 port 28139 ssh2 Feb 13 05:10:42.694000 audit[2070]: USER_AUTH pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:42.786390 kernel: audit: type=1100 audit(1707801042.694:391): pid=2070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:42.827626 sshd[2062]: Received disconnect from 61.177.172.136 port 28139:11: [preauth] Feb 13 05:10:42.827626 sshd[2062]: Disconnected from authenticating user root 61.177.172.136 port 28139 [preauth] Feb 13 05:10:42.827774 sshd[2062]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:42.828295 systemd[1]: sshd@79-139.178.90.101:22-61.177.172.136:28139.service: Deactivated successfully. Feb 13 05:10:42.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-61.177.172.136:28139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:42.921385 kernel: audit: type=1131 audit(1707801042.828:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-61.177.172.136:28139 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:44.883168 sshd[2070]: Failed password for root from 218.92.0.27 port 37927 ssh2 Feb 13 05:10:46.058640 sshd[2070]: Received disconnect from 218.92.0.27 port 37927:11: [preauth] Feb 13 05:10:46.058640 sshd[2070]: Disconnected from authenticating user root 218.92.0.27 port 37927 [preauth] Feb 13 05:10:46.059169 sshd[2070]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:46.061115 systemd[1]: sshd@81-139.178.90.101:22-218.92.0.27:37927.service: Deactivated successfully. Feb 13 05:10:46.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.27:37927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:46.154240 kernel: audit: type=1131 audit(1707801046.061:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.27:37927 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:50.705951 systemd[1]: Started sshd@82-139.178.90.101:22-118.195.184.139:29534.service. Feb 13 05:10:50.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-118.195.184.139:29534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:50.799242 kernel: audit: type=1130 audit(1707801050.705:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-118.195.184.139:29534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:51.537098 sshd[2081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:10:51.537000 audit[2081]: USER_AUTH pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:10:51.630377 kernel: audit: type=1100 audit(1707801051.537:395): pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:10:52.721976 systemd[1]: Started sshd@83-139.178.90.101:22-134.175.129.189:53628.service. Feb 13 05:10:52.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-134.175.129.189:53628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:52.815243 kernel: audit: type=1130 audit(1707801052.720:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-134.175.129.189:53628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:53.282779 systemd[1]: Started sshd@84-139.178.90.101:22-104.250.49.150:50288.service. Feb 13 05:10:53.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-104.250.49.150:50288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:53.376395 kernel: audit: type=1130 audit(1707801053.281:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-104.250.49.150:50288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:53.961563 sshd[2081]: Failed password for root from 118.195.184.139 port 29534 ssh2 Feb 13 05:10:54.513580 sshd[2084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:10:54.512000 audit[2084]: USER_AUTH pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:10:54.607389 kernel: audit: type=1100 audit(1707801054.512:398): pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:10:54.887268 sshd[2081]: Received disconnect from 118.195.184.139 port 29534:11: Bye Bye [preauth] Feb 13 05:10:54.887268 sshd[2081]: Disconnected from authenticating user root 118.195.184.139 port 29534 [preauth] Feb 13 05:10:54.889616 systemd[1]: sshd@82-139.178.90.101:22-118.195.184.139:29534.service: Deactivated successfully. Feb 13 05:10:54.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-118.195.184.139:29534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:54.982399 kernel: audit: type=1131 audit(1707801054.888:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-118.195.184.139:29534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:56.685485 sshd[2084]: Failed password for root from 134.175.129.189 port 53628 ssh2 Feb 13 05:10:57.889134 sshd[2084]: Received disconnect from 134.175.129.189 port 53628:11: Bye Bye [preauth] Feb 13 05:10:57.889134 sshd[2084]: Disconnected from authenticating user root 134.175.129.189 port 53628 [preauth] Feb 13 05:10:57.891625 systemd[1]: sshd@83-139.178.90.101:22-134.175.129.189:53628.service: Deactivated successfully. Feb 13 05:10:57.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-134.175.129.189:53628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:57.985306 kernel: audit: type=1131 audit(1707801057.890:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-134.175.129.189:53628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:59.518649 sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:10:59.517000 audit[2086]: USER_AUTH pid=2086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:10:59.612390 kernel: audit: type=1100 audit(1707801059.517:401): pid=2086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:11:02.043693 sshd[2086]: Failed password for root from 104.250.49.150 port 50288 ssh2 Feb 13 05:11:03.971298 sshd[2086]: Received disconnect from 104.250.49.150 port 50288:11: Bye Bye [preauth] Feb 13 05:11:03.971298 sshd[2086]: Disconnected from authenticating user root 104.250.49.150 port 50288 [preauth] Feb 13 05:11:03.973947 systemd[1]: sshd@84-139.178.90.101:22-104.250.49.150:50288.service: Deactivated successfully. Feb 13 05:11:03.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-104.250.49.150:50288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:04.068386 kernel: audit: type=1131 audit(1707801063.973:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-104.250.49.150:50288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:04.789353 systemd[1]: Started sshd@85-139.178.90.101:22-101.43.243.60:45076.service. Feb 13 05:11:04.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-101.43.243.60:45076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:04.882383 kernel: audit: type=1130 audit(1707801064.788:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-101.43.243.60:45076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:05.677123 sshd[2096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:11:05.676000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:11:05.769375 kernel: audit: type=1100 audit(1707801065.676:404): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:11:07.358576 sshd[2096]: Failed password for root from 101.43.243.60 port 45076 ssh2 Feb 13 05:11:09.034732 sshd[2096]: Received disconnect from 101.43.243.60 port 45076:11: Bye Bye [preauth] Feb 13 05:11:09.034732 sshd[2096]: Disconnected from authenticating user root 101.43.243.60 port 45076 [preauth] Feb 13 05:11:09.037179 systemd[1]: sshd@85-139.178.90.101:22-101.43.243.60:45076.service: Deactivated successfully. Feb 13 05:11:09.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-101.43.243.60:45076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:09.131381 kernel: audit: type=1131 audit(1707801069.036:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-101.43.243.60:45076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:31.465842 systemd[1]: Started sshd@86-139.178.90.101:22-132.255.50.81:17883.service. Feb 13 05:11:31.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-132.255.50.81:17883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:31.559389 kernel: audit: type=1130 audit(1707801091.464:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-132.255.50.81:17883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:32.851528 sshd[2100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:11:32.850000 audit[2100]: USER_AUTH pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:11:32.943375 kernel: audit: type=1100 audit(1707801092.850:407): pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:11:34.573530 sshd[2100]: Failed password for root from 132.255.50.81 port 17883 ssh2 Feb 13 05:11:34.788632 systemd[1]: Started sshd@87-139.178.90.101:22-101.43.243.60:52532.service. Feb 13 05:11:34.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-101.43.243.60:52532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:34.881240 kernel: audit: type=1130 audit(1707801094.787:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-101.43.243.60:52532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:35.718616 sshd[2103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:11:35.717000 audit[2103]: USER_AUTH pid=2103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:11:35.811388 kernel: audit: type=1100 audit(1707801095.717:409): pid=2103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:11:36.246336 sshd[2100]: Received disconnect from 132.255.50.81 port 17883:11: Bye Bye [preauth] Feb 13 05:11:36.246336 sshd[2100]: Disconnected from authenticating user root 132.255.50.81 port 17883 [preauth] Feb 13 05:11:36.248801 systemd[1]: sshd@86-139.178.90.101:22-132.255.50.81:17883.service: Deactivated successfully. Feb 13 05:11:36.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-132.255.50.81:17883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:36.343245 kernel: audit: type=1131 audit(1707801096.248:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-132.255.50.81:17883 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:37.851569 sshd[2103]: Failed password for root from 101.43.243.60 port 52532 ssh2 Feb 13 05:11:39.089354 sshd[2103]: Received disconnect from 101.43.243.60 port 52532:11: Bye Bye [preauth] Feb 13 05:11:39.089354 sshd[2103]: Disconnected from authenticating user root 101.43.243.60 port 52532 [preauth] Feb 13 05:11:39.091795 systemd[1]: sshd@87-139.178.90.101:22-101.43.243.60:52532.service: Deactivated successfully. Feb 13 05:11:39.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-101.43.243.60:52532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:39.185369 kernel: audit: type=1131 audit(1707801099.091:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-101.43.243.60:52532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:41.980538 systemd[1]: Started sshd@88-139.178.90.101:22-118.195.184.139:19423.service. Feb 13 05:11:41.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-118.195.184.139:19423 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:42.073371 kernel: audit: type=1130 audit(1707801101.979:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-118.195.184.139:19423 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:00.090037 systemd[1]: Started sshd@89-139.178.90.101:22-134.175.129.189:36176.service. Feb 13 05:12:00.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-134.175.129.189:36176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:00.183274 kernel: audit: type=1130 audit(1707801120.088:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-134.175.129.189:36176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:03.234440 systemd[1]: Started sshd@90-139.178.90.101:22-101.43.243.60:59986.service. Feb 13 05:12:03.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-101.43.243.60:59986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:03.328290 kernel: audit: type=1130 audit(1707801123.233:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-101.43.243.60:59986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:03.870593 systemd[1]: Started sshd@91-139.178.90.101:22-124.230.124.250:37854.service. Feb 13 05:12:03.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-124.230.124.250:37854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:03.964390 kernel: audit: type=1130 audit(1707801123.869:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-124.230.124.250:37854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:04.198898 sshd[2112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:12:04.197000 audit[2112]: USER_AUTH pid=2112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:12:04.298279 kernel: audit: type=1100 audit(1707801124.197:416): pid=2112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:12:05.247629 sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:12:05.246000 audit[2115]: USER_AUTH pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:12:05.340243 kernel: audit: type=1100 audit(1707801125.246:417): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:12:06.312448 sshd[2112]: Failed password for root from 101.43.243.60 port 59986 ssh2 Feb 13 05:12:07.165404 sshd[2115]: Failed password for root from 124.230.124.250 port 37854 ssh2 Feb 13 05:12:07.574915 sshd[2112]: Received disconnect from 101.43.243.60 port 59986:11: Bye Bye [preauth] Feb 13 05:12:07.574915 sshd[2112]: Disconnected from authenticating user root 101.43.243.60 port 59986 [preauth] Feb 13 05:12:07.577362 systemd[1]: sshd@90-139.178.90.101:22-101.43.243.60:59986.service: Deactivated successfully. Feb 13 05:12:07.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-101.43.243.60:59986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:07.670246 kernel: audit: type=1131 audit(1707801127.576:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-101.43.243.60:59986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:08.625150 sshd[2115]: Connection closed by authenticating user root 124.230.124.250 port 37854 [preauth] Feb 13 05:12:08.627572 systemd[1]: sshd@91-139.178.90.101:22-124.230.124.250:37854.service: Deactivated successfully. Feb 13 05:12:08.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-124.230.124.250:37854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:08.721264 kernel: audit: type=1131 audit(1707801128.626:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-124.230.124.250:37854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:08.818072 systemd[1]: Started sshd@92-139.178.90.101:22-124.230.124.250:37730.service. Feb 13 05:12:08.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-124.230.124.250:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:08.911194 kernel: audit: type=1130 audit(1707801128.817:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-124.230.124.250:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:10.308067 sshd[2121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:12:10.307000 audit[2121]: USER_AUTH pid=2121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:12:10.401422 kernel: audit: type=1100 audit(1707801130.307:421): pid=2121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:12:10.828101 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T05:12:10.827Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1834} Feb 13 05:12:10.843610 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T05:12:10.843Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1834,"took":"14.679552ms"} Feb 13 05:12:10.939433 sshd[2044]: Timeout before authentication for 61.177.172.136 port 56574 Feb 13 05:12:10.940925 systemd[1]: sshd@75-139.178.90.101:22-61.177.172.136:56574.service: Deactivated successfully. Feb 13 05:12:10.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-61.177.172.136:56574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:11.035251 kernel: audit: type=1131 audit(1707801130.940:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-61.177.172.136:56574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:12.913266 sshd[2121]: Failed password for root from 124.230.124.250 port 37730 ssh2 Feb 13 05:12:13.697539 sshd[2121]: Connection closed by authenticating user root 124.230.124.250 port 37730 [preauth] Feb 13 05:12:13.699962 systemd[1]: sshd@92-139.178.90.101:22-124.230.124.250:37730.service: Deactivated successfully. Feb 13 05:12:13.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-124.230.124.250:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:13.794390 kernel: audit: type=1131 audit(1707801133.699:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-124.230.124.250:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:13.887428 systemd[1]: Started sshd@93-139.178.90.101:22-124.230.124.250:60586.service. Feb 13 05:12:13.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-124.230.124.250:60586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:13.979387 kernel: audit: type=1130 audit(1707801133.886:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-124.230.124.250:60586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:31.489713 systemd[1]: Started sshd@94-139.178.90.101:22-101.43.243.60:39210.service. Feb 13 05:12:31.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-101.43.243.60:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:31.582208 kernel: audit: type=1130 audit(1707801151.488:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-101.43.243.60:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:32.411295 sshd[2129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:12:32.410000 audit[2129]: USER_AUTH pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:12:32.504239 kernel: audit: type=1100 audit(1707801152.410:426): pid=2129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:12:33.576334 systemd[1]: Started sshd@95-139.178.90.101:22-118.195.184.139:34959.service. Feb 13 05:12:33.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-118.195.184.139:34959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:33.669387 kernel: audit: type=1130 audit(1707801153.575:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-118.195.184.139:34959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:34.369350 sshd[2129]: Failed password for root from 101.43.243.60 port 39210 ssh2 Feb 13 05:12:35.186422 sshd[2132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:12:35.185000 audit[2132]: USER_AUTH pid=2132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:12:35.279237 kernel: audit: type=1100 audit(1707801155.185:428): pid=2132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:12:35.787945 sshd[2129]: Received disconnect from 101.43.243.60 port 39210:11: Bye Bye [preauth] Feb 13 05:12:35.787945 sshd[2129]: Disconnected from authenticating user root 101.43.243.60 port 39210 [preauth] Feb 13 05:12:35.790422 systemd[1]: sshd@94-139.178.90.101:22-101.43.243.60:39210.service: Deactivated successfully. Feb 13 05:12:35.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-101.43.243.60:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:35.884272 kernel: audit: type=1131 audit(1707801155.790:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-101.43.243.60:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:37.224471 sshd[2132]: Failed password for root from 118.195.184.139 port 34959 ssh2 Feb 13 05:12:38.543179 sshd[2132]: Received disconnect from 118.195.184.139 port 34959:11: Bye Bye [preauth] Feb 13 05:12:38.543179 sshd[2132]: Disconnected from authenticating user root 118.195.184.139 port 34959 [preauth] Feb 13 05:12:38.545722 systemd[1]: sshd@95-139.178.90.101:22-118.195.184.139:34959.service: Deactivated successfully. Feb 13 05:12:38.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-118.195.184.139:34959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:38.639381 kernel: audit: type=1131 audit(1707801158.545:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-118.195.184.139:34959 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:52.900698 systemd[1]: Started sshd@96-139.178.90.101:22-218.92.0.112:54065.service. Feb 13 05:12:52.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-218.92.0.112:54065 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:52.993367 kernel: audit: type=1130 audit(1707801172.900:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-218.92.0.112:54065 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:54.714406 sshd[2138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:12:54.714000 audit[2138]: USER_AUTH pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:12:54.807386 kernel: audit: type=1100 audit(1707801174.714:432): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:12:56.692528 sshd[2138]: Failed password for root from 218.92.0.112 port 54065 ssh2 Feb 13 05:12:58.074000 audit[2138]: USER_AUTH pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:12:58.166230 kernel: audit: type=1100 audit(1707801178.074:433): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:00.267964 sshd[2138]: Failed password for root from 218.92.0.112 port 54065 ssh2 Feb 13 05:13:01.090153 systemd[1]: Started sshd@97-139.178.90.101:22-101.43.243.60:46662.service. Feb 13 05:13:01.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-101.43.243.60:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:01.182318 kernel: audit: type=1130 audit(1707801181.090:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-101.43.243.60:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:01.433000 audit[2138]: USER_AUTH pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:01.533392 kernel: audit: type=1100 audit(1707801181.433:435): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:01.998946 sshd[2141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:13:01.999000 audit[2141]: USER_AUTH pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:13:02.091194 kernel: audit: type=1100 audit(1707801181.999:436): pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:13:02.703451 sshd[2138]: Failed password for root from 218.92.0.112 port 54065 ssh2 Feb 13 05:13:03.269575 sshd[2141]: Failed password for root from 101.43.243.60 port 46662 ssh2 Feb 13 05:13:03.550550 sshd[2138]: Received disconnect from 218.92.0.112 port 54065:11: [preauth] Feb 13 05:13:03.550550 sshd[2138]: Disconnected from authenticating user root 218.92.0.112 port 54065 [preauth] Feb 13 05:13:03.550970 sshd[2138]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:03.552950 systemd[1]: sshd@96-139.178.90.101:22-218.92.0.112:54065.service: Deactivated successfully. Feb 13 05:13:03.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-218.92.0.112:54065 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:03.645248 kernel: audit: type=1131 audit(1707801183.553:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-218.92.0.112:54065 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:03.704017 systemd[1]: Started sshd@98-139.178.90.101:22-218.92.0.112:60740.service. Feb 13 05:13:03.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-218.92.0.112:60740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:03.756882 sshd[2141]: Received disconnect from 101.43.243.60 port 46662:11: Bye Bye [preauth] Feb 13 05:13:03.756882 sshd[2141]: Disconnected from authenticating user root 101.43.243.60 port 46662 [preauth] Feb 13 05:13:03.757381 systemd[1]: sshd@97-139.178.90.101:22-101.43.243.60:46662.service: Deactivated successfully. Feb 13 05:13:03.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-101.43.243.60:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:03.887273 kernel: audit: type=1130 audit(1707801183.703:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-218.92.0.112:60740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:03.887310 kernel: audit: type=1131 audit(1707801183.757:439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-101.43.243.60:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:04.923683 systemd[1]: Started sshd@99-139.178.90.101:22-134.175.129.189:46960.service. Feb 13 05:13:04.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-134.175.129.189:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:05.016387 kernel: audit: type=1130 audit(1707801184.923:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-134.175.129.189:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:06.119345 sshd[2145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:06.119000 audit[2145]: USER_AUTH pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:06.211255 kernel: audit: type=1100 audit(1707801186.119:441): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:06.702668 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:13:06.702000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:13:06.795388 kernel: audit: type=1100 audit(1707801186.702:442): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:13:08.077491 sshd[2145]: Failed password for root from 218.92.0.112 port 60740 ssh2 Feb 13 05:13:08.659464 sshd[2149]: Failed password for root from 134.175.129.189 port 46960 ssh2 Feb 13 05:13:09.482000 audit[2145]: USER_AUTH pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:09.574374 kernel: audit: type=1100 audit(1707801189.482:443): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:10.072383 sshd[2149]: Received disconnect from 134.175.129.189 port 46960:11: Bye Bye [preauth] Feb 13 05:13:10.072383 sshd[2149]: Disconnected from authenticating user root 134.175.129.189 port 46960 [preauth] Feb 13 05:13:10.074835 systemd[1]: sshd@99-139.178.90.101:22-134.175.129.189:46960.service: Deactivated successfully. Feb 13 05:13:10.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-134.175.129.189:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:10.168395 kernel: audit: type=1131 audit(1707801190.075:444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-134.175.129.189:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:11.520540 sshd[2145]: Failed password for root from 218.92.0.112 port 60740 ssh2 Feb 13 05:13:12.839000 audit[2145]: USER_AUTH pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:12.933377 kernel: audit: type=1100 audit(1707801192.839:445): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:14.623137 sshd[2145]: Failed password for root from 218.92.0.112 port 60740 ssh2 Feb 13 05:13:16.200821 sshd[2145]: Received disconnect from 218.92.0.112 port 60740:11: [preauth] Feb 13 05:13:16.200821 sshd[2145]: Disconnected from authenticating user root 218.92.0.112 port 60740 [preauth] Feb 13 05:13:16.201329 sshd[2145]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:16.203435 systemd[1]: sshd@98-139.178.90.101:22-218.92.0.112:60740.service: Deactivated successfully. Feb 13 05:13:16.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-218.92.0.112:60740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:16.296385 kernel: audit: type=1131 audit(1707801196.202:446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-218.92.0.112:60740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:16.358247 systemd[1]: Started sshd@100-139.178.90.101:22-218.92.0.112:30146.service. Feb 13 05:13:16.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-218.92.0.112:30146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:16.451384 kernel: audit: type=1130 audit(1707801196.357:447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-218.92.0.112:30146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:17.613121 sshd[2154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:17.612000 audit[2154]: USER_AUTH pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:17.705321 kernel: audit: type=1100 audit(1707801197.612:448): pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:19.747306 sshd[2154]: Failed password for root from 218.92.0.112 port 30146 ssh2 Feb 13 05:13:20.973000 audit[2154]: USER_AUTH pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:21.066377 kernel: audit: type=1100 audit(1707801200.973:449): pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:22.520455 sshd[2154]: Failed password for root from 218.92.0.112 port 30146 ssh2 Feb 13 05:13:22.727000 audit[2154]: USER_AUTH pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:22.821266 kernel: audit: type=1100 audit(1707801202.727:450): pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:24.551390 sshd[2154]: Failed password for root from 218.92.0.112 port 30146 ssh2 Feb 13 05:13:24.664881 systemd[1]: Started sshd@101-139.178.90.101:22-118.195.184.139:13774.service. Feb 13 05:13:24.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-118.195.184.139:13774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:24.758385 kernel: audit: type=1130 audit(1707801204.663:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-118.195.184.139:13774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:26.090084 sshd[2154]: Received disconnect from 218.92.0.112 port 30146:11: [preauth] Feb 13 05:13:26.090084 sshd[2154]: Disconnected from authenticating user root 218.92.0.112 port 30146 [preauth] Feb 13 05:13:26.090610 sshd[2154]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:26.092563 systemd[1]: sshd@100-139.178.90.101:22-218.92.0.112:30146.service: Deactivated successfully. Feb 13 05:13:26.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-218.92.0.112:30146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:26.186386 kernel: audit: type=1131 audit(1707801206.091:452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-218.92.0.112:30146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:30.167851 systemd[1]: Started sshd@102-139.178.90.101:22-101.43.243.60:54120.service. Feb 13 05:13:30.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-101.43.243.60:54120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:30.260195 kernel: audit: type=1130 audit(1707801210.166:453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-101.43.243.60:54120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:31.090315 sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:13:31.089000 audit[2161]: USER_AUTH pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:13:31.183380 kernel: audit: type=1100 audit(1707801211.089:454): pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:13:32.480553 sshd[2161]: Failed password for root from 101.43.243.60 port 54120 ssh2 Feb 13 05:13:32.849706 sshd[2161]: Received disconnect from 101.43.243.60 port 54120:11: Bye Bye [preauth] Feb 13 05:13:32.849706 sshd[2161]: Disconnected from authenticating user root 101.43.243.60 port 54120 [preauth] Feb 13 05:13:32.852033 systemd[1]: sshd@102-139.178.90.101:22-101.43.243.60:54120.service: Deactivated successfully. Feb 13 05:13:32.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-101.43.243.60:54120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:32.946398 kernel: audit: type=1131 audit(1707801212.851:455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-101.43.243.60:54120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:41.985743 sshd[2108]: Timeout before authentication for 118.195.184.139 port 19423 Feb 13 05:13:41.987428 systemd[1]: sshd@88-139.178.90.101:22-118.195.184.139:19423.service: Deactivated successfully. Feb 13 05:13:41.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-118.195.184.139:19423 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:42.080384 kernel: audit: type=1131 audit(1707801221.986:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-118.195.184.139:19423 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:42.611335 systemd[1]: Started sshd@103-139.178.90.101:22-132.255.50.81:19546.service. Feb 13 05:13:42.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-132.255.50.81:19546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:42.704195 kernel: audit: type=1130 audit(1707801222.610:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-132.255.50.81:19546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:43.673035 sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:13:43.672000 audit[2166]: USER_AUTH pid=2166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:13:43.765377 kernel: audit: type=1100 audit(1707801223.672:458): pid=2166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:13:45.044005 sshd[2166]: Failed password for root from 132.255.50.81 port 19546 ssh2 Feb 13 05:13:45.461838 sshd[2166]: Received disconnect from 132.255.50.81 port 19546:11: Bye Bye [preauth] Feb 13 05:13:45.461838 sshd[2166]: Disconnected from authenticating user root 132.255.50.81 port 19546 [preauth] Feb 13 05:13:45.464169 systemd[1]: sshd@103-139.178.90.101:22-132.255.50.81:19546.service: Deactivated successfully. Feb 13 05:13:45.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-132.255.50.81:19546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:45.558274 kernel: audit: type=1131 audit(1707801225.463:459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-132.255.50.81:19546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:00.095323 sshd[2110]: Timeout before authentication for 134.175.129.189 port 36176 Feb 13 05:14:00.096831 systemd[1]: sshd@89-139.178.90.101:22-134.175.129.189:36176.service: Deactivated successfully. Feb 13 05:14:00.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-134.175.129.189:36176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:00.190386 kernel: audit: type=1131 audit(1707801240.096:460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-134.175.129.189:36176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:00.686108 systemd[1]: Started sshd@104-139.178.90.101:22-101.43.243.60:33344.service. Feb 13 05:14:00.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-101.43.243.60:33344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:00.779395 kernel: audit: type=1130 audit(1707801240.685:461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-101.43.243.60:33344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:01.646992 sshd[2171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:14:01.646000 audit[2171]: USER_AUTH pid=2171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:14:01.739266 kernel: audit: type=1100 audit(1707801241.646:462): pid=2171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:14:02.822155 sshd[2171]: Failed password for root from 101.43.243.60 port 33344 ssh2 Feb 13 05:14:03.414773 sshd[2171]: Received disconnect from 101.43.243.60 port 33344:11: Bye Bye [preauth] Feb 13 05:14:03.414773 sshd[2171]: Disconnected from authenticating user root 101.43.243.60 port 33344 [preauth] Feb 13 05:14:03.417267 systemd[1]: sshd@104-139.178.90.101:22-101.43.243.60:33344.service: Deactivated successfully. Feb 13 05:14:03.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-101.43.243.60:33344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:03.511196 kernel: audit: type=1131 audit(1707801243.416:463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-101.43.243.60:33344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:13.052580 systemd[1]: Started sshd@105-139.178.90.101:22-134.175.129.189:57734.service. Feb 13 05:14:13.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-134.175.129.189:57734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:13.145239 kernel: audit: type=1130 audit(1707801253.051:464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-134.175.129.189:57734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:13.896010 sshd[2126]: Timeout before authentication for 124.230.124.250 port 60586 Feb 13 05:14:13.897446 systemd[1]: sshd@93-139.178.90.101:22-124.230.124.250:60586.service: Deactivated successfully. Feb 13 05:14:13.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-124.230.124.250:60586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:13.990270 kernel: audit: type=1131 audit(1707801253.896:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-124.230.124.250:60586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:14.845060 sshd[2175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:14:14.844000 audit[2175]: USER_AUTH pid=2175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:14:14.938241 kernel: audit: type=1100 audit(1707801254.844:466): pid=2175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:14:16.471820 sshd[2175]: Failed password for root from 134.175.129.189 port 57734 ssh2 Feb 13 05:14:16.823162 systemd[1]: Started sshd@106-139.178.90.101:22-118.195.184.139:56730.service. Feb 13 05:14:16.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-118.195.184.139:56730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:16.916259 kernel: audit: type=1130 audit(1707801256.822:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-118.195.184.139:56730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:18.218444 sshd[2175]: Received disconnect from 134.175.129.189 port 57734:11: Bye Bye [preauth] Feb 13 05:14:18.218444 sshd[2175]: Disconnected from authenticating user root 134.175.129.189 port 57734 [preauth] Feb 13 05:14:18.220930 systemd[1]: sshd@105-139.178.90.101:22-134.175.129.189:57734.service: Deactivated successfully. Feb 13 05:14:18.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-134.175.129.189:57734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:18.315324 kernel: audit: type=1131 audit(1707801258.220:468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-134.175.129.189:57734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:18.444927 sshd[2179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:14:18.444000 audit[2179]: USER_AUTH pid=2179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:14:18.544404 kernel: audit: type=1100 audit(1707801258.444:469): pid=2179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:14:20.954923 sshd[2179]: Failed password for root from 118.195.184.139 port 56730 ssh2 Feb 13 05:14:21.806357 sshd[2179]: Received disconnect from 118.195.184.139 port 56730:11: Bye Bye [preauth] Feb 13 05:14:21.806357 sshd[2179]: Disconnected from authenticating user root 118.195.184.139 port 56730 [preauth] Feb 13 05:14:21.808892 systemd[1]: sshd@106-139.178.90.101:22-118.195.184.139:56730.service: Deactivated successfully. Feb 13 05:14:21.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-118.195.184.139:56730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:21.902229 kernel: audit: type=1131 audit(1707801261.808:470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-118.195.184.139:56730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:29.159325 systemd[1]: Started sshd@107-139.178.90.101:22-101.43.243.60:40802.service. Feb 13 05:14:29.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-101.43.243.60:40802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:29.252247 kernel: audit: type=1130 audit(1707801269.158:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-101.43.243.60:40802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:30.084893 sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:14:30.083000 audit[2186]: USER_AUTH pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:14:30.176390 kernel: audit: type=1100 audit(1707801270.083:472): pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:14:32.574838 sshd[2186]: Failed password for root from 101.43.243.60 port 40802 ssh2 Feb 13 05:14:33.450900 sshd[2186]: Received disconnect from 101.43.243.60 port 40802:11: Bye Bye [preauth] Feb 13 05:14:33.450900 sshd[2186]: Disconnected from authenticating user root 101.43.243.60 port 40802 [preauth] Feb 13 05:14:33.453402 systemd[1]: sshd@107-139.178.90.101:22-101.43.243.60:40802.service: Deactivated successfully. Feb 13 05:14:33.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-101.43.243.60:40802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:33.547396 kernel: audit: type=1131 audit(1707801273.452:473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-101.43.243.60:40802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:47.942494 systemd[1]: Started sshd@108-139.178.90.101:22-218.92.0.34:48195.service. Feb 13 05:14:47.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-218.92.0.34:48195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:48.035195 kernel: audit: type=1130 audit(1707801287.941:474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-218.92.0.34:48195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:48.949844 sshd[2190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:14:48.948000 audit[2190]: USER_AUTH pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:49.042230 kernel: audit: type=1100 audit(1707801288.948:475): pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:51.579576 sshd[2190]: Failed password for root from 218.92.0.34 port 48195 ssh2 Feb 13 05:14:52.309000 audit[2190]: USER_AUTH pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:52.402368 kernel: audit: type=1100 audit(1707801292.309:476): pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:54.152568 sshd[2190]: Failed password for root from 218.92.0.34 port 48195 ssh2 Feb 13 05:14:55.670000 audit[2190]: USER_AUTH pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:55.763383 kernel: audit: type=1100 audit(1707801295.670:477): pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:58.260469 sshd[2190]: Failed password for root from 218.92.0.34 port 48195 ssh2 Feb 13 05:14:59.033637 sshd[2190]: Received disconnect from 218.92.0.34 port 48195:11: [preauth] Feb 13 05:14:59.033637 sshd[2190]: Disconnected from authenticating user root 218.92.0.34 port 48195 [preauth] Feb 13 05:14:59.034153 sshd[2190]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:14:59.036085 systemd[1]: sshd@108-139.178.90.101:22-218.92.0.34:48195.service: Deactivated successfully. Feb 13 05:14:59.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-218.92.0.34:48195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:59.129377 kernel: audit: type=1131 audit(1707801299.035:478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-218.92.0.34:48195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:59.173972 systemd[1]: Started sshd@109-139.178.90.101:22-218.92.0.34:11585.service. Feb 13 05:14:59.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:11585 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:59.265195 kernel: audit: type=1130 audit(1707801299.172:479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:11585 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:00.124853 sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:00.123000 audit[2194]: USER_AUTH pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:00.217374 kernel: audit: type=1100 audit(1707801300.123:480): pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:02.735049 sshd[2194]: Failed password for root from 218.92.0.34 port 11585 ssh2 Feb 13 05:15:03.479000 audit[2194]: USER_AUTH pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:03.572398 kernel: audit: type=1100 audit(1707801303.479:481): pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:05.167569 sshd[2194]: Failed password for root from 218.92.0.34 port 11585 ssh2 Feb 13 05:15:05.194618 systemd[1]: Started sshd@110-139.178.90.101:22-104.250.49.150:41366.service. Feb 13 05:15:05.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-104.250.49.150:41366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:05.287397 kernel: audit: type=1130 audit(1707801305.193:482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-104.250.49.150:41366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:06.839000 audit[2194]: USER_AUTH pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:06.932263 kernel: audit: type=1100 audit(1707801306.839:483): pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:06.972050 systemd[1]: Started sshd@111-139.178.90.101:22-101.43.243.60:48266.service. Feb 13 05:15:06.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-101.43.243.60:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:07.065248 kernel: audit: type=1130 audit(1707801306.970:484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-101.43.243.60:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:07.908719 sshd[2200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:15:07.907000 audit[2200]: USER_AUTH pid=2200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:15:08.001244 kernel: audit: type=1100 audit(1707801307.907:485): pid=2200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:15:08.938002 sshd[2194]: Failed password for root from 218.92.0.34 port 11585 ssh2 Feb 13 05:15:09.149390 sshd[2197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:15:09.148000 audit[2197]: USER_AUTH pid=2197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:15:09.243378 kernel: audit: type=1100 audit(1707801309.148:486): pid=2197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:15:10.198867 sshd[2194]: Received disconnect from 218.92.0.34 port 11585:11: [preauth] Feb 13 05:15:10.198867 sshd[2194]: Disconnected from authenticating user root 218.92.0.34 port 11585 [preauth] Feb 13 05:15:10.199414 sshd[2194]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:10.201396 systemd[1]: sshd@109-139.178.90.101:22-218.92.0.34:11585.service: Deactivated successfully. Feb 13 05:15:10.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:11585 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:10.294368 kernel: audit: type=1131 audit(1707801310.200:487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:11585 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:10.365582 systemd[1]: Started sshd@112-139.178.90.101:22-218.92.0.34:28478.service. Feb 13 05:15:10.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-218.92.0.34:28478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:10.459393 kernel: audit: type=1130 audit(1707801310.364:488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-218.92.0.34:28478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:10.478454 sshd[2200]: Failed password for root from 101.43.243.60 port 48266 ssh2 Feb 13 05:15:10.785151 systemd[1]: Started sshd@113-139.178.90.101:22-118.195.184.139:21154.service. Feb 13 05:15:10.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-118.195.184.139:21154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:10.877403 kernel: audit: type=1130 audit(1707801310.784:489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-118.195.184.139:21154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:11.277709 sshd[2200]: Received disconnect from 101.43.243.60 port 48266:11: Bye Bye [preauth] Feb 13 05:15:11.277709 sshd[2200]: Disconnected from authenticating user root 101.43.243.60 port 48266 [preauth] Feb 13 05:15:11.280229 systemd[1]: sshd@111-139.178.90.101:22-101.43.243.60:48266.service: Deactivated successfully. Feb 13 05:15:11.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-101.43.243.60:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:11.327812 sshd[2197]: Failed password for root from 104.250.49.150 port 41366 ssh2 Feb 13 05:15:11.374279 kernel: audit: type=1131 audit(1707801311.280:490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-101.43.243.60:48266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:11.375468 sshd[2205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:11.374000 audit[2205]: USER_AUTH pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:11.467352 kernel: audit: type=1100 audit(1707801311.374:491): pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:12.506504 sshd[2197]: Received disconnect from 104.250.49.150 port 41366:11: Bye Bye [preauth] Feb 13 05:15:12.506504 sshd[2197]: Disconnected from authenticating user root 104.250.49.150 port 41366 [preauth] Feb 13 05:15:12.508937 systemd[1]: sshd@110-139.178.90.101:22-104.250.49.150:41366.service: Deactivated successfully. Feb 13 05:15:12.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-104.250.49.150:41366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:12.602407 kernel: audit: type=1131 audit(1707801312.508:492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-104.250.49.150:41366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:13.493762 sshd[2205]: Failed password for root from 218.92.0.34 port 28478 ssh2 Feb 13 05:15:14.741000 audit[2205]: USER_AUTH pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:14.835379 kernel: audit: type=1100 audit(1707801314.741:493): pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:16.273556 sshd[2205]: Failed password for root from 218.92.0.34 port 28478 ssh2 Feb 13 05:15:16.501000 audit[2205]: USER_AUTH pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:16.594389 kernel: audit: type=1100 audit(1707801316.501:494): pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:18.640462 sshd[2205]: Failed password for root from 218.92.0.34 port 28478 ssh2 Feb 13 05:15:19.378272 systemd[1]: Started sshd@114-139.178.90.101:22-134.175.129.189:40276.service. Feb 13 05:15:19.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-134.175.129.189:40276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:19.471276 kernel: audit: type=1130 audit(1707801319.377:495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-134.175.129.189:40276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:20.242390 sshd[2205]: Received disconnect from 218.92.0.34 port 28478:11: [preauth] Feb 13 05:15:20.242390 sshd[2205]: Disconnected from authenticating user root 218.92.0.34 port 28478 [preauth] Feb 13 05:15:20.242950 sshd[2205]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:20.244965 systemd[1]: sshd@112-139.178.90.101:22-218.92.0.34:28478.service: Deactivated successfully. Feb 13 05:15:20.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-218.92.0.34:28478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:20.338386 kernel: audit: type=1131 audit(1707801320.245:496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-218.92.0.34:28478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:24.670234 sshd[2157]: Timeout before authentication for 118.195.184.139 port 13774 Feb 13 05:15:24.671671 systemd[1]: sshd@101-139.178.90.101:22-118.195.184.139:13774.service: Deactivated successfully. Feb 13 05:15:24.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-118.195.184.139:13774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:24.764254 kernel: audit: type=1131 audit(1707801324.671:497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-118.195.184.139:13774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:40.470156 systemd[1]: Started sshd@115-139.178.90.101:22-132.255.50.81:43205.service. Feb 13 05:15:40.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:43205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:40.563385 kernel: audit: type=1130 audit(1707801340.470:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:43205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:41.551995 sshd[2218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:15:41.552000 audit[2218]: USER_AUTH pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:15:41.644253 kernel: audit: type=1100 audit(1707801341.552:499): pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:15:43.790712 sshd[2218]: Failed password for root from 132.255.50.81 port 43205 ssh2 Feb 13 05:15:44.950963 sshd[2218]: Received disconnect from 132.255.50.81 port 43205:11: Bye Bye [preauth] Feb 13 05:15:44.950963 sshd[2218]: Disconnected from authenticating user root 132.255.50.81 port 43205 [preauth] Feb 13 05:15:44.953406 systemd[1]: sshd@115-139.178.90.101:22-132.255.50.81:43205.service: Deactivated successfully. Feb 13 05:15:44.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:43205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:45.047388 kernel: audit: type=1131 audit(1707801344.953:500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:43205 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:45.118332 systemd[1]: Started sshd@116-139.178.90.101:22-101.43.243.60:55730.service. Feb 13 05:15:45.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-101.43.243.60:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:45.211393 kernel: audit: type=1130 audit(1707801345.118:501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-101.43.243.60:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:46.004177 sshd[2222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:15:46.004000 audit[2222]: USER_AUTH pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:15:46.096258 kernel: audit: type=1100 audit(1707801346.004:502): pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:15:47.927128 sshd[2222]: Failed password for root from 101.43.243.60 port 55730 ssh2 Feb 13 05:15:49.362267 sshd[2222]: Received disconnect from 101.43.243.60 port 55730:11: Bye Bye [preauth] Feb 13 05:15:49.362267 sshd[2222]: Disconnected from authenticating user root 101.43.243.60 port 55730 [preauth] Feb 13 05:15:49.364738 systemd[1]: sshd@116-139.178.90.101:22-101.43.243.60:55730.service: Deactivated successfully. Feb 13 05:15:49.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-101.43.243.60:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:49.458314 kernel: audit: type=1131 audit(1707801349.365:503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-101.43.243.60:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:17.189727 systemd[1]: Started sshd@117-139.178.90.101:22-101.43.243.60:34960.service. Feb 13 05:16:17.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-101.43.243.60:34960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:17.282223 kernel: audit: type=1130 audit(1707801377.188:504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-101.43.243.60:34960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:18.145585 sshd[2229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:16:18.144000 audit[2229]: USER_AUTH pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:16:18.239259 kernel: audit: type=1100 audit(1707801378.144:505): pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:16:20.795974 sshd[2229]: Failed password for root from 101.43.243.60 port 34960 ssh2 Feb 13 05:16:21.519369 sshd[2229]: Received disconnect from 101.43.243.60 port 34960:11: Bye Bye [preauth] Feb 13 05:16:21.519369 sshd[2229]: Disconnected from authenticating user root 101.43.243.60 port 34960 [preauth] Feb 13 05:16:21.522004 systemd[1]: sshd@117-139.178.90.101:22-101.43.243.60:34960.service: Deactivated successfully. Feb 13 05:16:21.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-101.43.243.60:34960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:21.616374 kernel: audit: type=1131 audit(1707801381.521:506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-101.43.243.60:34960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:24.765910 systemd[1]: Started sshd@118-139.178.90.101:22-134.175.129.189:51052.service. Feb 13 05:16:24.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-134.175.129.189:51052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:24.859242 kernel: audit: type=1130 audit(1707801384.764:507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-134.175.129.189:51052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:25.727773 sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:16:25.726000 audit[2233]: USER_AUTH pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:16:25.821376 kernel: audit: type=1100 audit(1707801385.726:508): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:16:27.960684 sshd[2213]: Connection closed by 134.175.129.189 port 40276 [preauth] Feb 13 05:16:27.962483 systemd[1]: sshd@114-139.178.90.101:22-134.175.129.189:40276.service: Deactivated successfully. Feb 13 05:16:27.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-134.175.129.189:40276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:28.006326 sshd[2233]: Failed password for root from 134.175.129.189 port 51052 ssh2 Feb 13 05:16:28.056370 kernel: audit: type=1131 audit(1707801387.961:509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-134.175.129.189:40276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:29.107616 sshd[2233]: Received disconnect from 134.175.129.189 port 51052:11: Bye Bye [preauth] Feb 13 05:16:29.107616 sshd[2233]: Disconnected from authenticating user root 134.175.129.189 port 51052 [preauth] Feb 13 05:16:29.110092 systemd[1]: sshd@118-139.178.90.101:22-134.175.129.189:51052.service: Deactivated successfully. Feb 13 05:16:29.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-134.175.129.189:51052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:29.204396 kernel: audit: type=1131 audit(1707801389.109:510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-134.175.129.189:51052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:52.931987 systemd[1]: Started sshd@119-139.178.90.101:22-101.43.243.60:42424.service. Feb 13 05:16:52.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-101.43.243.60:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:53.025195 kernel: audit: type=1130 audit(1707801412.930:511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-101.43.243.60:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:53.833233 sshd[2241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:16:53.832000 audit[2241]: USER_AUTH pid=2241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:16:53.926379 kernel: audit: type=1100 audit(1707801413.832:512): pid=2241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:16:56.288252 sshd[2241]: Failed password for root from 101.43.243.60 port 42424 ssh2 Feb 13 05:16:57.200082 sshd[2241]: Received disconnect from 101.43.243.60 port 42424:11: Bye Bye [preauth] Feb 13 05:16:57.200082 sshd[2241]: Disconnected from authenticating user root 101.43.243.60 port 42424 [preauth] Feb 13 05:16:57.202598 systemd[1]: sshd@119-139.178.90.101:22-101.43.243.60:42424.service: Deactivated successfully. Feb 13 05:16:57.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-101.43.243.60:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:57.296370 kernel: audit: type=1131 audit(1707801417.201:513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-101.43.243.60:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:05.739765 systemd[1]: Started sshd@120-139.178.90.101:22-118.195.184.139:10465.service. Feb 13 05:17:05.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-118.195.184.139:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:05.833387 kernel: audit: type=1130 audit(1707801425.738:514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-118.195.184.139:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:07.358249 sshd[2245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:17:07.357000 audit[2245]: USER_AUTH pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:17:07.451370 kernel: audit: type=1100 audit(1707801427.357:515): pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:17:10.068922 sshd[2245]: Failed password for root from 118.195.184.139 port 10465 ssh2 Feb 13 05:17:10.691382 systemd[1]: Started sshd@121-139.178.90.101:22-104.250.49.150:51037.service. Feb 13 05:17:10.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-104.250.49.150:51037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.784509 sshd[2245]: Received disconnect from 118.195.184.139 port 10465:11: Bye Bye [preauth] Feb 13 05:17:10.784509 sshd[2245]: Disconnected from authenticating user root 118.195.184.139 port 10465 [preauth] Feb 13 05:17:10.784968 systemd[1]: sshd@120-139.178.90.101:22-118.195.184.139:10465.service: Deactivated successfully. Feb 13 05:17:10.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-118.195.184.139:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.790157 sshd[2208]: Timeout before authentication for 118.195.184.139 port 21154 Feb 13 05:17:10.790439 systemd[1]: sshd@113-139.178.90.101:22-118.195.184.139:21154.service: Deactivated successfully. Feb 13 05:17:10.829196 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T05:17:10.829Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2416} Feb 13 05:17:10.840962 etcd-wrapper[1399]: {"level":"info","ts":"2024-02-13T05:17:10.840Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2416,"took":"11.503919ms"} Feb 13 05:17:10.876825 kernel: audit: type=1130 audit(1707801430.690:516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-104.250.49.150:51037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.876869 kernel: audit: type=1131 audit(1707801430.783:517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-118.195.184.139:10465 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.876886 kernel: audit: type=1131 audit(1707801430.789:518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-118.195.184.139:21154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-118.195.184.139:21154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:12.954026 sshd[2248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:17:12.953000 audit[2248]: USER_AUTH pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:17:13.047403 kernel: audit: type=1100 audit(1707801432.953:519): pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:17:15.017335 sshd[2248]: Failed password for root from 104.250.49.150 port 51037 ssh2 Feb 13 05:17:19.630503 sshd[2248]: Received disconnect from 104.250.49.150 port 51037:11: Bye Bye [preauth] Feb 13 05:17:19.630503 sshd[2248]: Disconnected from authenticating user root 104.250.49.150 port 51037 [preauth] Feb 13 05:17:19.632988 systemd[1]: sshd@121-139.178.90.101:22-104.250.49.150:51037.service: Deactivated successfully. Feb 13 05:17:19.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-104.250.49.150:51037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:19.726245 kernel: audit: type=1131 audit(1707801439.632:520): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-104.250.49.150:51037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:27.892581 systemd[1]: Started sshd@122-139.178.90.101:22-101.43.243.60:49888.service. Feb 13 05:17:27.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-101.43.243.60:49888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:27.985200 kernel: audit: type=1130 audit(1707801447.891:521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-101.43.243.60:49888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:28.767927 sshd[2255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:17:28.767000 audit[2255]: USER_AUTH pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:17:28.860378 kernel: audit: type=1100 audit(1707801448.767:522): pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:17:31.027353 sshd[2255]: Failed password for root from 101.43.243.60 port 49888 ssh2 Feb 13 05:17:32.133619 sshd[2255]: Received disconnect from 101.43.243.60 port 49888:11: Bye Bye [preauth] Feb 13 05:17:32.133619 sshd[2255]: Disconnected from authenticating user root 101.43.243.60 port 49888 [preauth] Feb 13 05:17:32.136075 systemd[1]: sshd@122-139.178.90.101:22-101.43.243.60:49888.service: Deactivated successfully. Feb 13 05:17:32.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-101.43.243.60:49888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:32.230409 kernel: audit: type=1131 audit(1707801452.135:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-101.43.243.60:49888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:32.775929 systemd[1]: Started sshd@123-139.178.90.101:22-134.175.129.189:33598.service. Feb 13 05:17:32.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-134.175.129.189:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:32.868247 kernel: audit: type=1130 audit(1707801452.774:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-134.175.129.189:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:34.557808 sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:17:34.556000 audit[2260]: USER_AUTH pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:17:34.649385 kernel: audit: type=1100 audit(1707801454.556:525): pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:17:35.973438 sshd[2260]: Failed password for root from 134.175.129.189 port 33598 ssh2 Feb 13 05:17:36.322565 sshd[2260]: Received disconnect from 134.175.129.189 port 33598:11: Bye Bye [preauth] Feb 13 05:17:36.322565 sshd[2260]: Disconnected from authenticating user root 134.175.129.189 port 33598 [preauth] Feb 13 05:17:36.325060 systemd[1]: sshd@123-139.178.90.101:22-134.175.129.189:33598.service: Deactivated successfully. Feb 13 05:17:36.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-134.175.129.189:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:36.419405 kernel: audit: type=1131 audit(1707801456.324:526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-134.175.129.189:33598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:40.799114 systemd[1]: Started sshd@124-139.178.90.101:22-132.255.50.81:19107.service. Feb 13 05:17:40.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-132.255.50.81:19107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:40.892196 kernel: audit: type=1130 audit(1707801460.797:527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-132.255.50.81:19107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:41.797531 sshd[2264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:17:41.796000 audit[2264]: USER_AUTH pid=2264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:17:41.890391 kernel: audit: type=1100 audit(1707801461.796:528): pid=2264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:17:43.841221 sshd[2264]: Failed password for root from 132.255.50.81 port 19107 ssh2 Feb 13 05:17:45.182535 sshd[2264]: Received disconnect from 132.255.50.81 port 19107:11: Bye Bye [preauth] Feb 13 05:17:45.182535 sshd[2264]: Disconnected from authenticating user root 132.255.50.81 port 19107 [preauth] Feb 13 05:17:45.185080 systemd[1]: sshd@124-139.178.90.101:22-132.255.50.81:19107.service: Deactivated successfully. Feb 13 05:17:45.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-132.255.50.81:19107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:45.279390 kernel: audit: type=1131 audit(1707801465.184:529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-132.255.50.81:19107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:58.010967 systemd[1]: Started sshd@125-139.178.90.101:22-101.43.243.60:57338.service. Feb 13 05:17:58.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-101.43.243.60:57338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:58.104258 kernel: audit: type=1130 audit(1707801478.009:530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-101.43.243.60:57338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:58.657116 systemd[1]: Started sshd@126-139.178.90.101:22-85.209.11.254:53454.service. Feb 13 05:17:58.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-85.209.11.254:53454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:58.750312 kernel: audit: type=1130 audit(1707801478.655:531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-85.209.11.254:53454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:58.874945 sshd[2269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:17:58.874000 audit[2269]: USER_AUTH pid=2269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:17:58.975388 kernel: audit: type=1100 audit(1707801478.874:532): pid=2269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:18:00.476602 sshd[2272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 user=root Feb 13 05:18:00.475000 audit[2272]: USER_AUTH pid=2272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 05:18:00.538817 systemd[1]: Started sshd@127-139.178.90.101:22-118.195.184.139:18311.service. Feb 13 05:18:00.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-118.195.184.139:18311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:00.586758 sshd[2269]: Failed password for root from 101.43.243.60 port 57338 ssh2 Feb 13 05:18:00.662576 kernel: audit: type=1100 audit(1707801480.475:533): pid=2272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 05:18:00.662609 kernel: audit: type=1130 audit(1707801480.537:534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-118.195.184.139:18311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:01.400981 sshd[2275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:18:01.400000 audit[2275]: USER_AUTH pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:18:01.494377 kernel: audit: type=1100 audit(1707801481.400:535): pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:18:02.232671 sshd[2269]: Received disconnect from 101.43.243.60 port 57338:11: Bye Bye [preauth] Feb 13 05:18:02.232671 sshd[2269]: Disconnected from authenticating user root 101.43.243.60 port 57338 [preauth] Feb 13 05:18:02.235153 systemd[1]: sshd@125-139.178.90.101:22-101.43.243.60:57338.service: Deactivated successfully. Feb 13 05:18:02.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-101.43.243.60:57338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:02.329391 kernel: audit: type=1131 audit(1707801482.234:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-101.43.243.60:57338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:02.795887 sshd[2272]: Failed password for root from 85.209.11.254 port 53454 ssh2 Feb 13 05:18:03.874380 sshd[2272]: Connection closed by authenticating user root 85.209.11.254 port 53454 [preauth] Feb 13 05:18:03.876786 systemd[1]: sshd@126-139.178.90.101:22-85.209.11.254:53454.service: Deactivated successfully. Feb 13 05:18:03.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-85.209.11.254:53454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:03.970265 kernel: audit: type=1131 audit(1707801483.876:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-85.209.11.254:53454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:04.191896 sshd[2275]: Failed password for root from 118.195.184.139 port 18311 ssh2 Feb 13 05:18:04.758472 sshd[2275]: Received disconnect from 118.195.184.139 port 18311:11: Bye Bye [preauth] Feb 13 05:18:04.758472 sshd[2275]: Disconnected from authenticating user root 118.195.184.139 port 18311 [preauth] Feb 13 05:18:04.760964 systemd[1]: sshd@127-139.178.90.101:22-118.195.184.139:18311.service: Deactivated successfully. Feb 13 05:18:04.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-118.195.184.139:18311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:04.854223 kernel: audit: type=1131 audit(1707801484.760:538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-118.195.184.139:18311 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:28.828120 systemd[1]: Started sshd@128-139.178.90.101:22-124.230.124.250:42682.service. Feb 13 05:18:28.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-124.230.124.250:42682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:28.922387 kernel: audit: type=1130 audit(1707801508.827:539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-124.230.124.250:42682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:30.462135 systemd[1]: Started sshd@129-139.178.90.101:22-101.43.243.60:36566.service. Feb 13 05:18:30.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-101.43.243.60:36566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:30.555250 kernel: audit: type=1130 audit(1707801510.462:540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-101.43.243.60:36566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:31.321368 sshd[2283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.243.60 user=root Feb 13 05:18:31.321000 audit[2283]: USER_AUTH pid=2283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:18:31.414380 kernel: audit: type=1100 audit(1707801511.321:541): pid=2283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.43.243.60 addr=101.43.243.60 terminal=ssh res=failed' Feb 13 05:18:33.228458 sshd[2283]: Failed password for root from 101.43.243.60 port 36566 ssh2 Feb 13 05:18:34.139564 systemd[1]: Started sshd@130-139.178.90.101:22-2.57.122.87:47810.service. Feb 13 05:18:34.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-2.57.122.87:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.232195 kernel: audit: type=1130 audit(1707801514.139:542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-2.57.122.87:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.680671 sshd[2283]: Received disconnect from 101.43.243.60 port 36566:11: Bye Bye [preauth] Feb 13 05:18:34.680671 sshd[2283]: Disconnected from authenticating user root 101.43.243.60 port 36566 [preauth] Feb 13 05:18:34.683234 systemd[1]: sshd@129-139.178.90.101:22-101.43.243.60:36566.service: Deactivated successfully. Feb 13 05:18:34.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-101.43.243.60:36566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.776236 kernel: audit: type=1131 audit(1707801514.683:543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-101.43.243.60:36566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.882709 sshd[2286]: Invalid user hlwang from 2.57.122.87 port 47810 Feb 13 05:18:35.066042 sshd[2286]: pam_faillock(sshd:auth): User unknown Feb 13 05:18:35.067125 sshd[2286]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:18:35.067234 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:18:35.068113 sshd[2286]: pam_faillock(sshd:auth): User unknown Feb 13 05:18:35.068000 audit[2286]: USER_AUTH pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:18:35.167383 kernel: audit: type=1100 audit(1707801515.068:544): pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:18:37.191670 sshd[2286]: Failed password for invalid user hlwang from 2.57.122.87 port 47810 ssh2 Feb 13 05:18:38.721325 systemd[1]: Started sshd@131-139.178.90.101:22-134.175.129.189:44370.service. Feb 13 05:18:38.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-134.175.129.189:44370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:38.813255 kernel: audit: type=1130 audit(1707801518.721:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-134.175.129.189:44370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:39.126411 sshd[2286]: Connection closed by invalid user hlwang 2.57.122.87 port 47810 [preauth] Feb 13 05:18:39.128945 systemd[1]: sshd@130-139.178.90.101:22-2.57.122.87:47810.service: Deactivated successfully. Feb 13 05:18:39.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-2.57.122.87:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:39.225259 kernel: audit: type=1131 audit(1707801519.129:546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-2.57.122.87:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:46.237113 systemd[1]: Started sshd@132-139.178.90.101:22-118.195.184.139:10466.service. Feb 13 05:18:46.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-118.195.184.139:10466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:46.331399 kernel: audit: type=1130 audit(1707801526.236:547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-118.195.184.139:10466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:47.913350 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.195.184.139 user=root Feb 13 05:18:47.913000 audit[2294]: USER_AUTH pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:18:48.006250 kernel: audit: type=1100 audit(1707801527.913:548): pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=118.195.184.139 addr=118.195.184.139 terminal=ssh res=failed' Feb 13 05:18:50.016571 sshd[2294]: Failed password for root from 118.195.184.139 port 10466 ssh2 Feb 13 05:18:51.263578 sshd[2294]: Received disconnect from 118.195.184.139 port 10466:11: Bye Bye [preauth] Feb 13 05:18:51.263578 sshd[2294]: Disconnected from authenticating user root 118.195.184.139 port 10466 [preauth] Feb 13 05:18:51.265986 systemd[1]: sshd@132-139.178.90.101:22-118.195.184.139:10466.service: Deactivated successfully. Feb 13 05:18:51.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-118.195.184.139:10466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:51.360255 kernel: audit: type=1131 audit(1707801531.265:549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-118.195.184.139:10466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'