Feb 13 07:17:06.567052 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 07:17:06.567065 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 07:17:06.567072 kernel: BIOS-provided physical RAM map: Feb 13 07:17:06.567076 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 07:17:06.567079 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 07:17:06.567083 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 07:17:06.567088 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 07:17:06.567092 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 07:17:06.567095 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cafff] usable Feb 13 07:17:06.567099 kernel: BIOS-e820: [mem 0x00000000819cb000-0x00000000819cbfff] ACPI NVS Feb 13 07:17:06.567104 kernel: BIOS-e820: [mem 0x00000000819cc000-0x00000000819ccfff] reserved Feb 13 07:17:06.567108 kernel: BIOS-e820: [mem 0x00000000819cd000-0x000000008afccfff] usable Feb 13 07:17:06.567112 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 07:17:06.567115 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 07:17:06.567120 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 07:17:06.567126 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 07:17:06.567130 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 07:17:06.567134 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 07:17:06.567138 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 07:17:06.567142 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 07:17:06.567147 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 07:17:06.567151 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 07:17:06.567155 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 07:17:06.567159 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 07:17:06.567163 kernel: NX (Execute Disable) protection: active Feb 13 07:17:06.567167 kernel: SMBIOS 3.2.1 present. Feb 13 07:17:06.567173 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 07:17:06.567177 kernel: tsc: Detected 3400.000 MHz processor Feb 13 07:17:06.567181 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 07:17:06.567185 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 07:17:06.567190 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 07:17:06.567195 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 07:17:06.567199 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 07:17:06.567203 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 07:17:06.567208 kernel: Using GB pages for direct mapping Feb 13 07:17:06.567212 kernel: ACPI: Early table checksum verification disabled Feb 13 07:17:06.567217 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 07:17:06.567222 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 07:17:06.567226 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 07:17:06.567231 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 07:17:06.567237 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 07:17:06.567241 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 07:17:06.567247 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 07:17:06.567252 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 07:17:06.567256 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 07:17:06.567261 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 07:17:06.567266 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 07:17:06.567270 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 07:17:06.567275 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 07:17:06.567280 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 07:17:06.567285 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 07:17:06.567290 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 07:17:06.567295 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 07:17:06.567299 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 07:17:06.567304 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 07:17:06.567309 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 07:17:06.567313 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 07:17:06.567318 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 07:17:06.567324 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 07:17:06.567328 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 07:17:06.567333 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 07:17:06.567338 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 07:17:06.567342 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 07:17:06.567347 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 07:17:06.567352 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 07:17:06.567356 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 07:17:06.567361 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 07:17:06.567367 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 07:17:06.567371 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 07:17:06.567376 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 07:17:06.567381 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 07:17:06.567385 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 07:17:06.567390 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 07:17:06.567395 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 07:17:06.567399 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 07:17:06.567404 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 07:17:06.567409 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 07:17:06.567414 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 07:17:06.567419 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 07:17:06.567423 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 07:17:06.567428 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 07:17:06.567433 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 07:17:06.567437 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 07:17:06.567442 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 07:17:06.567448 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 07:17:06.567452 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 07:17:06.567457 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 07:17:06.567461 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 07:17:06.567466 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 07:17:06.567471 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 07:17:06.567475 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 07:17:06.567480 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 07:17:06.567487 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 07:17:06.567513 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 07:17:06.567518 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 07:17:06.567523 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 07:17:06.567528 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 07:17:06.567532 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 07:17:06.567552 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 07:17:06.567557 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 07:17:06.567579 kernel: No NUMA configuration found Feb 13 07:17:06.567583 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 07:17:06.567588 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 07:17:06.567594 kernel: Zone ranges: Feb 13 07:17:06.567598 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 07:17:06.567603 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 07:17:06.567608 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 07:17:06.567612 kernel: Movable zone start for each node Feb 13 07:17:06.567617 kernel: Early memory node ranges Feb 13 07:17:06.567622 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 07:17:06.567626 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 07:17:06.567631 kernel: node 0: [mem 0x0000000040400000-0x00000000819cafff] Feb 13 07:17:06.567636 kernel: node 0: [mem 0x00000000819cd000-0x000000008afccfff] Feb 13 07:17:06.567641 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 07:17:06.567646 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 07:17:06.567650 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 07:17:06.567655 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 07:17:06.567660 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 07:17:06.567668 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 07:17:06.567674 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 07:17:06.567679 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 07:17:06.567684 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 07:17:06.567690 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 07:17:06.567695 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 07:17:06.567700 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 07:17:06.567705 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 07:17:06.567710 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 07:17:06.567715 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 07:17:06.567720 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 07:17:06.567726 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 07:17:06.567731 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 07:17:06.567736 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 07:17:06.567740 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 07:17:06.567745 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 07:17:06.567750 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 07:17:06.567755 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 07:17:06.567760 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 07:17:06.567765 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 07:17:06.567771 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 07:17:06.567776 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 07:17:06.567781 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 07:17:06.567786 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 07:17:06.567791 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 07:17:06.567796 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 07:17:06.567801 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 07:17:06.567806 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 07:17:06.567811 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 07:17:06.567816 kernel: TSC deadline timer available Feb 13 07:17:06.567821 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 07:17:06.567826 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 07:17:06.567831 kernel: Booting paravirtualized kernel on bare hardware Feb 13 07:17:06.567837 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 07:17:06.567842 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 07:17:06.567847 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 07:17:06.567852 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 07:17:06.567856 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 07:17:06.567862 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 07:17:06.567867 kernel: Policy zone: Normal Feb 13 07:17:06.567873 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 07:17:06.567878 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 07:17:06.567883 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 07:17:06.567888 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 07:17:06.567893 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 07:17:06.567898 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 07:17:06.567904 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 07:17:06.567909 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 07:17:06.567914 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 07:17:06.567919 kernel: rcu: Hierarchical RCU implementation. Feb 13 07:17:06.567924 kernel: rcu: RCU event tracing is enabled. Feb 13 07:17:06.567930 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 07:17:06.567935 kernel: Rude variant of Tasks RCU enabled. Feb 13 07:17:06.567940 kernel: Tracing variant of Tasks RCU enabled. Feb 13 07:17:06.567945 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 07:17:06.567951 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 07:17:06.567956 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 07:17:06.567961 kernel: random: crng init done Feb 13 07:17:06.567966 kernel: Console: colour dummy device 80x25 Feb 13 07:17:06.567971 kernel: printk: console [tty0] enabled Feb 13 07:17:06.567976 kernel: printk: console [ttyS1] enabled Feb 13 07:17:06.567981 kernel: ACPI: Core revision 20210730 Feb 13 07:17:06.567986 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 07:17:06.567991 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 07:17:06.567996 kernel: DMAR: Host address width 39 Feb 13 07:17:06.568001 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 07:17:06.568006 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 07:17:06.568011 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 07:17:06.568016 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 07:17:06.568021 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 07:17:06.568026 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 07:17:06.568031 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 07:17:06.568036 kernel: x2apic enabled Feb 13 07:17:06.568042 kernel: Switched APIC routing to cluster x2apic. Feb 13 07:17:06.568047 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 07:17:06.568052 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 07:17:06.568057 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 07:17:06.568062 kernel: process: using mwait in idle threads Feb 13 07:17:06.568067 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 07:17:06.568072 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 07:17:06.568077 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 07:17:06.568082 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 07:17:06.568088 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 07:17:06.568093 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 07:17:06.568098 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 07:17:06.568103 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 07:17:06.568108 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 07:17:06.568112 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 07:17:06.568117 kernel: TAA: Mitigation: TSX disabled Feb 13 07:17:06.568122 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 07:17:06.568127 kernel: SRBDS: Mitigation: Microcode Feb 13 07:17:06.568132 kernel: GDS: Vulnerable: No microcode Feb 13 07:17:06.568137 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 07:17:06.568143 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 07:17:06.568148 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 07:17:06.568153 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 07:17:06.568158 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 07:17:06.568163 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 07:17:06.568168 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 07:17:06.568173 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 07:17:06.568178 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 07:17:06.568183 kernel: Freeing SMP alternatives memory: 32K Feb 13 07:17:06.568187 kernel: pid_max: default: 32768 minimum: 301 Feb 13 07:17:06.568192 kernel: LSM: Security Framework initializing Feb 13 07:17:06.568197 kernel: SELinux: Initializing. Feb 13 07:17:06.568203 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 07:17:06.568208 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 07:17:06.568213 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 07:17:06.568218 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 07:17:06.568223 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 07:17:06.568228 kernel: ... version: 4 Feb 13 07:17:06.568233 kernel: ... bit width: 48 Feb 13 07:17:06.568238 kernel: ... generic registers: 4 Feb 13 07:17:06.568243 kernel: ... value mask: 0000ffffffffffff Feb 13 07:17:06.568248 kernel: ... max period: 00007fffffffffff Feb 13 07:17:06.568254 kernel: ... fixed-purpose events: 3 Feb 13 07:17:06.568259 kernel: ... event mask: 000000070000000f Feb 13 07:17:06.568264 kernel: signal: max sigframe size: 2032 Feb 13 07:17:06.568268 kernel: rcu: Hierarchical SRCU implementation. Feb 13 07:17:06.568273 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 07:17:06.568278 kernel: smp: Bringing up secondary CPUs ... Feb 13 07:17:06.568284 kernel: x86: Booting SMP configuration: Feb 13 07:17:06.568289 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 07:17:06.568294 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 07:17:06.568300 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 07:17:06.568305 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 07:17:06.568310 kernel: smpboot: Max logical packages: 1 Feb 13 07:17:06.568315 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 07:17:06.568320 kernel: devtmpfs: initialized Feb 13 07:17:06.568325 kernel: x86/mm: Memory block size: 128MB Feb 13 07:17:06.568330 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819cb000-0x819cbfff] (4096 bytes) Feb 13 07:17:06.568335 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 07:17:06.568340 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 07:17:06.568346 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 07:17:06.568351 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 07:17:06.568356 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 07:17:06.568361 kernel: audit: initializing netlink subsys (disabled) Feb 13 07:17:06.568366 kernel: audit: type=2000 audit(1707808621.040:1): state=initialized audit_enabled=0 res=1 Feb 13 07:17:06.568371 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 07:17:06.568376 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 07:17:06.568381 kernel: cpuidle: using governor menu Feb 13 07:17:06.568387 kernel: ACPI: bus type PCI registered Feb 13 07:17:06.568392 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 07:17:06.568397 kernel: dca service started, version 1.12.1 Feb 13 07:17:06.568402 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 07:17:06.568407 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 07:17:06.568412 kernel: PCI: Using configuration type 1 for base access Feb 13 07:17:06.568417 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 07:17:06.568421 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 07:17:06.568427 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 07:17:06.568432 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 07:17:06.568437 kernel: ACPI: Added _OSI(Module Device) Feb 13 07:17:06.568442 kernel: ACPI: Added _OSI(Processor Device) Feb 13 07:17:06.568447 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 07:17:06.568452 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 07:17:06.568457 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 07:17:06.568462 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 07:17:06.568467 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 07:17:06.568472 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 07:17:06.568478 kernel: ACPI: Dynamic OEM Table Load: Feb 13 07:17:06.568484 kernel: ACPI: SSDT 0xFFFF9C8A00213000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 07:17:06.568510 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 07:17:06.568515 kernel: ACPI: Dynamic OEM Table Load: Feb 13 07:17:06.568520 kernel: ACPI: SSDT 0xFFFF9C8A01AE4800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 07:17:06.568525 kernel: ACPI: Dynamic OEM Table Load: Feb 13 07:17:06.568530 kernel: ACPI: SSDT 0xFFFF9C8A01A5E000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 07:17:06.568550 kernel: ACPI: Dynamic OEM Table Load: Feb 13 07:17:06.568555 kernel: ACPI: SSDT 0xFFFF9C8A01A59000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 07:17:06.568560 kernel: ACPI: Dynamic OEM Table Load: Feb 13 07:17:06.568566 kernel: ACPI: SSDT 0xFFFF9C8A0014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 07:17:06.568571 kernel: ACPI: Dynamic OEM Table Load: Feb 13 07:17:06.568576 kernel: ACPI: SSDT 0xFFFF9C8A01AE6400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 07:17:06.568581 kernel: ACPI: Interpreter enabled Feb 13 07:17:06.568586 kernel: ACPI: PM: (supports S0 S5) Feb 13 07:17:06.568591 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 07:17:06.568596 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 07:17:06.568601 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 07:17:06.568606 kernel: HEST: Table parsing has been initialized. Feb 13 07:17:06.568612 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 07:17:06.568617 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 07:17:06.568622 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 07:17:06.568627 kernel: ACPI: PM: Power Resource [USBC] Feb 13 07:17:06.568632 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 07:17:06.568637 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 07:17:06.568642 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 07:17:06.568647 kernel: ACPI: PM: Power Resource [WRST] Feb 13 07:17:06.568651 kernel: ACPI: PM: Power Resource [FN00] Feb 13 07:17:06.568656 kernel: ACPI: PM: Power Resource [FN01] Feb 13 07:17:06.568662 kernel: ACPI: PM: Power Resource [FN02] Feb 13 07:17:06.568667 kernel: ACPI: PM: Power Resource [FN03] Feb 13 07:17:06.568672 kernel: ACPI: PM: Power Resource [FN04] Feb 13 07:17:06.568677 kernel: ACPI: PM: Power Resource [PIN] Feb 13 07:17:06.568682 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 07:17:06.568745 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 07:17:06.568791 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 07:17:06.568833 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 07:17:06.568841 kernel: PCI host bridge to bus 0000:00 Feb 13 07:17:06.568884 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 07:17:06.568922 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 07:17:06.568958 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 07:17:06.568995 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 07:17:06.569030 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 07:17:06.569069 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 07:17:06.569119 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 07:17:06.569170 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 07:17:06.569214 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.569261 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 07:17:06.569304 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 07:17:06.569352 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 07:17:06.569395 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 07:17:06.569442 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 07:17:06.569506 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 07:17:06.569563 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 07:17:06.569609 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 07:17:06.569653 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 07:17:06.569694 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 07:17:06.569740 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 07:17:06.569781 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 07:17:06.569829 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 07:17:06.569870 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 07:17:06.569916 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 07:17:06.569959 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 07:17:06.569999 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 07:17:06.570045 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 07:17:06.570086 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 07:17:06.570126 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 07:17:06.570170 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 07:17:06.570213 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 07:17:06.570253 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 07:17:06.570298 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 07:17:06.570339 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 07:17:06.570380 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 07:17:06.570421 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 07:17:06.570461 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 07:17:06.570546 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 07:17:06.570589 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 07:17:06.570631 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 07:17:06.570677 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 07:17:06.570718 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.570765 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 07:17:06.570807 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.570857 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 07:17:06.570899 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.570946 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 07:17:06.570988 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.571034 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 07:17:06.571078 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.571122 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 07:17:06.571165 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 07:17:06.571212 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 07:17:06.571262 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 07:17:06.571303 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 07:17:06.571345 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 07:17:06.571393 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 07:17:06.571435 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 07:17:06.571485 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 07:17:06.571565 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 07:17:06.571611 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 07:17:06.571653 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 07:17:06.571695 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 07:17:06.571738 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 07:17:06.571787 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 07:17:06.571830 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 07:17:06.571875 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 07:17:06.571918 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 07:17:06.571960 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 07:17:06.572003 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 07:17:06.572046 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 07:17:06.572087 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 07:17:06.572129 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 07:17:06.572172 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 07:17:06.572221 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 07:17:06.572265 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 07:17:06.572307 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 07:17:06.572351 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 07:17:06.572393 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.572435 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 07:17:06.572477 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 07:17:06.572590 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 07:17:06.572641 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 07:17:06.572684 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 07:17:06.572728 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 07:17:06.572770 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 07:17:06.572813 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 07:17:06.572856 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 07:17:06.572897 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 07:17:06.572941 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 07:17:06.572983 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 07:17:06.573033 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 07:17:06.573077 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 07:17:06.573123 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 07:17:06.573167 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 07:17:06.573211 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 07:17:06.573254 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 07:17:06.573298 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 07:17:06.573348 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 07:17:06.573399 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 07:17:06.573445 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 07:17:06.573520 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 07:17:06.573586 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 07:17:06.573631 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 07:17:06.573679 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 07:17:06.573724 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 07:17:06.573767 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 07:17:06.573811 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 07:17:06.573853 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 07:17:06.573861 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 07:17:06.573867 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 07:17:06.573872 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 07:17:06.573879 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 07:17:06.573884 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 07:17:06.573889 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 07:17:06.573895 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 07:17:06.573900 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 07:17:06.573905 kernel: iommu: Default domain type: Translated Feb 13 07:17:06.573911 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 07:17:06.573955 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 07:17:06.574001 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 07:17:06.574046 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 07:17:06.574054 kernel: vgaarb: loaded Feb 13 07:17:06.574059 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 07:17:06.574065 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 07:17:06.574070 kernel: PTP clock support registered Feb 13 07:17:06.574076 kernel: PCI: Using ACPI for IRQ routing Feb 13 07:17:06.574081 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 07:17:06.574086 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 07:17:06.574093 kernel: e820: reserve RAM buffer [mem 0x819cb000-0x83ffffff] Feb 13 07:17:06.574098 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 07:17:06.574103 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 07:17:06.574109 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 07:17:06.574114 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 07:17:06.574119 kernel: clocksource: Switched to clocksource tsc-early Feb 13 07:17:06.574124 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 07:17:06.574130 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 07:17:06.574135 kernel: pnp: PnP ACPI init Feb 13 07:17:06.574178 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 07:17:06.574221 kernel: pnp 00:02: [dma 0 disabled] Feb 13 07:17:06.574262 kernel: pnp 00:03: [dma 0 disabled] Feb 13 07:17:06.574304 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 07:17:06.574343 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 07:17:06.574384 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 07:17:06.574427 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 07:17:06.574464 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 07:17:06.574526 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 07:17:06.574584 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 07:17:06.574620 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 07:17:06.574657 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 07:17:06.574694 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 07:17:06.574733 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 07:17:06.574773 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 07:17:06.574810 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 07:17:06.574847 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 07:17:06.574884 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 07:17:06.574921 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 07:17:06.574958 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 07:17:06.574997 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 07:17:06.575038 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 07:17:06.575046 kernel: pnp: PnP ACPI: found 10 devices Feb 13 07:17:06.575052 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 07:17:06.575058 kernel: NET: Registered PF_INET protocol family Feb 13 07:17:06.575063 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 07:17:06.575068 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 07:17:06.575074 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 07:17:06.575080 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 07:17:06.575086 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 07:17:06.575092 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 07:17:06.575097 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 07:17:06.575102 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 07:17:06.575108 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 07:17:06.575113 kernel: NET: Registered PF_XDP protocol family Feb 13 07:17:06.575156 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 07:17:06.575199 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 07:17:06.575242 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 07:17:06.575285 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 07:17:06.575329 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 07:17:06.575372 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 07:17:06.575415 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 07:17:06.575458 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 07:17:06.575523 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 07:17:06.575589 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 07:17:06.575631 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 07:17:06.575673 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 07:17:06.575715 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 07:17:06.575757 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 07:17:06.575801 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 07:17:06.575842 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 07:17:06.575884 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 07:17:06.575925 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 07:17:06.575968 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 07:17:06.576010 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 07:17:06.576054 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 07:17:06.576095 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 07:17:06.576137 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 07:17:06.576182 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 07:17:06.576219 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 07:17:06.576257 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 07:17:06.576293 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 07:17:06.576330 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 07:17:06.576365 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 07:17:06.576401 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 07:17:06.576445 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 07:17:06.576514 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 07:17:06.576583 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 07:17:06.576644 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 07:17:06.576688 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 07:17:06.576728 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 07:17:06.576771 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 07:17:06.576814 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 07:17:06.576856 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 07:17:06.576898 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 07:17:06.576906 kernel: PCI: CLS 64 bytes, default 64 Feb 13 07:17:06.576912 kernel: DMAR: No ATSR found Feb 13 07:17:06.576918 kernel: DMAR: No SATC found Feb 13 07:17:06.576924 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 07:17:06.576969 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 07:17:06.577016 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 07:17:06.577060 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 07:17:06.577103 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 07:17:06.577147 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 07:17:06.577189 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 07:17:06.577232 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 07:17:06.577275 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 07:17:06.577319 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 07:17:06.577363 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 07:17:06.577407 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 07:17:06.577449 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 07:17:06.577496 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 07:17:06.577539 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 07:17:06.577582 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 07:17:06.577625 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 07:17:06.577668 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 07:17:06.577715 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 07:17:06.577757 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 07:17:06.577801 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 07:17:06.577844 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 07:17:06.577889 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 07:17:06.577933 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 07:17:06.577978 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 07:17:06.578024 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 07:17:06.578071 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 07:17:06.578119 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 07:17:06.578127 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 07:17:06.578133 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 07:17:06.578139 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 07:17:06.578145 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 07:17:06.578150 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 07:17:06.578156 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 07:17:06.578163 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 07:17:06.578209 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 07:17:06.578218 kernel: Initialise system trusted keyrings Feb 13 07:17:06.578223 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 07:17:06.578229 kernel: Key type asymmetric registered Feb 13 07:17:06.578234 kernel: Asymmetric key parser 'x509' registered Feb 13 07:17:06.578240 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 07:17:06.578246 kernel: io scheduler mq-deadline registered Feb 13 07:17:06.578252 kernel: io scheduler kyber registered Feb 13 07:17:06.578258 kernel: io scheduler bfq registered Feb 13 07:17:06.578302 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 07:17:06.578344 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 07:17:06.578388 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 07:17:06.578431 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 07:17:06.578475 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 07:17:06.578521 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 07:17:06.578570 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 07:17:06.578579 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 07:17:06.578585 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 07:17:06.578591 kernel: pstore: Registered erst as persistent store backend Feb 13 07:17:06.578596 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 07:17:06.578602 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 07:17:06.578608 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 07:17:06.578613 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 07:17:06.578620 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 07:17:06.578667 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 07:17:06.578675 kernel: i8042: PNP: No PS/2 controller found. Feb 13 07:17:06.578714 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 07:17:06.578755 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 07:17:06.578793 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T07:17:05 UTC (1707808625) Feb 13 07:17:06.578833 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 07:17:06.578841 kernel: fail to initialize ptp_kvm Feb 13 07:17:06.578848 kernel: intel_pstate: Intel P-state driver initializing Feb 13 07:17:06.578853 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 07:17:06.578859 kernel: intel_pstate: HWP enabled Feb 13 07:17:06.578865 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 07:17:06.578870 kernel: vesafb: scrolling: redraw Feb 13 07:17:06.578876 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 07:17:06.578882 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000b35f4d45, using 768k, total 768k Feb 13 07:17:06.578887 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 07:17:06.578893 kernel: fb0: VESA VGA frame buffer device Feb 13 07:17:06.578899 kernel: NET: Registered PF_INET6 protocol family Feb 13 07:17:06.578905 kernel: Segment Routing with IPv6 Feb 13 07:17:06.578911 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 07:17:06.578916 kernel: NET: Registered PF_PACKET protocol family Feb 13 07:17:06.578922 kernel: Key type dns_resolver registered Feb 13 07:17:06.578927 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 07:17:06.578933 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 07:17:06.578938 kernel: IPI shorthand broadcast: enabled Feb 13 07:17:06.578944 kernel: sched_clock: Marking stable (1680510316, 1334971903)->(4434042063, -1418559844) Feb 13 07:17:06.578950 kernel: registered taskstats version 1 Feb 13 07:17:06.578956 kernel: Loading compiled-in X.509 certificates Feb 13 07:17:06.578962 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 07:17:06.578967 kernel: Key type .fscrypt registered Feb 13 07:17:06.578972 kernel: Key type fscrypt-provisioning registered Feb 13 07:17:06.578978 kernel: pstore: Using crash dump compression: deflate Feb 13 07:17:06.578984 kernel: ima: Allocated hash algorithm: sha1 Feb 13 07:17:06.578990 kernel: ima: No architecture policies found Feb 13 07:17:06.578995 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 07:17:06.579002 kernel: Write protecting the kernel read-only data: 28672k Feb 13 07:17:06.579007 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 07:17:06.579013 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 07:17:06.579019 kernel: Run /init as init process Feb 13 07:17:06.579024 kernel: with arguments: Feb 13 07:17:06.579030 kernel: /init Feb 13 07:17:06.579036 kernel: with environment: Feb 13 07:17:06.579041 kernel: HOME=/ Feb 13 07:17:06.579046 kernel: TERM=linux Feb 13 07:17:06.579053 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 07:17:06.579059 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 07:17:06.579066 systemd[1]: Detected architecture x86-64. Feb 13 07:17:06.579072 systemd[1]: Running in initrd. Feb 13 07:17:06.579078 systemd[1]: No hostname configured, using default hostname. Feb 13 07:17:06.579084 systemd[1]: Hostname set to . Feb 13 07:17:06.579089 systemd[1]: Initializing machine ID from random generator. Feb 13 07:17:06.579096 systemd[1]: Queued start job for default target initrd.target. Feb 13 07:17:06.579102 systemd[1]: Started systemd-ask-password-console.path. Feb 13 07:17:06.579108 systemd[1]: Reached target cryptsetup.target. Feb 13 07:17:06.579113 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 13 07:17:06.579119 systemd[1]: Reached target paths.target. Feb 13 07:17:06.579124 systemd[1]: Reached target slices.target. Feb 13 07:17:06.579130 systemd[1]: Reached target swap.target. Feb 13 07:17:06.579136 systemd[1]: Reached target timers.target. Feb 13 07:17:06.579143 systemd[1]: Listening on iscsid.socket. Feb 13 07:17:06.579149 systemd[1]: Listening on iscsiuio.socket. Feb 13 07:17:06.579154 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 07:17:06.579160 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 07:17:06.579166 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 13 07:17:06.579172 systemd[1]: Listening on systemd-journald.socket. Feb 13 07:17:06.579178 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 13 07:17:06.579184 kernel: clocksource: Switched to clocksource tsc Feb 13 07:17:06.579190 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 07:17:06.579196 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 07:17:06.579202 systemd[1]: Reached target sockets.target. Feb 13 07:17:06.579208 systemd[1]: Starting iscsiuio.service... Feb 13 07:17:06.579214 systemd[1]: Starting kmod-static-nodes.service... Feb 13 07:17:06.579219 kernel: SCSI subsystem initialized Feb 13 07:17:06.579225 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 07:17:06.579231 kernel: Loading iSCSI transport class v2.0-870. Feb 13 07:17:06.579236 systemd[1]: Starting systemd-journald.service... Feb 13 07:17:06.579243 systemd[1]: Starting systemd-modules-load.service... Feb 13 07:17:06.579251 systemd-journald[266]: Journal started Feb 13 07:17:06.579279 systemd-journald[266]: Runtime Journal (/run/log/journal/2939db93b9a045ebada2c3e2dda0b1b3) is 8.0M, max 640.1M, 632.1M free. Feb 13 07:17:06.581941 systemd-modules-load[267]: Inserted module 'overlay' Feb 13 07:17:06.605723 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 07:17:06.639541 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 07:17:06.655334 systemd-modules-load[267]: Inserted module 'br_netfilter' Feb 13 07:17:06.686664 kernel: Bridge firewalling registered Feb 13 07:17:06.686677 systemd[1]: Started iscsiuio.service. Feb 13 07:17:06.686686 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 07:17:06.720978 kernel: device-mapper: uevent: version 1.0.3 Feb 13 07:17:06.720994 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 07:17:06.741972 systemd-modules-load[267]: Inserted module 'dm_multipath' Feb 13 07:17:06.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.788538 kernel: audit: type=1130 audit(1707808626.747:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.788553 systemd[1]: Started systemd-journald.service. Feb 13 07:17:06.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.813856 systemd[1]: Finished kmod-static-nodes.service. Feb 13 07:17:06.907204 kernel: audit: type=1130 audit(1707808626.813:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.907221 kernel: audit: type=1130 audit(1707808626.864:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.864870 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 07:17:06.958590 kernel: audit: type=1130 audit(1707808626.915:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.915765 systemd[1]: Finished systemd-modules-load.service. Feb 13 07:17:07.011650 kernel: audit: type=1130 audit(1707808626.966:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:06.966773 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 07:17:07.067106 kernel: audit: type=1130 audit(1707808627.020:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.021181 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 07:17:07.067488 systemd[1]: Starting systemd-sysctl.service... Feb 13 07:17:07.067897 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 07:17:07.071082 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 07:17:07.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.071614 systemd[1]: Finished systemd-sysctl.service. Feb 13 07:17:07.119590 kernel: audit: type=1130 audit(1707808627.070:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.133850 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 07:17:07.232731 kernel: audit: type=1130 audit(1707808627.133:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.232747 kernel: audit: type=1130 audit(1707808627.181:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.182432 systemd[1]: Starting dracut-cmdline.service... Feb 13 07:17:07.263589 kernel: iscsi: registered transport (tcp) Feb 13 07:17:07.263601 dracut-cmdline[291]: dracut-dracut-053 Feb 13 07:17:07.263601 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 07:17:07.263601 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 07:17:07.364617 kernel: iscsi: registered transport (qla4xxx) Feb 13 07:17:07.364635 kernel: QLogic iSCSI HBA Driver Feb 13 07:17:07.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.324373 systemd[1]: Finished dracut-cmdline.service. Feb 13 07:17:07.346288 systemd[1]: Starting dracut-pre-udev.service... Feb 13 07:17:07.371934 systemd[1]: Starting iscsid.service... Feb 13 07:17:07.426593 kernel: raid6: avx2x4 gen() 39089 MB/s Feb 13 07:17:07.426605 kernel: raid6: avx2x4 xor() 22368 MB/s Feb 13 07:17:07.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.389873 systemd[1]: Started iscsid.service. Feb 13 07:17:07.447589 iscsid[453]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 07:17:07.447589 iscsid[453]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 07:17:07.447589 iscsid[453]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 07:17:07.447589 iscsid[453]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 07:17:07.447589 iscsid[453]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 07:17:07.447589 iscsid[453]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 07:17:07.447589 iscsid[453]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 07:17:07.612587 kernel: raid6: avx2x2 gen() 54238 MB/s Feb 13 07:17:07.612599 kernel: raid6: avx2x2 xor() 31492 MB/s Feb 13 07:17:07.612606 kernel: raid6: avx2x1 gen() 44223 MB/s Feb 13 07:17:07.612613 kernel: raid6: avx2x1 xor() 27277 MB/s Feb 13 07:17:07.612619 kernel: raid6: sse2x4 gen() 20853 MB/s Feb 13 07:17:07.652526 kernel: raid6: sse2x4 xor() 11452 MB/s Feb 13 07:17:07.686561 kernel: raid6: sse2x2 gen() 21087 MB/s Feb 13 07:17:07.720517 kernel: raid6: sse2x2 xor() 13081 MB/s Feb 13 07:17:07.754556 kernel: raid6: sse2x1 gen() 17841 MB/s Feb 13 07:17:07.806800 kernel: raid6: sse2x1 xor() 8710 MB/s Feb 13 07:17:07.806815 kernel: raid6: using algorithm avx2x2 gen() 54238 MB/s Feb 13 07:17:07.806822 kernel: raid6: .... xor() 31492 MB/s, rmw enabled Feb 13 07:17:07.825048 kernel: raid6: using avx2x2 recovery algorithm Feb 13 07:17:07.871520 kernel: xor: automatically using best checksumming function avx Feb 13 07:17:07.950517 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 07:17:07.955388 systemd[1]: Finished dracut-pre-udev.service. Feb 13 07:17:07.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.964000 audit: BPF prog-id=6 op=LOAD Feb 13 07:17:07.964000 audit: BPF prog-id=7 op=LOAD Feb 13 07:17:07.965496 systemd[1]: Starting systemd-udevd.service... Feb 13 07:17:07.974301 systemd-udevd[469]: Using default interface naming scheme 'v252'. Feb 13 07:17:07.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:07.978582 systemd[1]: Started systemd-udevd.service. Feb 13 07:17:08.020614 dracut-pre-trigger[481]: rd.md=0: removing MD RAID activation Feb 13 07:17:07.996137 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 07:17:08.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:08.025559 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 07:17:08.038867 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 07:17:08.089162 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 07:17:08.115593 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 07:17:08.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:08.102943 systemd[1]: Starting dracut-initqueue.service... Feb 13 07:17:08.197562 kernel: ACPI: bus type USB registered Feb 13 07:17:08.197583 kernel: usbcore: registered new interface driver usbfs Feb 13 07:17:08.197591 kernel: usbcore: registered new interface driver hub Feb 13 07:17:08.197597 kernel: usbcore: registered new device driver usb Feb 13 07:17:08.198490 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 07:17:08.198506 kernel: libata version 3.00 loaded. Feb 13 07:17:08.198515 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Feb 13 07:17:08.198601 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 07:17:08.254489 kernel: AES CTR mode by8 optimization enabled Feb 13 07:17:08.271490 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 07:17:08.305825 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 07:17:08.345504 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 07:17:08.345616 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 07:17:08.345690 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 07:17:08.356538 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 07:17:08.356606 kernel: pps pps0: new PPS source ptp0 Feb 13 07:17:08.356670 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 07:17:08.356724 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 07:17:08.375490 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 07:17:08.375581 kernel: scsi host0: ahci Feb 13 07:17:08.375638 kernel: scsi host1: ahci Feb 13 07:17:08.375701 kernel: scsi host2: ahci Feb 13 07:17:08.375760 kernel: scsi host3: ahci Feb 13 07:17:08.375822 kernel: scsi host4: ahci Feb 13 07:17:08.375906 kernel: scsi host5: ahci Feb 13 07:17:08.375982 kernel: scsi host6: ahci Feb 13 07:17:08.376063 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Feb 13 07:17:08.376074 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Feb 13 07:17:08.376081 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Feb 13 07:17:08.376088 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Feb 13 07:17:08.376094 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Feb 13 07:17:08.376102 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Feb 13 07:17:08.376108 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Feb 13 07:17:08.400783 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 07:17:08.400857 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 07:17:08.400908 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 07:17:08.435892 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 07:17:08.448594 kernel: hub 1-0:1.0: USB hub found Feb 13 07:17:08.448673 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:31:6c Feb 13 07:17:08.472644 kernel: hub 1-0:1.0: 16 ports detected Feb 13 07:17:08.475488 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 07:17:08.475558 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 07:17:08.493487 kernel: hub 2-0:1.0: USB hub found Feb 13 07:17:08.493572 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 07:17:08.505402 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 07:17:08.505471 kernel: hub 2-0:1.0: 10 ports detected Feb 13 07:17:08.558564 kernel: pps pps1: new PPS source ptp2 Feb 13 07:17:08.572525 kernel: usb: port power management may be unreliable Feb 13 07:17:08.572542 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 07:17:08.700033 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 07:17:08.700051 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 07:17:08.700126 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 07:17:08.712487 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:31:6d Feb 13 07:17:08.724493 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 07:17:08.729503 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 07:17:08.734486 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Feb 13 07:17:08.734556 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 07:17:08.757071 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 07:17:08.757143 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 07:17:08.785073 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 07:17:08.785143 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 07:17:08.785162 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 07:17:08.785170 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 07:17:08.785529 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 07:17:08.785578 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 07:17:08.785601 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 07:17:08.789522 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 07:17:08.789537 kernel: ata1.00: Features: NCQ-prio Feb 13 07:17:08.789544 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 07:17:08.789572 kernel: ata2.00: Features: NCQ-prio Feb 13 07:17:08.794511 kernel: ata1.00: configured for UDMA/133 Feb 13 07:17:08.794530 kernel: ata2.00: configured for UDMA/133 Feb 13 07:17:08.795489 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 07:17:08.795588 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 07:17:08.824489 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 07:17:08.964536 kernel: hub 1-14:1.0: USB hub found Feb 13 07:17:09.052646 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 07:17:09.052723 kernel: hub 1-14:1.0: 4 ports detected Feb 13 07:17:09.226542 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 07:17:09.229488 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 07:17:09.229582 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 07:17:09.245328 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 07:17:09.245343 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 07:17:09.245437 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 07:17:09.245523 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 07:17:09.245620 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 07:17:09.245705 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 07:17:09.245762 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 07:17:09.245815 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 07:17:09.259547 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 07:17:09.288893 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 07:17:09.288966 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 07:17:09.322080 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 07:17:09.477012 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 07:17:09.477085 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 07:17:09.477144 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 07:17:09.530551 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 07:17:09.530579 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 07:17:09.576497 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 07:17:09.576515 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 07:17:09.576524 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 07:17:09.608492 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 13 07:17:09.631920 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 07:17:09.684623 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 13 07:17:09.684703 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (529) Feb 13 07:17:09.684714 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 07:17:09.684721 kernel: usbcore: registered new interface driver usbhid Feb 13 07:17:09.667614 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 07:17:09.733452 kernel: usbhid: USB HID core driver Feb 13 07:17:09.733463 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 07:17:09.728741 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 07:17:09.756712 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 07:17:09.770916 systemd[1]: Reached target initrd-root-device.target. Feb 13 07:17:09.779156 systemd[1]: Starting disk-uuid.service... Feb 13 07:17:09.850807 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 07:17:09.850902 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 07:17:09.850911 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 07:17:09.816860 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 07:17:09.991209 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 13 07:17:09.991220 kernel: audit: type=1130 audit(1707808629.884:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:09.991229 kernel: audit: type=1131 audit(1707808629.884:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:09.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:09.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:09.816912 systemd[1]: Finished disk-uuid.service. Feb 13 07:17:09.884859 systemd[1]: Reached target local-fs-pre.target. Feb 13 07:17:09.999586 systemd[1]: Reached target local-fs.target. Feb 13 07:17:09.999692 systemd[1]: Reached target sysinit.target. Feb 13 07:17:10.011698 systemd[1]: Reached target basic.target. Feb 13 07:17:10.039426 systemd[1]: Starting verity-setup.service... Feb 13 07:17:10.130762 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 07:17:10.130779 kernel: audit: type=1130 audit(1707808630.082:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.057690 systemd[1]: Finished dracut-initqueue.service. Feb 13 07:17:10.083782 systemd[1]: Reached target remote-fs-pre.target. Feb 13 07:17:10.138721 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 07:17:10.147691 systemd[1]: Reached target remote-fs.target. Feb 13 07:17:10.239506 kernel: audit: type=1130 audit(1707808630.191:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.148189 systemd[1]: Starting dracut-pre-mount.service... Feb 13 07:17:10.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.176214 systemd[1]: Finished dracut-pre-mount.service. Feb 13 07:17:10.312565 kernel: audit: type=1130 audit(1707808630.248:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.211846 systemd[1]: Finished verity-setup.service. Feb 13 07:17:10.249812 systemd[1]: Found device dev-mapper-usr.device. Feb 13 07:17:10.306047 systemd[1]: Mounting sysusr-usr.mount... Feb 13 07:17:10.319938 systemd[1]: Starting systemd-fsck-root.service... Feb 13 07:17:10.337712 systemd-fsck[723]: ROOT: clean, 624/553520 files, 56032/553472 blocks Feb 13 07:17:10.356962 systemd[1]: Finished systemd-fsck-root.service. Feb 13 07:17:10.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.381006 systemd[1]: Mounting sysroot.mount... Feb 13 07:17:10.472714 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 07:17:10.472728 kernel: audit: type=1130 audit(1707808630.380:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.472736 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 07:17:10.466025 systemd[1]: Mounted sysusr-usr.mount. Feb 13 07:17:10.480708 systemd[1]: Mounted sysroot.mount. Feb 13 07:17:10.491738 systemd[1]: Reached target initrd-root-fs.target. Feb 13 07:17:10.508431 systemd[1]: Mounting sysroot-usr.mount... Feb 13 07:17:10.528475 systemd[1]: Mounted sysroot-usr.mount. Feb 13 07:17:10.538784 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 07:17:10.543449 systemd[1]: Starting initrd-setup-root.service... Feb 13 07:17:10.650759 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 07:17:10.650774 kernel: BTRFS info (device sda6): using free space tree Feb 13 07:17:10.650781 kernel: BTRFS info (device sda6): has skinny extents Feb 13 07:17:10.650788 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 07:17:10.631862 systemd[1]: Finished initrd-setup-root.service. Feb 13 07:17:10.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.661816 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 07:17:10.728742 kernel: audit: type=1130 audit(1707808630.660:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.721173 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 07:17:10.737178 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 07:17:10.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.815618 initrd-setup-root-after-ignition[807]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 07:17:10.837730 kernel: audit: type=1130 audit(1707808630.756:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.756992 systemd[1]: Reached target ignition-subsequent.target. Feb 13 07:17:10.823992 systemd[1]: Starting initrd-parse-etc.service... Feb 13 07:17:10.969098 kernel: audit: type=1130 audit(1707808630.860:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.969112 kernel: audit: type=1131 audit(1707808630.860:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.850375 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 07:17:10.850425 systemd[1]: Finished initrd-parse-etc.service. Feb 13 07:17:10.860744 systemd[1]: Reached target initrd-fs.target. Feb 13 07:17:11.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:10.977719 systemd[1]: Reached target initrd.target. Feb 13 07:17:10.977775 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 07:17:10.978116 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 07:17:10.998840 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 07:17:11.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.015090 systemd[1]: Starting initrd-cleanup.service... Feb 13 07:17:11.032214 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 07:17:11.043751 systemd[1]: Stopped target timers.target. Feb 13 07:17:11.061891 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 07:17:11.062125 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 07:17:11.078318 systemd[1]: Stopped target initrd.target. Feb 13 07:17:11.092043 systemd[1]: Stopped target basic.target. Feb 13 07:17:11.106058 systemd[1]: Stopped target ignition-subsequent.target. Feb 13 07:17:11.124156 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 13 07:17:11.141068 systemd[1]: Stopped target initrd-root-device.target. Feb 13 07:17:11.159155 systemd[1]: Stopped target paths.target. Feb 13 07:17:11.173158 systemd[1]: Stopped target remote-fs.target. Feb 13 07:17:11.189050 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 07:17:11.205046 systemd[1]: Stopped target slices.target. Feb 13 07:17:11.222149 systemd[1]: Stopped target sockets.target. Feb 13 07:17:11.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.240157 systemd[1]: Stopped target sysinit.target. Feb 13 07:17:11.257056 systemd[1]: Stopped target local-fs.target. Feb 13 07:17:11.274034 systemd[1]: Stopped target local-fs-pre.target. Feb 13 07:17:11.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.290032 systemd[1]: Stopped target swap.target. Feb 13 07:17:11.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.304974 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 07:17:11.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.409784 iscsid[453]: iscsid shutting down. Feb 13 07:17:11.305303 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 07:17:11.321253 systemd[1]: Stopped target cryptsetup.target. Feb 13 07:17:11.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.336926 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 07:17:11.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.340700 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 07:17:11.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.351953 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 07:17:11.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.352284 systemd[1]: Stopped dracut-initqueue.service. Feb 13 07:17:11.368167 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 07:17:11.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.368516 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 07:17:11.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.385132 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 07:17:11.385441 systemd[1]: Stopped initrd-setup-root.service. Feb 13 07:17:11.401597 systemd[1]: Stopping iscsid.service... Feb 13 07:17:11.416676 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 07:17:11.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.416754 systemd[1]: Stopped systemd-sysctl.service. Feb 13 07:17:11.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.436912 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 07:17:11.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.437014 systemd[1]: Stopped systemd-modules-load.service. Feb 13 07:17:11.451844 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 07:17:11.451969 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 07:17:11.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.470013 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 07:17:11.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.470243 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 07:17:11.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.488513 systemd[1]: Stopping systemd-udevd.service... Feb 13 07:17:11.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.505082 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 07:17:11.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.505494 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 07:17:11.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:11.505540 systemd[1]: Stopped iscsid.service. Feb 13 07:17:11.510962 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 07:17:11.511027 systemd[1]: Stopped systemd-udevd.service. Feb 13 07:17:11.534954 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 07:17:11.535010 systemd[1]: Closed iscsid.socket. Feb 13 07:17:11.548698 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 07:17:11.548719 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 07:17:11.566706 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 07:17:11.566742 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 07:17:11.581696 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 07:17:11.581760 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 07:17:11.596760 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 07:17:11.596843 systemd[1]: Stopped dracut-cmdline.service. Feb 13 07:17:11.612897 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 07:17:11.613030 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 07:17:11.629445 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 07:17:11.646713 systemd[1]: Stopping iscsiuio.service... Feb 13 07:17:11.662656 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 13 07:17:11.662711 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 13 07:17:11.681068 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 07:17:11.681132 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 07:17:11.696842 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 07:17:11.696954 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 07:17:11.869514 systemd-journald[266]: Received SIGTERM from PID 1 (n/a). Feb 13 07:17:11.717163 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 13 07:17:11.718378 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 07:17:11.718602 systemd[1]: Stopped iscsiuio.service. Feb 13 07:17:11.729232 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 07:17:11.729428 systemd[1]: Finished initrd-cleanup.service. Feb 13 07:17:11.744335 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 07:17:11.744560 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 07:17:11.764690 systemd[1]: Reached target initrd-switch-root.target. Feb 13 07:17:11.778872 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 07:17:11.778975 systemd[1]: Closed iscsiuio.socket. Feb 13 07:17:11.794616 systemd[1]: Starting initrd-switch-root.service... Feb 13 07:17:11.813377 systemd[1]: Switching root. Feb 13 07:17:11.870168 systemd-journald[266]: Journal stopped Feb 13 07:17:15.861881 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 07:17:15.861895 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 07:17:15.861904 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 07:17:15.861909 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 07:17:15.861914 kernel: SELinux: policy capability open_perms=1 Feb 13 07:17:15.861919 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 07:17:15.861925 kernel: SELinux: policy capability always_check_network=0 Feb 13 07:17:15.861931 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 07:17:15.861936 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 07:17:15.861942 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 07:17:15.861947 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 07:17:15.861953 systemd[1]: Successfully loaded SELinux policy in 309.656ms. Feb 13 07:17:15.861960 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.617ms. Feb 13 07:17:15.861967 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 07:17:15.861975 systemd[1]: Detected architecture x86-64. Feb 13 07:17:15.861981 systemd[1]: Detected first boot. Feb 13 07:17:15.861987 systemd[1]: Hostname set to . Feb 13 07:17:15.861993 systemd[1]: Initializing machine ID from random generator. Feb 13 07:17:15.861999 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 07:17:15.862004 systemd[1]: Populated /etc with preset unit settings. Feb 13 07:17:15.862010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 07:17:15.862018 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 07:17:15.862025 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 07:17:15.862031 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 07:17:15.862037 systemd[1]: Stopped initrd-switch-root.service. Feb 13 07:17:15.862043 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 07:17:15.862049 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 07:17:15.862056 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 07:17:15.862063 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 07:17:15.862069 systemd[1]: Created slice system-getty.slice. Feb 13 07:17:15.862075 systemd[1]: Created slice system-modprobe.slice. Feb 13 07:17:15.862081 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 07:17:15.862087 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 07:17:15.862093 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 07:17:15.862098 systemd[1]: Created slice user.slice. Feb 13 07:17:15.862104 systemd[1]: Started systemd-ask-password-console.path. Feb 13 07:17:15.862111 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 07:17:15.862117 systemd[1]: Set up automount boot.automount. Feb 13 07:17:15.862124 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 07:17:15.862130 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 07:17:15.862138 systemd[1]: Stopped target initrd-fs.target. Feb 13 07:17:15.862144 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 07:17:15.862150 systemd[1]: Reached target integritysetup.target. Feb 13 07:17:15.862156 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 07:17:15.862163 systemd[1]: Reached target remote-fs.target. Feb 13 07:17:15.862170 systemd[1]: Reached target slices.target. Feb 13 07:17:15.862176 systemd[1]: Reached target swap.target. Feb 13 07:17:15.862182 systemd[1]: Reached target torcx.target. Feb 13 07:17:15.862188 systemd[1]: Reached target veritysetup.target. Feb 13 07:17:15.862195 systemd[1]: Listening on systemd-coredump.socket. Feb 13 07:17:15.862201 systemd[1]: Listening on systemd-initctl.socket. Feb 13 07:17:15.862207 systemd[1]: Listening on systemd-networkd.socket. Feb 13 07:17:15.862215 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 07:17:15.862221 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 07:17:15.862227 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 07:17:15.862234 systemd[1]: Mounting dev-hugepages.mount... Feb 13 07:17:15.862240 systemd[1]: Mounting dev-mqueue.mount... Feb 13 07:17:15.862246 systemd[1]: Mounting media.mount... Feb 13 07:17:15.862254 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 07:17:15.862260 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 07:17:15.862267 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 07:17:15.862273 systemd[1]: Mounting tmp.mount... Feb 13 07:17:15.862280 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 07:17:15.862286 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 07:17:15.862292 systemd[1]: Starting kmod-static-nodes.service... Feb 13 07:17:15.862299 systemd[1]: Starting modprobe@configfs.service... Feb 13 07:17:15.862305 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 07:17:15.862312 systemd[1]: Starting modprobe@drm.service... Feb 13 07:17:15.862319 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 07:17:15.862325 systemd[1]: Starting modprobe@fuse.service... Feb 13 07:17:15.862332 kernel: fuse: init (API version 7.34) Feb 13 07:17:15.862337 systemd[1]: Starting modprobe@loop.service... Feb 13 07:17:15.862344 kernel: loop: module loaded Feb 13 07:17:15.862350 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 07:17:15.862357 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 07:17:15.862364 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 07:17:15.862370 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 07:17:15.862377 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 13 07:17:15.862383 kernel: audit: type=1131 audit(1707808635.503:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.862389 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 07:17:15.862395 kernel: audit: type=1131 audit(1707808635.591:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.862401 systemd[1]: Stopped systemd-journald.service. Feb 13 07:17:15.862407 kernel: audit: type=1130 audit(1707808635.655:80): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.862414 kernel: audit: type=1131 audit(1707808635.655:81): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.862420 kernel: audit: type=1334 audit(1707808635.741:82): prog-id=16 op=LOAD Feb 13 07:17:15.862426 kernel: audit: type=1334 audit(1707808635.759:83): prog-id=17 op=LOAD Feb 13 07:17:15.862432 kernel: audit: type=1334 audit(1707808635.777:84): prog-id=18 op=LOAD Feb 13 07:17:15.862438 kernel: audit: type=1334 audit(1707808635.795:85): prog-id=14 op=UNLOAD Feb 13 07:17:15.862444 systemd[1]: Starting systemd-journald.service... Feb 13 07:17:15.862450 kernel: audit: type=1334 audit(1707808635.795:86): prog-id=15 op=UNLOAD Feb 13 07:17:15.862456 systemd[1]: Starting systemd-modules-load.service... Feb 13 07:17:15.862463 kernel: audit: type=1305 audit(1707808635.859:87): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 07:17:15.862471 systemd-journald[948]: Journal started Feb 13 07:17:15.862515 systemd-journald[948]: Runtime Journal (/run/log/journal/49763bcc2047480393d5cf17ae17c0c9) is 8.0M, max 640.1M, 632.1M free. Feb 13 07:17:12.369000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 07:17:12.633000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 07:17:12.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 07:17:12.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 07:17:12.635000 audit: BPF prog-id=8 op=LOAD Feb 13 07:17:12.636000 audit: BPF prog-id=8 op=UNLOAD Feb 13 07:17:12.636000 audit: BPF prog-id=9 op=LOAD Feb 13 07:17:12.636000 audit: BPF prog-id=9 op=UNLOAD Feb 13 07:17:12.702000 audit[841]: AVC avc: denied { associate } for pid=841 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 07:17:12.702000 audit[841]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=824 pid=841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:12.702000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 07:17:12.727000 audit[841]: AVC avc: denied { associate } for pid=841 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 07:17:12.727000 audit[841]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b5 a2=1ed a3=0 items=2 ppid=824 pid=841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:12.727000 audit: CWD cwd="/" Feb 13 07:17:12.727000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:12.727000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:12.727000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 07:17:14.257000 audit: BPF prog-id=10 op=LOAD Feb 13 07:17:14.257000 audit: BPF prog-id=3 op=UNLOAD Feb 13 07:17:14.257000 audit: BPF prog-id=11 op=LOAD Feb 13 07:17:14.257000 audit: BPF prog-id=12 op=LOAD Feb 13 07:17:14.258000 audit: BPF prog-id=4 op=UNLOAD Feb 13 07:17:14.258000 audit: BPF prog-id=5 op=UNLOAD Feb 13 07:17:14.258000 audit: BPF prog-id=13 op=LOAD Feb 13 07:17:14.258000 audit: BPF prog-id=10 op=UNLOAD Feb 13 07:17:14.258000 audit: BPF prog-id=14 op=LOAD Feb 13 07:17:14.258000 audit: BPF prog-id=15 op=LOAD Feb 13 07:17:14.259000 audit: BPF prog-id=11 op=UNLOAD Feb 13 07:17:14.259000 audit: BPF prog-id=12 op=UNLOAD Feb 13 07:17:14.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:14.304000 audit: BPF prog-id=13 op=UNLOAD Feb 13 07:17:14.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:14.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:15.741000 audit: BPF prog-id=16 op=LOAD Feb 13 07:17:15.759000 audit: BPF prog-id=17 op=LOAD Feb 13 07:17:15.777000 audit: BPF prog-id=18 op=LOAD Feb 13 07:17:15.795000 audit: BPF prog-id=14 op=UNLOAD Feb 13 07:17:15.795000 audit: BPF prog-id=15 op=UNLOAD Feb 13 07:17:15.859000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 07:17:12.700038 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 07:17:14.256820 systemd[1]: Queued start job for default target multi-user.target. Feb 13 07:17:12.700564 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 07:17:14.256828 systemd[1]: Unnecessary job was removed for dev-sda6.device. Feb 13 07:17:12.700577 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 07:17:14.259826 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 07:17:12.700595 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 07:17:12.700600 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 07:17:12.700616 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 07:17:12.700623 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 07:17:12.700740 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 07:17:12.700760 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 07:17:12.700767 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 07:17:12.701126 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 07:17:12.701146 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 07:17:12.701156 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 07:17:12.701164 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 07:17:12.701173 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 07:17:12.701180 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 07:17:13.910802 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:13Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 07:17:13.910944 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:13Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 07:17:13.911004 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:13Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 07:17:13.911096 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:13Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 07:17:13.911125 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:13Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 07:17:13.911159 /usr/lib/systemd/system-generators/torcx-generator[841]: time="2024-02-13T07:17:13Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 07:17:15.859000 audit[948]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff350f38d0 a2=4000 a3=7fff350f396c items=0 ppid=1 pid=948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:15.859000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 07:17:15.940675 systemd[1]: Starting systemd-network-generator.service... Feb 13 07:17:15.967526 systemd[1]: Starting systemd-remount-fs.service... Feb 13 07:17:15.994534 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 07:17:16.037323 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 07:17:16.037348 systemd[1]: Stopped verity-setup.service. Feb 13 07:17:16.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.082489 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 07:17:16.102672 systemd[1]: Started systemd-journald.service. Feb 13 07:17:16.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.111011 systemd[1]: Mounted dev-hugepages.mount. Feb 13 07:17:16.118756 systemd[1]: Mounted dev-mqueue.mount. Feb 13 07:17:16.125741 systemd[1]: Mounted media.mount. Feb 13 07:17:16.132750 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 07:17:16.141733 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 07:17:16.150709 systemd[1]: Mounted tmp.mount. Feb 13 07:17:16.157796 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 07:17:16.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.166814 systemd[1]: Finished kmod-static-nodes.service. Feb 13 07:17:16.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.174870 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 07:17:16.174988 systemd[1]: Finished modprobe@configfs.service. Feb 13 07:17:16.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.183909 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 07:17:16.184065 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 07:17:16.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.194039 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 07:17:16.194229 systemd[1]: Finished modprobe@drm.service. Feb 13 07:17:16.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.203302 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 07:17:16.203645 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 07:17:16.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.212321 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 07:17:16.212642 systemd[1]: Finished modprobe@fuse.service. Feb 13 07:17:16.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.221326 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 07:17:16.221633 systemd[1]: Finished modprobe@loop.service. Feb 13 07:17:16.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.230309 systemd[1]: Finished systemd-modules-load.service. Feb 13 07:17:16.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.239264 systemd[1]: Finished systemd-network-generator.service. Feb 13 07:17:16.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.248331 systemd[1]: Finished systemd-remount-fs.service. Feb 13 07:17:16.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.257293 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 07:17:16.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.266862 systemd[1]: Reached target network-pre.target. Feb 13 07:17:16.278323 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 07:17:16.289124 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 07:17:16.295746 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 07:17:16.296678 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 07:17:16.304088 systemd[1]: Starting systemd-journal-flush.service... Feb 13 07:17:16.307585 systemd-journald[948]: Time spent on flushing to /var/log/journal/49763bcc2047480393d5cf17ae17c0c9 is 10.643ms for 1271 entries. Feb 13 07:17:16.307585 systemd-journald[948]: System Journal (/var/log/journal/49763bcc2047480393d5cf17ae17c0c9) is 8.0M, max 195.6M, 187.6M free. Feb 13 07:17:16.342460 systemd-journald[948]: Received client request to flush runtime journal. Feb 13 07:17:16.320614 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 07:17:16.321090 systemd[1]: Starting systemd-random-seed.service... Feb 13 07:17:16.337619 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 07:17:16.338109 systemd[1]: Starting systemd-sysctl.service... Feb 13 07:17:16.345292 systemd[1]: Starting systemd-sysusers.service... Feb 13 07:17:16.352133 systemd[1]: Starting systemd-udev-settle.service... Feb 13 07:17:16.359575 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 07:17:16.367656 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 07:17:16.375723 systemd[1]: Finished systemd-journal-flush.service. Feb 13 07:17:16.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.383725 systemd[1]: Finished systemd-random-seed.service. Feb 13 07:17:16.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.391692 systemd[1]: Finished systemd-sysctl.service. Feb 13 07:17:16.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.399710 systemd[1]: Finished systemd-sysusers.service. Feb 13 07:17:16.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.408672 systemd[1]: Reached target first-boot-complete.target. Feb 13 07:17:16.417237 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 07:17:16.426656 udevadm[965]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 13 07:17:16.436215 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 07:17:16.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.601116 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 07:17:16.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.609000 audit: BPF prog-id=19 op=LOAD Feb 13 07:17:16.609000 audit: BPF prog-id=20 op=LOAD Feb 13 07:17:16.609000 audit: BPF prog-id=6 op=UNLOAD Feb 13 07:17:16.609000 audit: BPF prog-id=7 op=UNLOAD Feb 13 07:17:16.610735 systemd[1]: Starting systemd-udevd.service... Feb 13 07:17:16.622273 systemd-udevd[968]: Using default interface naming scheme 'v252'. Feb 13 07:17:16.642183 systemd[1]: Started systemd-udevd.service. Feb 13 07:17:16.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.652653 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 07:17:16.652000 audit: BPF prog-id=21 op=LOAD Feb 13 07:17:16.653771 systemd[1]: Starting systemd-networkd.service... Feb 13 07:17:16.698379 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 07:17:16.698441 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 07:17:16.697000 audit: BPF prog-id=22 op=LOAD Feb 13 07:17:16.703493 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 07:17:16.703541 kernel: IPMI message handler: version 39.2 Feb 13 07:17:16.703560 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 07:17:16.738492 kernel: ACPI: button: Power Button [PWRF] Feb 13 07:17:16.756000 audit: BPF prog-id=23 op=LOAD Feb 13 07:17:16.774000 audit: BPF prog-id=24 op=LOAD Feb 13 07:17:16.774957 systemd[1]: Starting systemd-userdbd.service... Feb 13 07:17:16.789068 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 07:17:16.798659 systemd[1]: Started systemd-userdbd.service. Feb 13 07:17:16.720000 audit[1039]: AVC avc: denied { confidentiality } for pid=1039 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 07:17:16.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:16.720000 audit[1039]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56312ab629e0 a1=4d8bc a2=7f765bf4bbc5 a3=5 items=42 ppid=968 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:16.720000 audit: CWD cwd="/" Feb 13 07:17:16.720000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.820525 kernel: ipmi device interface Feb 13 07:17:16.720000 audit: PATH item=1 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=2 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=3 name=(null) inode=16542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=4 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=5 name=(null) inode=16543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=6 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=7 name=(null) inode=16544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=8 name=(null) inode=16544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=9 name=(null) inode=16545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=10 name=(null) inode=16544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=11 name=(null) inode=16546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=12 name=(null) inode=16544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=13 name=(null) inode=16547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=14 name=(null) inode=16544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=15 name=(null) inode=16548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=16 name=(null) inode=16544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=17 name=(null) inode=16549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=18 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=19 name=(null) inode=16550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=20 name=(null) inode=16550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=21 name=(null) inode=16551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=22 name=(null) inode=16550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=23 name=(null) inode=16552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=24 name=(null) inode=16550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=25 name=(null) inode=16553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=26 name=(null) inode=16550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=27 name=(null) inode=16554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=28 name=(null) inode=16550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=29 name=(null) inode=16555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=30 name=(null) inode=16541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=31 name=(null) inode=16556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=32 name=(null) inode=16556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=33 name=(null) inode=16557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=34 name=(null) inode=16556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=35 name=(null) inode=16558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=36 name=(null) inode=16556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=37 name=(null) inode=16559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=38 name=(null) inode=16556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=39 name=(null) inode=16560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=40 name=(null) inode=16556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PATH item=41 name=(null) inode=16561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 07:17:16.720000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 07:17:16.864174 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 07:17:16.864367 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 07:17:16.884491 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 07:17:16.884621 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 07:17:16.924546 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 07:17:16.972628 kernel: ipmi_si: IPMI System Interface driver Feb 13 07:17:16.972655 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 07:17:16.972738 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 07:17:16.993063 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 07:17:17.031031 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 07:17:17.031141 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 07:17:17.075489 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 07:17:17.075518 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 07:17:17.114431 systemd-networkd[999]: bond0: netdev ready Feb 13 07:17:17.115242 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 07:17:17.117315 systemd-networkd[999]: lo: Link UP Feb 13 07:17:17.117374 systemd-networkd[999]: lo: Gained carrier Feb 13 07:17:17.117879 systemd-networkd[999]: Enumeration completed Feb 13 07:17:17.118006 systemd[1]: Started systemd-networkd.service. Feb 13 07:17:17.118475 systemd-networkd[999]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 07:17:17.119226 systemd-networkd[999]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a4:65.network. Feb 13 07:17:17.137776 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 07:17:17.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:17.154895 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 07:17:17.161496 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 07:17:17.161591 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 07:17:17.182534 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 07:17:17.269607 kernel: intel_rapl_common: Found RAPL domain package Feb 13 07:17:17.269649 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 07:17:17.269728 kernel: intel_rapl_common: Found RAPL domain core Feb 13 07:17:17.302682 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 07:17:17.302707 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 07:17:17.320565 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 07:17:17.360837 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 07:17:17.362232 systemd-networkd[999]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a4:64.network. Feb 13 07:17:17.380547 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 07:17:17.454554 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 07:17:17.591531 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 07:17:17.660558 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 07:17:17.684616 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 07:17:17.708514 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 07:17:17.709842 systemd-networkd[999]: bond0: Link UP Feb 13 07:17:17.710105 systemd-networkd[999]: enp1s0f1np1: Link UP Feb 13 07:17:17.710321 systemd-networkd[999]: enp1s0f0np0: Link UP Feb 13 07:17:17.710493 systemd-networkd[999]: enp1s0f1np1: Gained carrier Feb 13 07:17:17.711737 systemd-networkd[999]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:7e:a4:64.network. Feb 13 07:17:17.748134 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 07:17:17.748201 kernel: bond0: active interface up! Feb 13 07:17:17.780544 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 13 07:17:17.821538 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 07:17:17.901537 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:17.923667 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:17.944525 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:17.965537 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:17.987622 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:18.008557 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:18.028677 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:18.048519 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:18.068128 systemd-networkd[999]: bond0: Gained carrier Feb 13 07:17:18.068209 systemd-networkd[999]: enp1s0f0np0: Gained carrier Feb 13 07:17:18.068487 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:18.105211 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 07:17:18.105258 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 07:17:18.106802 systemd-networkd[999]: enp1s0f1np1: Link DOWN Feb 13 07:17:18.106804 systemd-networkd[999]: enp1s0f1np1: Lost carrier Feb 13 07:17:18.108734 systemd[1]: Finished systemd-udev-settle.service. Feb 13 07:17:18.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.117393 systemd[1]: Starting lvm2-activation-early.service... Feb 13 07:17:18.133093 lvm[1072]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 07:17:18.160897 systemd[1]: Finished lvm2-activation-early.service. Feb 13 07:17:18.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.168637 systemd[1]: Reached target cryptsetup.target. Feb 13 07:17:18.177181 systemd[1]: Starting lvm2-activation.service... Feb 13 07:17:18.179029 lvm[1073]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 07:17:18.210903 systemd[1]: Finished lvm2-activation.service. Feb 13 07:17:18.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.218623 systemd[1]: Reached target local-fs-pre.target. Feb 13 07:17:18.226585 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 07:17:18.226600 systemd[1]: Reached target local-fs.target. Feb 13 07:17:18.234572 systemd[1]: Reached target machines.target. Feb 13 07:17:18.243330 systemd[1]: Starting ldconfig.service... Feb 13 07:17:18.250917 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 07:17:18.250939 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 07:17:18.251456 systemd[1]: Starting systemd-boot-update.service... Feb 13 07:17:18.259013 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 07:17:18.269098 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 07:17:18.269182 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 07:17:18.269210 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 07:17:18.269725 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 07:17:18.269914 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1075 (bootctl) Feb 13 07:17:18.270512 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 07:17:18.278838 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 07:17:18.280191 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 07:17:18.281208 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 07:17:18.283596 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 07:17:18.283871 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 07:17:18.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.289954 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 07:17:18.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.354532 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 07:17:18.354669 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 07:17:18.371341 systemd-fsck[1083]: fsck.fat 4.2 (2021-01-31) Feb 13 07:17:18.371341 systemd-fsck[1083]: /dev/sda1: 789 files, 115339/258078 clusters Feb 13 07:17:18.371491 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 07:17:18.377982 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 07:17:18.387490 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 07:17:18.387521 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 07:17:18.388243 systemd-networkd[999]: enp1s0f1np1: Link UP Feb 13 07:17:18.388402 systemd-networkd[999]: enp1s0f1np1: Gained carrier Feb 13 07:17:18.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.431258 systemd[1]: Mounting boot.mount... Feb 13 07:17:18.437490 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 07:17:18.456489 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 07:17:18.462630 systemd[1]: Mounted boot.mount. Feb 13 07:17:18.481045 systemd[1]: Finished systemd-boot-update.service. Feb 13 07:17:18.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.506542 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:1 Feb 13 07:17:18.512511 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 07:17:18.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:18.521365 systemd[1]: Starting audit-rules.service... Feb 13 07:17:18.529119 systemd[1]: Starting clean-ca-certificates.service... Feb 13 07:17:18.539068 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 07:17:18.540000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 07:17:18.540000 audit[1108]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3dfaf130 a2=420 a3=0 items=0 ppid=1091 pid=1108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:18.540000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 07:17:18.540978 augenrules[1108]: No rules Feb 13 07:17:18.548526 systemd[1]: Starting systemd-resolved.service... Feb 13 07:17:18.556426 systemd[1]: Starting systemd-timesyncd.service... Feb 13 07:17:18.558742 ldconfig[1074]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 07:17:18.564125 systemd[1]: Starting systemd-update-utmp.service... Feb 13 07:17:18.571852 systemd[1]: Finished ldconfig.service. Feb 13 07:17:18.578711 systemd[1]: Finished audit-rules.service. Feb 13 07:17:18.585685 systemd[1]: Finished clean-ca-certificates.service. Feb 13 07:17:18.593684 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 07:17:18.605342 systemd[1]: Starting systemd-update-done.service... Feb 13 07:17:18.612569 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 07:17:18.612951 systemd[1]: Finished systemd-update-done.service. Feb 13 07:17:18.622305 systemd[1]: Finished systemd-update-utmp.service. Feb 13 07:17:18.631940 systemd[1]: Started systemd-timesyncd.service. Feb 13 07:17:18.633073 systemd-resolved[1113]: Positive Trust Anchors: Feb 13 07:17:18.633080 systemd-resolved[1113]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 07:17:18.633098 systemd-resolved[1113]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 07:17:18.639765 systemd[1]: Reached target time-set.target. Feb 13 07:17:18.651188 systemd-resolved[1113]: Using system hostname 'ci-3510.3.2-a-48d44ae746'. Feb 13 07:17:18.652282 systemd[1]: Started systemd-resolved.service. Feb 13 07:17:18.660707 systemd[1]: Reached target network.target. Feb 13 07:17:18.668645 systemd[1]: Reached target nss-lookup.target. Feb 13 07:17:18.676643 systemd[1]: Reached target sysinit.target. Feb 13 07:17:18.684685 systemd[1]: Started motdgen.path. Feb 13 07:17:18.691605 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 07:17:18.701648 systemd[1]: Started logrotate.timer. Feb 13 07:17:18.708614 systemd[1]: Started mdadm.timer. Feb 13 07:17:18.715683 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 07:17:18.723551 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 07:17:18.723568 systemd[1]: Reached target paths.target. Feb 13 07:17:18.730618 systemd[1]: Reached target timers.target. Feb 13 07:17:18.737678 systemd[1]: Listening on dbus.socket. Feb 13 07:17:18.745057 systemd[1]: Starting docker.socket... Feb 13 07:17:18.752948 systemd[1]: Listening on sshd.socket. Feb 13 07:17:18.759719 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 07:17:18.759942 systemd[1]: Listening on docker.socket. Feb 13 07:17:18.766614 systemd[1]: Reached target sockets.target. Feb 13 07:17:18.774570 systemd[1]: Reached target basic.target. Feb 13 07:17:18.781720 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 07:17:18.781733 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 07:17:18.782174 systemd[1]: Starting containerd.service... Feb 13 07:17:18.788987 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 07:17:18.798050 systemd[1]: Starting coreos-metadata.service... Feb 13 07:17:18.805020 systemd[1]: Starting dbus.service... Feb 13 07:17:18.811208 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 07:17:18.817779 jq[1127]: false Feb 13 07:17:18.819082 systemd[1]: Starting extend-filesystems.service... Feb 13 07:17:18.825546 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 07:17:18.826109 systemd[1]: Starting motdgen.service... Feb 13 07:17:18.826281 dbus-daemon[1126]: [system] SELinux support is enabled Feb 13 07:17:18.826949 extend-filesystems[1130]: Found sda Feb 13 07:17:18.856704 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 13 07:17:18.833165 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 07:17:18.856765 coreos-metadata[1123]: Feb 13 07:17:18.846 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 07:17:18.856869 coreos-metadata[1122]: Feb 13 07:17:18.846 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda1 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda2 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda3 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found usr Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda4 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda6 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda7 Feb 13 07:17:18.856960 extend-filesystems[1130]: Found sda9 Feb 13 07:17:18.856960 extend-filesystems[1130]: Checking size of /dev/sda9 Feb 13 07:17:18.856960 extend-filesystems[1130]: Resized partition /dev/sda9 Feb 13 07:17:18.864263 systemd[1]: Starting sshd-keygen.service... Feb 13 07:17:18.973780 extend-filesystems[1144]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 07:17:18.878909 systemd[1]: Starting systemd-logind.service... Feb 13 07:17:18.990581 dbus-daemon[1126]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 07:17:18.891532 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 07:17:18.995875 update_engine[1158]: I0213 07:17:18.948741 1158 main.cc:92] Flatcar Update Engine starting Feb 13 07:17:18.995875 update_engine[1158]: I0213 07:17:18.951856 1158 update_check_scheduler.cc:74] Next update check in 2m32s Feb 13 07:17:18.892044 systemd[1]: Starting tcsd.service... Feb 13 07:17:18.996067 jq[1159]: true Feb 13 07:17:18.899512 systemd-logind[1156]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 07:17:18.899522 systemd-logind[1156]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 07:17:18.996321 jq[1161]: false Feb 13 07:17:18.899531 systemd-logind[1156]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 07:17:18.899629 systemd-logind[1156]: New seat seat0. Feb 13 07:17:18.903781 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 07:17:18.904141 systemd[1]: Starting update-engine.service... Feb 13 07:17:18.918099 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 07:17:18.932866 systemd[1]: Started dbus.service. Feb 13 07:17:18.948169 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 07:17:18.948252 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 07:17:18.948399 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 07:17:18.948472 systemd[1]: Finished motdgen.service. Feb 13 07:17:18.965701 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 07:17:18.965775 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 07:17:18.991097 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 13 07:17:18.991175 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 13 07:17:18.994028 systemd[1]: Started update-engine.service. Feb 13 07:17:18.999355 env[1162]: time="2024-02-13T07:17:18.999331070Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 07:17:19.003836 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 07:17:19.003926 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 07:17:19.007827 env[1162]: time="2024-02-13T07:17:19.007780584Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 07:17:19.007859 env[1162]: time="2024-02-13T07:17:19.007836349Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008482 env[1162]: time="2024-02-13T07:17:19.008434811Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008482 env[1162]: time="2024-02-13T07:17:19.008450882Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008597 env[1162]: time="2024-02-13T07:17:19.008558136Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008597 env[1162]: time="2024-02-13T07:17:19.008568360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008597 env[1162]: time="2024-02-13T07:17:19.008575741Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 07:17:19.008597 env[1162]: time="2024-02-13T07:17:19.008581231Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008679 env[1162]: time="2024-02-13T07:17:19.008622372Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008785 env[1162]: time="2024-02-13T07:17:19.008746452Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008822 env[1162]: time="2024-02-13T07:17:19.008810028Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 07:17:19.008822 env[1162]: time="2024-02-13T07:17:19.008819139Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 07:17:19.008857 env[1162]: time="2024-02-13T07:17:19.008844917Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 07:17:19.008857 env[1162]: time="2024-02-13T07:17:19.008852360Z" level=info msg="metadata content store policy set" policy=shared Feb 13 07:17:19.009459 systemd[1]: Started systemd-logind.service. Feb 13 07:17:19.019125 systemd[1]: Started locksmithd.service. Feb 13 07:17:19.020653 env[1162]: time="2024-02-13T07:17:19.020639481Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 07:17:19.020682 env[1162]: time="2024-02-13T07:17:19.020660498Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 07:17:19.020682 env[1162]: time="2024-02-13T07:17:19.020674746Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 07:17:19.020713 env[1162]: time="2024-02-13T07:17:19.020698731Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020732 env[1162]: time="2024-02-13T07:17:19.020712693Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020732 env[1162]: time="2024-02-13T07:17:19.020726559Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020762 env[1162]: time="2024-02-13T07:17:19.020738859Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020762 env[1162]: time="2024-02-13T07:17:19.020752375Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020800 env[1162]: time="2024-02-13T07:17:19.020764915Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020800 env[1162]: time="2024-02-13T07:17:19.020777993Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020800 env[1162]: time="2024-02-13T07:17:19.020789848Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.020850 env[1162]: time="2024-02-13T07:17:19.020801369Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 07:17:19.020877 env[1162]: time="2024-02-13T07:17:19.020867401Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 07:17:19.020942 env[1162]: time="2024-02-13T07:17:19.020932240Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 07:17:19.021135 env[1162]: time="2024-02-13T07:17:19.021124428Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 07:17:19.021157 env[1162]: time="2024-02-13T07:17:19.021147896Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021176 env[1162]: time="2024-02-13T07:17:19.021163102Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 07:17:19.021209 env[1162]: time="2024-02-13T07:17:19.021199761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021228 env[1162]: time="2024-02-13T07:17:19.021216254Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021244 env[1162]: time="2024-02-13T07:17:19.021229262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021268 env[1162]: time="2024-02-13T07:17:19.021240840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021268 env[1162]: time="2024-02-13T07:17:19.021252716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021300 env[1162]: time="2024-02-13T07:17:19.021265054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021300 env[1162]: time="2024-02-13T07:17:19.021277162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021300 env[1162]: time="2024-02-13T07:17:19.021288484Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021350 env[1162]: time="2024-02-13T07:17:19.021301554Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 07:17:19.021407 env[1162]: time="2024-02-13T07:17:19.021397790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021427 env[1162]: time="2024-02-13T07:17:19.021413210Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021447 env[1162]: time="2024-02-13T07:17:19.021425923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021447 env[1162]: time="2024-02-13T07:17:19.021437995Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 07:17:19.021480 env[1162]: time="2024-02-13T07:17:19.021450827Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 07:17:19.021480 env[1162]: time="2024-02-13T07:17:19.021462158Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 07:17:19.021516 env[1162]: time="2024-02-13T07:17:19.021481430Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 07:17:19.021536 env[1162]: time="2024-02-13T07:17:19.021514213Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 07:17:19.021724 env[1162]: time="2024-02-13T07:17:19.021686472Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.021746718Z" level=info msg="Connect containerd service" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.021773013Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022153583Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022239831Z" level=info msg="Start subscribing containerd event" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022265856Z" level=info msg="Start recovering state" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022300714Z" level=info msg="Start event monitor" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022306116Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022313486Z" level=info msg="Start snapshots syncer" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022326078Z" level=info msg="Start cni network conf syncer for default" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022330077Z" level=info msg="Start streaming server" Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022339004Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 07:17:19.023153 env[1162]: time="2024-02-13T07:17:19.022370518Z" level=info msg="containerd successfully booted in 0.023366s" Feb 13 07:17:19.025608 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 07:17:19.025689 systemd[1]: Reached target system-config.target. Feb 13 07:17:19.033619 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 07:17:19.033688 systemd[1]: Reached target user-config.target. Feb 13 07:17:19.042989 systemd[1]: Started containerd.service. Feb 13 07:17:19.056874 sshd_keygen[1155]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 07:17:19.068419 systemd[1]: Finished sshd-keygen.service. Feb 13 07:17:19.073526 locksmithd[1181]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 07:17:19.076368 systemd[1]: Starting issuegen.service... Feb 13 07:17:19.083721 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 07:17:19.083796 systemd[1]: Finished issuegen.service. Feb 13 07:17:19.091278 systemd[1]: Starting systemd-user-sessions.service... Feb 13 07:17:19.099762 systemd[1]: Finished systemd-user-sessions.service. Feb 13 07:17:19.108209 systemd[1]: Started getty@tty1.service. Feb 13 07:17:19.115136 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 07:17:19.123703 systemd[1]: Reached target getty.target. Feb 13 07:17:19.329490 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 13 07:17:19.356779 extend-filesystems[1144]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 13 07:17:19.356779 extend-filesystems[1144]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 07:17:19.356779 extend-filesystems[1144]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 13 07:17:19.396526 extend-filesystems[1130]: Resized filesystem in /dev/sda9 Feb 13 07:17:19.396526 extend-filesystems[1130]: Found sdb Feb 13 07:17:19.357246 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 07:17:19.357344 systemd[1]: Finished extend-filesystems.service. Feb 13 07:17:19.432764 systemd-networkd[999]: bond0: Gained IPv6LL Feb 13 07:17:19.433650 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:20.137711 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:20.138105 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:20.141362 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 07:17:20.151592 systemd[1]: Reached target network-online.target. Feb 13 07:17:20.689693 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 07:17:24.137297 login[1203]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 07:17:24.145418 login[1202]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 07:17:24.145424 systemd-logind[1156]: New session 1 of user core. Feb 13 07:17:24.146110 systemd[1]: Created slice user-500.slice. Feb 13 07:17:24.146724 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 07:17:24.147911 systemd-logind[1156]: New session 2 of user core. Feb 13 07:17:24.151724 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 07:17:24.152326 systemd[1]: Starting user@500.service... Feb 13 07:17:24.154189 (systemd)[1206]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:24.218969 systemd[1206]: Queued start job for default target default.target. Feb 13 07:17:24.219205 systemd[1206]: Reached target paths.target. Feb 13 07:17:24.219217 systemd[1206]: Reached target sockets.target. Feb 13 07:17:24.219225 systemd[1206]: Reached target timers.target. Feb 13 07:17:24.219232 systemd[1206]: Reached target basic.target. Feb 13 07:17:24.219251 systemd[1206]: Reached target default.target. Feb 13 07:17:24.219265 systemd[1206]: Startup finished in 62ms. Feb 13 07:17:24.219309 systemd[1]: Started user@500.service. Feb 13 07:17:24.219848 systemd[1]: Started session-1.scope. Feb 13 07:17:24.220198 systemd[1]: Started session-2.scope. Feb 13 07:17:25.001922 coreos-metadata[1122]: Feb 13 07:17:25.001 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 07:17:25.002750 coreos-metadata[1123]: Feb 13 07:17:25.001 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 07:17:25.775533 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 07:17:25.775694 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 07:17:26.002356 coreos-metadata[1122]: Feb 13 07:17:26.002 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 07:17:26.003115 coreos-metadata[1123]: Feb 13 07:17:26.002 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 07:17:26.033560 coreos-metadata[1122]: Feb 13 07:17:26.033 INFO Fetch successful Feb 13 07:17:26.033653 coreos-metadata[1123]: Feb 13 07:17:26.033 INFO Fetch successful Feb 13 07:17:26.055990 systemd[1]: Finished coreos-metadata.service. Feb 13 07:17:26.056831 unknown[1122]: wrote ssh authorized keys file for user: core Feb 13 07:17:26.056885 systemd[1]: Starting etcd-member.service... Feb 13 07:17:26.057614 systemd[1]: Started packet-phone-home.service. Feb 13 07:17:26.064206 curl[1229]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 07:17:26.064348 curl[1229]: Dload Upload Total Spent Left Speed Feb 13 07:17:26.073375 update-ssh-keys[1230]: Updated "/home/core/.ssh/authorized_keys" Feb 13 07:17:26.073661 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 07:17:26.074897 systemd[1]: Starting docker.service... Feb 13 07:17:26.091495 env[1245]: time="2024-02-13T07:17:26.091459792Z" level=info msg="Starting up" Feb 13 07:17:26.092057 env[1245]: time="2024-02-13T07:17:26.092019444Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 07:17:26.092057 env[1245]: time="2024-02-13T07:17:26.092028469Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 07:17:26.092057 env[1245]: time="2024-02-13T07:17:26.092039394Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 07:17:26.092057 env[1245]: time="2024-02-13T07:17:26.092045346Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 07:17:26.092889 env[1245]: time="2024-02-13T07:17:26.092837904Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 07:17:26.092889 env[1245]: time="2024-02-13T07:17:26.092846278Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 07:17:26.092889 env[1245]: time="2024-02-13T07:17:26.092853685Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 07:17:26.092889 env[1245]: time="2024-02-13T07:17:26.092858245Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 07:17:26.105809 env[1245]: time="2024-02-13T07:17:26.105797089Z" level=info msg="Loading containers: start." Feb 13 07:17:26.207571 kernel: Initializing XFRM netlink socket Feb 13 07:17:26.248855 env[1245]: time="2024-02-13T07:17:26.248806243Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 07:17:26.249378 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:26.249446 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:26.252996 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:26.253158 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:26.285263 curl[1229]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 07:17:26.285833 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 07:17:26.293894 systemd-networkd[999]: docker0: Link UP Feb 13 07:17:26.294031 systemd-timesyncd[1114]: Network configuration changed, trying to establish connection. Feb 13 07:17:26.298345 env[1245]: time="2024-02-13T07:17:26.298303325Z" level=info msg="Loading containers: done." Feb 13 07:17:26.303658 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2008836026-merged.mount: Deactivated successfully. Feb 13 07:17:26.319027 env[1245]: time="2024-02-13T07:17:26.318966511Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 07:17:26.319148 env[1245]: time="2024-02-13T07:17:26.319100474Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 07:17:26.319202 env[1245]: time="2024-02-13T07:17:26.319173433Z" level=info msg="Daemon has completed initialization" Feb 13 07:17:26.327780 systemd[1]: Started docker.service. Feb 13 07:17:26.333389 env[1245]: time="2024-02-13T07:17:26.333320154Z" level=info msg="API listen on /run/docker.sock" Feb 13 07:17:26.334280 etcd-wrapper[1234]: Error response from daemon: No such container: etcd-member Feb 13 07:17:26.364310 etcd-wrapper[1370]: Error: No such container: etcd-member Feb 13 07:17:26.421507 etcd-wrapper[1394]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 07:17:26.616333 systemd[1]: Created slice system-sshd.slice. Feb 13 07:17:26.617152 systemd[1]: Started sshd@0-147.75.90.233:22-218.92.0.76:43191.service. Feb 13 07:17:27.654322 etcd-wrapper[1394]: v3.5.0: Pulling from coreos/etcd Feb 13 07:17:27.765040 sshd[1406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 07:17:27.951183 etcd-wrapper[1394]: 1813d21adc01: Pulling fs layer Feb 13 07:17:27.951183 etcd-wrapper[1394]: 6e96907ab677: Pulling fs layer Feb 13 07:17:27.951183 etcd-wrapper[1394]: 444ed0ea8673: Pulling fs layer Feb 13 07:17:27.951183 etcd-wrapper[1394]: 0fd2df5633f0: Pulling fs layer Feb 13 07:17:27.951183 etcd-wrapper[1394]: 8cc22b9456bb: Pulling fs layer Feb 13 07:17:27.951895 etcd-wrapper[1394]: 7ac70aecd290: Pulling fs layer Feb 13 07:17:27.951895 etcd-wrapper[1394]: 4b376c64dfe4: Pulling fs layer Feb 13 07:17:27.951895 etcd-wrapper[1394]: 0fd2df5633f0: Waiting Feb 13 07:17:27.951895 etcd-wrapper[1394]: 8cc22b9456bb: Waiting Feb 13 07:17:27.951895 etcd-wrapper[1394]: 7ac70aecd290: Waiting Feb 13 07:17:27.951895 etcd-wrapper[1394]: 4b376c64dfe4: Waiting Feb 13 07:17:28.320492 etcd-wrapper[1394]: 6e96907ab677: Download complete Feb 13 07:17:28.325037 etcd-wrapper[1394]: 444ed0ea8673: Download complete Feb 13 07:17:28.354777 etcd-wrapper[1394]: 1813d21adc01: Verifying Checksum Feb 13 07:17:28.354777 etcd-wrapper[1394]: 1813d21adc01: Download complete Feb 13 07:17:28.628434 etcd-wrapper[1394]: 8cc22b9456bb: Verifying Checksum Feb 13 07:17:28.628434 etcd-wrapper[1394]: 8cc22b9456bb: Download complete Feb 13 07:17:28.645371 etcd-wrapper[1394]: 0fd2df5633f0: Download complete Feb 13 07:17:28.685948 etcd-wrapper[1394]: 7ac70aecd290: Verifying Checksum Feb 13 07:17:28.685948 etcd-wrapper[1394]: 7ac70aecd290: Download complete Feb 13 07:17:28.696568 systemd[1]: Started sshd@1-147.75.90.233:22-139.178.68.195:52778.service. Feb 13 07:17:28.724102 sshd[1429]: Accepted publickey for core from 139.178.68.195 port 52778 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:28.725027 sshd[1429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:28.727902 systemd-logind[1156]: New session 3 of user core. Feb 13 07:17:28.728472 systemd[1]: Started session-3.scope. Feb 13 07:17:28.775607 systemd[1]: Started sshd@2-147.75.90.233:22-139.178.68.195:52792.service. Feb 13 07:17:28.804829 sshd[1435]: Accepted publickey for core from 139.178.68.195 port 52792 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:28.805744 sshd[1435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:28.808405 systemd-logind[1156]: New session 4 of user core. Feb 13 07:17:28.808983 systemd[1]: Started session-4.scope. Feb 13 07:17:28.859159 sshd[1435]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:28.860983 systemd[1]: sshd@2-147.75.90.233:22-139.178.68.195:52792.service: Deactivated successfully. Feb 13 07:17:28.861380 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 07:17:28.861772 systemd-logind[1156]: Session 4 logged out. Waiting for processes to exit. Feb 13 07:17:28.862429 systemd[1]: Started sshd@3-147.75.90.233:22-139.178.68.195:52806.service. Feb 13 07:17:28.863013 systemd-logind[1156]: Removed session 4. Feb 13 07:17:28.874915 etcd-wrapper[1394]: 1813d21adc01: Pull complete Feb 13 07:17:28.892721 sshd[1441]: Accepted publickey for core from 139.178.68.195 port 52806 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:28.893594 sshd[1441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:28.896510 systemd-logind[1156]: New session 5 of user core. Feb 13 07:17:28.897242 systemd[1]: Started session-5.scope. Feb 13 07:17:28.942998 etcd-wrapper[1394]: 4b376c64dfe4: Download complete Feb 13 07:17:28.946907 sshd[1441]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:28.948132 systemd[1]: sshd@3-147.75.90.233:22-139.178.68.195:52806.service: Deactivated successfully. Feb 13 07:17:28.948554 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 07:17:28.948952 systemd-logind[1156]: Session 5 logged out. Waiting for processes to exit. Feb 13 07:17:28.949441 systemd-logind[1156]: Removed session 5. Feb 13 07:17:29.092523 systemd[1]: var-lib-docker-overlay2-3c9b97724d275836f7c45a26a633dc7fe60d73371d36734b59a4535fe2ec4d30-merged.mount: Deactivated successfully. Feb 13 07:17:29.316933 etcd-wrapper[1394]: 6e96907ab677: Pull complete Feb 13 07:17:29.486229 systemd[1]: var-lib-docker-overlay2-f407735aaeb72ffc05ea8b6a5c687bfb1b36721c020d48f68937e3e0cfcf6b47-merged.mount: Deactivated successfully. Feb 13 07:17:29.526164 etcd-wrapper[1394]: 444ed0ea8673: Pull complete Feb 13 07:17:29.718356 etcd-wrapper[1394]: 0fd2df5633f0: Pull complete Feb 13 07:17:29.744005 etcd-wrapper[1394]: 8cc22b9456bb: Pull complete Feb 13 07:17:29.766140 etcd-wrapper[1394]: 7ac70aecd290: Pull complete Feb 13 07:17:29.788203 etcd-wrapper[1394]: 4b376c64dfe4: Pull complete Feb 13 07:17:29.790523 etcd-wrapper[1394]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 07:17:29.791230 etcd-wrapper[1394]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 07:17:29.834343 env[1162]: time="2024-02-13T07:17:29.834305329Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 07:17:29.834343 env[1162]: time="2024-02-13T07:17:29.834327766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 07:17:29.834343 env[1162]: time="2024-02-13T07:17:29.834335546Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 07:17:29.834629 env[1162]: time="2024-02-13T07:17:29.834407588Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/4238b14b9a813cf70bdd6e67fa8dd8ea7e341702a63d436473617e687a7fb23d pid=1592 runtime=io.containerd.runc.v2 Feb 13 07:17:29.840386 systemd[1]: Started docker-4238b14b9a813cf70bdd6e67fa8dd8ea7e341702a63d436473617e687a7fb23d.scope. Feb 13 07:17:29.873631 etcd-wrapper[1394]: {"level":"info","ts":1707808649.8735042,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 07:17:29.873631 etcd-wrapper[1394]: {"level":"info","ts":1707808649.8735588,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"49763bcc2047480393d5cf17ae17c0c9"} Feb 13 07:17:29.873631 etcd-wrapper[1394]: {"level":"warn","ts":1707808649.8735816,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 07:17:29.873631 etcd-wrapper[1394]: {"level":"warn","ts":1707808649.8735893,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 07:17:29.873631 etcd-wrapper[1394]: {"level":"warn","ts":1707808649.873596,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 07:17:29.873631 etcd-wrapper[1394]: {"level":"warn","ts":1707808649.8736022,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 07:17:29.873861 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.873Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.13:2379"]} Feb 13 07:17:29.873861 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.873Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 07:17:29.874105 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.873Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 07:17:29.874140 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.874Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"49763bcc2047480393d5cf17ae17c0c9","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"49763bcc2047480393d5cf17ae17c0c9=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 07:17:29.875099 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.874Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"711.921µs"} Feb 13 07:17:29.876243 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.876Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 07:17:29.876243 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 07:17:29.876243 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 07:17:29.876243 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 07:17:29.876243 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 07:17:29.876243 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.876Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 07:17:29.876854 etcd-wrapper[1394]: {"level":"warn","ts":"2024-02-13T07:17:29.876Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 07:17:29.877320 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.877Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 07:17:29.877582 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.877Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 07:17:29.877805 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.877Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 07:17:29.877852 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.877Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 07:17:29.877870 systemd[1]: var-lib-docker-overlay2-d5ff556bc5624306d81c8a3948bed6701b6e220bf82334f0c42525ac3cadedc1-merged.mount: Deactivated successfully. Feb 13 07:17:29.878407 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.878Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 07:17:29.878541 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.878Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 07:17:29.879359 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.879Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 07:17:29.879359 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.879Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 07:17:29.879359 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:29.879Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 07:17:29.988280 sshd[1406]: Failed password for root from 218.92.0.76 port 43191 ssh2 Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 07:17:30.477965 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 07:17:30.478910 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.477Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 07:17:30.479059 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.478Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 07:17:30.479059 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.478Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:49763bcc2047480393d5cf17ae17c0c9 ClientURLs:[http://10.67.80.13:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 07:17:30.479059 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.478Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 07:17:30.479059 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.478Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 07:17:30.479501 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.478Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 07:17:30.479501 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.479Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 07:17:30.479768 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.479Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 07:17:30.479689 systemd[1]: Started etcd-member.service. Feb 13 07:17:30.480499 systemd[1]: Reached target multi-user.target. Feb 13 07:17:30.480898 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T07:17:30.480Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 07:17:30.483998 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 07:17:30.488832 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 07:17:30.488911 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 07:17:30.489057 systemd[1]: Startup finished in 1.851s (kernel) + 6.206s (initrd) + 18.450s (userspace) = 26.508s. Feb 13 07:17:33.345672 sshd[1406]: Failed password for root from 218.92.0.76 port 43191 ssh2 Feb 13 07:17:37.230388 sshd[1406]: Failed password for root from 218.92.0.76 port 43191 ssh2 Feb 13 07:17:38.229393 sshd[1406]: Received disconnect from 218.92.0.76 port 43191:11: [preauth] Feb 13 07:17:38.229393 sshd[1406]: Disconnected from authenticating user root 218.92.0.76 port 43191 [preauth] Feb 13 07:17:38.229947 sshd[1406]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 07:17:38.232030 systemd[1]: sshd@0-147.75.90.233:22-218.92.0.76:43191.service: Deactivated successfully. Feb 13 07:17:38.334393 systemd[1]: Started sshd@4-147.75.90.233:22-218.92.0.76:34555.service. Feb 13 07:17:38.956287 systemd[1]: Started sshd@5-147.75.90.233:22-139.178.68.195:52296.service. Feb 13 07:17:38.983315 sshd[1643]: Accepted publickey for core from 139.178.68.195 port 52296 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:38.984174 sshd[1643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:38.987195 systemd-logind[1156]: New session 6 of user core. Feb 13 07:17:38.987807 systemd[1]: Started session-6.scope. Feb 13 07:17:39.041718 sshd[1643]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:39.043470 systemd[1]: sshd@5-147.75.90.233:22-139.178.68.195:52296.service: Deactivated successfully. Feb 13 07:17:39.043902 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 07:17:39.044224 systemd-logind[1156]: Session 6 logged out. Waiting for processes to exit. Feb 13 07:17:39.044731 systemd[1]: Started sshd@6-147.75.90.233:22-139.178.68.195:52308.service. Feb 13 07:17:39.045122 systemd-logind[1156]: Removed session 6. Feb 13 07:17:39.071928 sshd[1649]: Accepted publickey for core from 139.178.68.195 port 52308 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:39.072817 sshd[1649]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:39.076018 systemd-logind[1156]: New session 7 of user core. Feb 13 07:17:39.076718 systemd[1]: Started session-7.scope. Feb 13 07:17:39.129550 sshd[1649]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:39.131148 systemd[1]: sshd@6-147.75.90.233:22-139.178.68.195:52308.service: Deactivated successfully. Feb 13 07:17:39.131445 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 07:17:39.131858 systemd-logind[1156]: Session 7 logged out. Waiting for processes to exit. Feb 13 07:17:39.132291 systemd[1]: Started sshd@7-147.75.90.233:22-139.178.68.195:52314.service. Feb 13 07:17:39.132783 systemd-logind[1156]: Removed session 7. Feb 13 07:17:39.160366 sshd[1655]: Accepted publickey for core from 139.178.68.195 port 52314 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:39.161315 sshd[1655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:39.164435 systemd-logind[1156]: New session 8 of user core. Feb 13 07:17:39.165239 systemd[1]: Started session-8.scope. Feb 13 07:17:39.231538 sshd[1655]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:39.238171 systemd[1]: sshd@7-147.75.90.233:22-139.178.68.195:52314.service: Deactivated successfully. Feb 13 07:17:39.239802 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 07:17:39.241536 systemd-logind[1156]: Session 8 logged out. Waiting for processes to exit. Feb 13 07:17:39.244093 systemd[1]: Started sshd@8-147.75.90.233:22-139.178.68.195:52322.service. Feb 13 07:17:39.246504 systemd-logind[1156]: Removed session 8. Feb 13 07:17:39.284867 sshd[1640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 07:17:39.309997 sshd[1661]: Accepted publickey for core from 139.178.68.195 port 52322 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:39.313149 sshd[1661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:39.323534 systemd-logind[1156]: New session 9 of user core. Feb 13 07:17:39.325932 systemd[1]: Started session-9.scope. Feb 13 07:17:39.436713 sudo[1664]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 07:17:39.437315 sudo[1664]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 07:17:39.459932 dbus-daemon[1126]: \xd0-\xff,\xd0U: received setenforce notice (enforcing=1170054160) Feb 13 07:17:39.464850 sudo[1664]: pam_unix(sudo:session): session closed for user root Feb 13 07:17:39.469868 sshd[1661]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:39.476926 systemd[1]: sshd@8-147.75.90.233:22-139.178.68.195:52322.service: Deactivated successfully. Feb 13 07:17:39.478628 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 07:17:39.480389 systemd-logind[1156]: Session 9 logged out. Waiting for processes to exit. Feb 13 07:17:39.483077 systemd[1]: Started sshd@9-147.75.90.233:22-139.178.68.195:52338.service. Feb 13 07:17:39.485449 systemd-logind[1156]: Removed session 9. Feb 13 07:17:39.541878 sshd[1668]: Accepted publickey for core from 139.178.68.195 port 52338 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:39.544165 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:39.551535 systemd-logind[1156]: New session 10 of user core. Feb 13 07:17:39.553191 systemd[1]: Started session-10.scope. Feb 13 07:17:39.623888 sudo[1672]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 07:17:39.623997 sudo[1672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 07:17:39.625853 sudo[1672]: pam_unix(sudo:session): session closed for user root Feb 13 07:17:39.628146 sudo[1671]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 07:17:39.628253 sudo[1671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 07:17:39.633711 systemd[1]: Stopping audit-rules.service... Feb 13 07:17:39.633000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 07:17:39.634516 auditctl[1675]: No rules Feb 13 07:17:39.634672 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 07:17:39.634784 systemd[1]: Stopped audit-rules.service. Feb 13 07:17:39.635663 systemd[1]: Starting audit-rules.service... Feb 13 07:17:39.639896 kernel: kauditd_printk_skb: 96 callbacks suppressed Feb 13 07:17:39.639934 kernel: audit: type=1305 audit(1707808659.633:135): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 07:17:39.645325 augenrules[1692]: No rules Feb 13 07:17:39.645664 systemd[1]: Finished audit-rules.service. Feb 13 07:17:39.646050 sudo[1671]: pam_unix(sudo:session): session closed for user root Feb 13 07:17:39.646801 sshd[1668]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:39.648105 systemd[1]: sshd@9-147.75.90.233:22-139.178.68.195:52338.service: Deactivated successfully. Feb 13 07:17:39.648450 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 07:17:39.648848 systemd-logind[1156]: Session 10 logged out. Waiting for processes to exit. Feb 13 07:17:39.649364 systemd-logind[1156]: Removed session 10. Feb 13 07:17:39.633000 audit[1675]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc77b8e1b0 a2=420 a3=0 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:39.686515 kernel: audit: type=1300 audit(1707808659.633:135): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc77b8e1b0 a2=420 a3=0 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:39.686589 kernel: audit: type=1327 audit(1707808659.633:135): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 07:17:39.633000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 07:17:39.688395 systemd[1]: Started sshd@10-147.75.90.233:22-139.178.68.195:52354.service. Feb 13 07:17:39.696100 kernel: audit: type=1131 audit(1707808659.634:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.718559 kernel: audit: type=1130 audit(1707808659.645:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.741065 kernel: audit: type=1106 audit(1707808659.645:138): pid=1671 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.645000 audit[1671]: USER_END pid=1671 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.767162 kernel: audit: type=1104 audit(1707808659.645:139): pid=1671 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.645000 audit[1671]: CRED_DISP pid=1671 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.790790 kernel: audit: type=1106 audit(1707808659.646:140): pid=1668 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.646000 audit[1668]: USER_END pid=1668 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.823104 kernel: audit: type=1104 audit(1707808659.646:141): pid=1668 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.646000 audit[1668]: CRED_DISP pid=1668 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.849159 kernel: audit: type=1131 audit(1707808659.647:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.233:22-139.178.68.195:52338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.90.233:22-139.178.68.195:52338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.854917 sshd[1698]: Accepted publickey for core from 139.178.68.195 port 52354 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:39.856788 sshd[1698]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:39.858995 systemd-logind[1156]: New session 11 of user core. Feb 13 07:17:39.859416 systemd[1]: Started session-11.scope. Feb 13 07:17:39.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.233:22-139.178.68.195:52354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.854000 audit[1698]: USER_ACCT pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.856000 audit[1698]: CRED_ACQ pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.856000 audit[1698]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d1e0770 a2=3 a3=0 items=0 ppid=1 pid=1698 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:39.856000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 07:17:39.861000 audit[1698]: USER_START pid=1698 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.861000 audit[1700]: CRED_ACQ pid=1700 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.918440 sshd[1698]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:39.918000 audit[1698]: USER_END pid=1698 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.918000 audit[1698]: CRED_DISP pid=1698 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.920072 systemd[1]: sshd@10-147.75.90.233:22-139.178.68.195:52354.service: Deactivated successfully. Feb 13 07:17:39.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.90.233:22-139.178.68.195:52354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.920440 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 07:17:39.920894 systemd-logind[1156]: Session 11 logged out. Waiting for processes to exit. Feb 13 07:17:39.921457 systemd[1]: Started sshd@11-147.75.90.233:22-139.178.68.195:52368.service. Feb 13 07:17:39.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.233:22-139.178.68.195:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:39.922025 systemd-logind[1156]: Removed session 11. Feb 13 07:17:39.950000 audit[1706]: USER_ACCT pid=1706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.951386 sshd[1706]: Accepted publickey for core from 139.178.68.195 port 52368 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 07:17:39.951000 audit[1706]: CRED_ACQ pid=1706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.951000 audit[1706]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec79a11d0 a2=3 a3=0 items=0 ppid=1 pid=1706 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 07:17:39.951000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 07:17:39.952721 sshd[1706]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 07:17:39.957895 systemd-logind[1156]: New session 12 of user core. Feb 13 07:17:39.959125 systemd[1]: Started session-12.scope. Feb 13 07:17:39.969000 audit[1706]: USER_START pid=1706 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:39.972000 audit[1708]: CRED_ACQ pid=1708 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:40.313600 sshd[1706]: pam_unix(sshd:session): session closed for user core Feb 13 07:17:40.313000 audit[1706]: USER_END pid=1706 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:40.313000 audit[1706]: CRED_DISP pid=1706 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 07:17:40.315081 systemd[1]: sshd@11-147.75.90.233:22-139.178.68.195:52368.service: Deactivated successfully. Feb 13 07:17:40.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.90.233:22-139.178.68.195:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:40.315494 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 07:17:40.315916 systemd-logind[1156]: Session 12 logged out. Waiting for processes to exit. Feb 13 07:17:40.316431 systemd-logind[1156]: Removed session 12. Feb 13 07:17:41.156774 sshd[1640]: Failed password for root from 218.92.0.76 port 34555 ssh2 Feb 13 07:17:42.727000 audit[1640]: ANOM_LOGIN_FAILURES pid=1640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:42.727000 audit[1640]: USER_AUTH pid=1640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:42.728012 sshd[1640]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:17:44.679789 sshd[1640]: Failed password for root from 218.92.0.76 port 34555 ssh2 Feb 13 07:17:46.169000 audit[1640]: USER_AUTH pid=1640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:46.176056 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 13 07:17:46.176094 kernel: audit: type=1100 audit(1707808666.169:163): pid=1640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:48.337629 sshd[1640]: Failed password for root from 218.92.0.76 port 34555 ssh2 Feb 13 07:17:49.616926 sshd[1640]: Received disconnect from 218.92.0.76 port 34555:11: [preauth] Feb 13 07:17:49.616926 sshd[1640]: Disconnected from authenticating user root 218.92.0.76 port 34555 [preauth] Feb 13 07:17:49.617442 sshd[1640]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 07:17:49.619449 systemd[1]: sshd@4-147.75.90.233:22-218.92.0.76:34555.service: Deactivated successfully. Feb 13 07:17:49.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@4-147.75.90.233:22-218.92.0.76:34555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:49.696682 kernel: audit: type=1131 audit(1707808669.619:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@4-147.75.90.233:22-218.92.0.76:34555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:49.742340 systemd[1]: Started sshd@12-147.75.90.233:22-218.92.0.76:62812.service. Feb 13 07:17:49.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.233:22-218.92.0.76:62812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:49.821684 kernel: audit: type=1130 audit(1707808669.741:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.233:22-218.92.0.76:62812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:17:50.656705 sshd[1731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 07:17:50.656000 audit[1731]: USER_AUTH pid=1731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:50.739678 kernel: audit: type=1100 audit(1707808670.656:166): pid=1731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:52.704420 sshd[1731]: Failed password for root from 218.92.0.76 port 62812 ssh2 Feb 13 07:17:54.090000 audit[1731]: USER_AUTH pid=1731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:54.176684 kernel: audit: type=1100 audit(1707808674.090:167): pid=1731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:56.022325 sshd[1731]: Failed password for root from 218.92.0.76 port 62812 ssh2 Feb 13 07:17:56.629393 systemd-timesyncd[1114]: Contacted time server [2604:a880:1:20::17:5001]:123 (2.flatcar.pool.ntp.org). Feb 13 07:17:56.629541 systemd-timesyncd[1114]: Initial clock synchronization to Tue 2024-02-13 07:17:56.728611 UTC. Feb 13 07:17:57.533000 audit[1731]: USER_AUTH pid=1731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:57.622693 kernel: audit: type=1100 audit(1707808677.533:168): pid=1731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 07:17:59.875881 sshd[1731]: Failed password for root from 218.92.0.76 port 62812 ssh2 Feb 13 07:18:00.975612 sshd[1731]: Received disconnect from 218.92.0.76 port 62812:11: [preauth] Feb 13 07:18:00.975612 sshd[1731]: Disconnected from authenticating user root 218.92.0.76 port 62812 [preauth] Feb 13 07:18:00.976118 sshd[1731]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 07:18:00.978232 systemd[1]: sshd@12-147.75.90.233:22-218.92.0.76:62812.service: Deactivated successfully. Feb 13 07:18:00.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.233:22-218.92.0.76:62812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:18:01.069620 kernel: audit: type=1131 audit(1707808680.977:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.90.233:22-218.92.0.76:62812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:18:03.987031 update_engine[1158]: I0213 07:18:03.986902 1158 update_attempter.cc:509] Updating boot flags... Feb 13 07:19:51.081669 update_engine[1158]: I0213 07:19:51.081552 1158 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 07:19:51.081669 update_engine[1158]: I0213 07:19:51.081634 1158 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 07:19:51.082745 update_engine[1158]: I0213 07:19:51.082384 1158 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 07:19:51.083458 update_engine[1158]: I0213 07:19:51.083384 1158 omaha_request_params.cc:62] Current group set to lts Feb 13 07:19:51.083808 update_engine[1158]: I0213 07:19:51.083729 1158 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 07:19:51.083808 update_engine[1158]: I0213 07:19:51.083755 1158 update_attempter.cc:643] Scheduling an action processor start. Feb 13 07:19:51.083808 update_engine[1158]: I0213 07:19:51.083801 1158 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 07:19:51.084175 update_engine[1158]: I0213 07:19:51.083894 1158 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 07:19:51.084175 update_engine[1158]: I0213 07:19:51.084101 1158 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 07:19:51.084175 update_engine[1158]: I0213 07:19:51.084122 1158 omaha_request_action.cc:271] Request: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: Feb 13 07:19:51.084175 update_engine[1158]: I0213 07:19:51.084134 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 07:19:51.085210 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 07:19:51.087465 update_engine[1158]: I0213 07:19:51.087390 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 07:19:51.087678 update_engine[1158]: E0213 07:19:51.087639 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 07:19:51.087716 update_engine[1158]: I0213 07:19:51.087709 1158 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 07:20:00.991103 update_engine[1158]: I0213 07:20:00.990988 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 07:20:00.992045 update_engine[1158]: I0213 07:20:00.991441 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 07:20:00.992045 update_engine[1158]: E0213 07:20:00.991693 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 07:20:00.992045 update_engine[1158]: I0213 07:20:00.991866 1158 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 07:20:10.991311 update_engine[1158]: I0213 07:20:10.991196 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 07:20:10.992220 update_engine[1158]: I0213 07:20:10.991681 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 07:20:10.992220 update_engine[1158]: E0213 07:20:10.991886 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 07:20:10.992220 update_engine[1158]: I0213 07:20:10.992056 1158 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 07:20:20.991680 update_engine[1158]: I0213 07:20:20.991459 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 07:20:20.992568 update_engine[1158]: I0213 07:20:20.991997 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 07:20:20.992568 update_engine[1158]: E0213 07:20:20.992208 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 07:20:20.992568 update_engine[1158]: I0213 07:20:20.992355 1158 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 07:20:20.992568 update_engine[1158]: I0213 07:20:20.992372 1158 omaha_request_action.cc:621] Omaha request response: Feb 13 07:20:20.992568 update_engine[1158]: E0213 07:20:20.992545 1158 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992585 1158 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992602 1158 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992610 1158 update_attempter.cc:306] Processing Done. Feb 13 07:20:20.993030 update_engine[1158]: E0213 07:20:20.992635 1158 update_attempter.cc:619] Update failed. Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992645 1158 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992653 1158 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992663 1158 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992812 1158 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992861 1158 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992872 1158 omaha_request_action.cc:271] Request: Feb 13 07:20:20.993030 update_engine[1158]: Feb 13 07:20:20.993030 update_engine[1158]: Feb 13 07:20:20.993030 update_engine[1158]: Feb 13 07:20:20.993030 update_engine[1158]: Feb 13 07:20:20.993030 update_engine[1158]: Feb 13 07:20:20.993030 update_engine[1158]: Feb 13 07:20:20.993030 update_engine[1158]: I0213 07:20:20.992882 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993163 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 07:20:20.994619 update_engine[1158]: E0213 07:20:20.993328 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993460 1158 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993474 1158 omaha_request_action.cc:621] Omaha request response: Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993505 1158 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993517 1158 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993525 1158 update_attempter.cc:306] Processing Done. Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993532 1158 update_attempter.cc:310] Error event sent. Feb 13 07:20:20.994619 update_engine[1158]: I0213 07:20:20.993558 1158 update_check_scheduler.cc:74] Next update check in 46m4s Feb 13 07:20:20.995411 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 07:20:20.995411 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 07:21:45.908501 systemd[1]: Started sshd@13-147.75.90.233:22-172.105.128.11:37018.service. Feb 13 07:21:45.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.233:22-172.105.128.11:37018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:46.000684 kernel: audit: type=1130 audit(1707808905.908:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.233:22-172.105.128.11:37018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:48.396199 sshd[1764]: Connection closed by 172.105.128.11 port 37018 [preauth] Feb 13 07:21:48.398077 systemd[1]: sshd@13-147.75.90.233:22-172.105.128.11:37018.service: Deactivated successfully. Feb 13 07:21:48.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.233:22-172.105.128.11:37018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:48.469055 systemd[1]: Started sshd@14-147.75.90.233:22-172.105.128.11:37022.service. Feb 13 07:21:48.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.233:22-172.105.128.11:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:48.490487 kernel: audit: type=1131 audit(1707808908.398:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.90.233:22-172.105.128.11:37018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:48.490539 kernel: audit: type=1130 audit(1707808908.468:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.233:22-172.105.128.11:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:49.678808 sshd[1768]: kex_exchange_identification: read: Connection reset by peer Feb 13 07:21:49.678808 sshd[1768]: Connection reset by 172.105.128.11 port 37022 Feb 13 07:21:49.680243 systemd[1]: sshd@14-147.75.90.233:22-172.105.128.11:37022.service: Deactivated successfully. Feb 13 07:21:49.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.233:22-172.105.128.11:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:49.773534 kernel: audit: type=1131 audit(1707808909.680:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.90.233:22-172.105.128.11:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:49.774981 systemd[1]: Started sshd@15-147.75.90.233:22-172.105.128.11:37038.service. Feb 13 07:21:49.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.233:22-172.105.128.11:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:49.867558 kernel: audit: type=1130 audit(1707808909.774:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.233:22-172.105.128.11:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:50.947886 sshd[1771]: kex_exchange_identification: read: Connection reset by peer Feb 13 07:21:50.947886 sshd[1771]: Connection reset by 172.105.128.11 port 37038 Feb 13 07:21:50.949366 systemd[1]: sshd@15-147.75.90.233:22-172.105.128.11:37038.service: Deactivated successfully. Feb 13 07:21:50.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.233:22-172.105.128.11:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:21:51.042681 kernel: audit: type=1131 audit(1707808910.949:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.90.233:22-172.105.128.11:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:24:58.795274 systemd[1]: Started sshd@16-147.75.90.233:22-218.92.0.27:39043.service. Feb 13 07:24:58.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.233:22-218.92.0.27:39043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:24:58.887489 kernel: audit: type=1130 audit(1707809098.794:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.233:22-218.92.0.27:39043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:24:59.802972 sshd[1781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 07:24:59.802000 audit[1781]: USER_AUTH pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:24:59.894657 kernel: audit: type=1100 audit(1707809099.802:177): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:01.745017 sshd[1781]: Failed password for root from 218.92.0.27 port 39043 ssh2 Feb 13 07:25:03.253000 audit[1781]: USER_AUTH pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:03.346674 kernel: audit: type=1100 audit(1707809103.253:178): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:05.080431 sshd[1781]: Failed password for root from 218.92.0.27 port 39043 ssh2 Feb 13 07:25:06.707000 audit[1781]: USER_AUTH pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:06.800682 kernel: audit: type=1100 audit(1707809106.707:179): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:08.278525 sshd[1781]: Failed password for root from 218.92.0.27 port 39043 ssh2 Feb 13 07:25:08.508905 sshd[1781]: Received disconnect from 218.92.0.27 port 39043:11: [preauth] Feb 13 07:25:08.508905 sshd[1781]: Disconnected from authenticating user root 218.92.0.27 port 39043 [preauth] Feb 13 07:25:08.509416 sshd[1781]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 07:25:08.511429 systemd[1]: sshd@16-147.75.90.233:22-218.92.0.27:39043.service: Deactivated successfully. Feb 13 07:25:08.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.233:22-218.92.0.27:39043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:08.605689 kernel: audit: type=1131 audit(1707809108.511:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.90.233:22-218.92.0.27:39043 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:08.665878 systemd[1]: Started sshd@17-147.75.90.233:22-218.92.0.27:32340.service. Feb 13 07:25:08.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.233:22-218.92.0.27:32340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:08.758488 kernel: audit: type=1130 audit(1707809108.665:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.233:22-218.92.0.27:32340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:09.682790 sshd[1786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 07:25:09.682000 audit[1786]: USER_AUTH pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:09.775677 kernel: audit: type=1100 audit(1707809109.682:182): pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:11.664975 sshd[1786]: Failed password for root from 218.92.0.27 port 32340 ssh2 Feb 13 07:25:13.135000 audit[1786]: ANOM_LOGIN_FAILURES pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:13.136351 sshd[1786]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:25:13.135000 audit[1786]: USER_AUTH pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:13.292809 kernel: audit: type=2100 audit(1707809113.135:183): pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:13.292843 kernel: audit: type=1100 audit(1707809113.135:184): pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:15.002826 sshd[1786]: Failed password for root from 218.92.0.27 port 32340 ssh2 Feb 13 07:25:16.589000 audit[1786]: USER_AUTH pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:16.682674 kernel: audit: type=1100 audit(1707809116.589:185): pid=1786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:18.200279 sshd[1786]: Failed password for root from 218.92.0.27 port 32340 ssh2 Feb 13 07:25:18.393208 sshd[1786]: Received disconnect from 218.92.0.27 port 32340:11: [preauth] Feb 13 07:25:18.393208 sshd[1786]: Disconnected from authenticating user root 218.92.0.27 port 32340 [preauth] Feb 13 07:25:18.393759 sshd[1786]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 07:25:18.395751 systemd[1]: sshd@17-147.75.90.233:22-218.92.0.27:32340.service: Deactivated successfully. Feb 13 07:25:18.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.233:22-218.92.0.27:32340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:18.489689 kernel: audit: type=1131 audit(1707809118.395:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.90.233:22-218.92.0.27:32340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:18.548582 systemd[1]: Started sshd@18-147.75.90.233:22-218.92.0.27:22213.service. Feb 13 07:25:18.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.233:22-218.92.0.27:22213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:18.641687 kernel: audit: type=1130 audit(1707809118.548:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.233:22-218.92.0.27:22213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:19.588854 sshd[1791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 07:25:19.588000 audit[1791]: USER_AUTH pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:19.681651 kernel: audit: type=1100 audit(1707809119.588:188): pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:21.610933 sshd[1791]: Failed password for root from 218.92.0.27 port 22213 ssh2 Feb 13 07:25:23.050000 audit[1791]: USER_AUTH pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:23.143618 kernel: audit: type=1100 audit(1707809123.050:189): pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:25.620469 sshd[1791]: Failed password for root from 218.92.0.27 port 22213 ssh2 Feb 13 07:25:26.516000 audit[1791]: USER_AUTH pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:26.608670 kernel: audit: type=1100 audit(1707809126.516:190): pid=1791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 07:25:28.498609 sshd[1791]: Failed password for root from 218.92.0.27 port 22213 ssh2 Feb 13 07:25:29.970743 sshd[1791]: Received disconnect from 218.92.0.27 port 22213:11: [preauth] Feb 13 07:25:29.970743 sshd[1791]: Disconnected from authenticating user root 218.92.0.27 port 22213 [preauth] Feb 13 07:25:29.971267 sshd[1791]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 07:25:29.973266 systemd[1]: sshd@18-147.75.90.233:22-218.92.0.27:22213.service: Deactivated successfully. Feb 13 07:25:29.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.233:22-218.92.0.27:22213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:25:30.066689 kernel: audit: type=1131 audit(1707809129.972:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.90.233:22-218.92.0.27:22213 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:28:19.977344 systemd[1]: Started sshd@19-147.75.90.233:22-61.177.172.136:33875.service. Feb 13 07:28:19.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.233:22-61.177.172.136:33875 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:28:20.070685 kernel: audit: type=1130 audit(1707809299.976:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.233:22-61.177.172.136:33875 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:30:19.982730 sshd[1799]: Timeout before authentication for 61.177.172.136 port 33875 Feb 13 07:30:19.984297 systemd[1]: sshd@19-147.75.90.233:22-61.177.172.136:33875.service: Deactivated successfully. Feb 13 07:30:19.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.233:22-61.177.172.136:33875 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:30:20.078664 kernel: audit: type=1131 audit(1707809419.983:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.90.233:22-61.177.172.136:33875 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:09.171090 systemd[1]: Started sshd@20-147.75.90.233:22-180.101.88.197:40891.service. Feb 13 07:32:09.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.233:22-180.101.88.197:40891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:09.171889 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 07:32:09.264490 kernel: audit: type=1130 audit(1707809529.170:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.233:22-180.101.88.197:40891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:09.268876 systemd-tmpfiles[1806]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 07:32:09.269084 systemd-tmpfiles[1806]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 07:32:09.269798 systemd-tmpfiles[1806]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 07:32:09.280113 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 07:32:09.280201 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 07:32:09.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:09.281033 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 07:32:09.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:09.457373 kernel: audit: type=1130 audit(1707809529.279:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:09.457406 kernel: audit: type=1131 audit(1707809529.279:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:10.277293 sshd[1805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 07:32:10.277000 audit[1805]: USER_AUTH pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:10.370677 kernel: audit: type=1100 audit(1707809530.277:197): pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:12.721409 sshd[1805]: Failed password for root from 180.101.88.197 port 40891 ssh2 Feb 13 07:32:13.730000 audit[1805]: USER_AUTH pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:13.823545 kernel: audit: type=1100 audit(1707809533.730:198): pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:15.587660 sshd[1805]: Failed password for root from 180.101.88.197 port 40891 ssh2 Feb 13 07:32:17.184000 audit[1805]: USER_AUTH pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:17.277534 kernel: audit: type=1100 audit(1707809537.184:199): pid=1805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:18.590047 sshd[1805]: Failed password for root from 180.101.88.197 port 40891 ssh2 Feb 13 07:32:18.988462 sshd[1805]: Received disconnect from 180.101.88.197 port 40891:11: [preauth] Feb 13 07:32:18.988462 sshd[1805]: Disconnected from authenticating user root 180.101.88.197 port 40891 [preauth] Feb 13 07:32:18.988985 sshd[1805]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 07:32:18.991007 systemd[1]: sshd@20-147.75.90.233:22-180.101.88.197:40891.service: Deactivated successfully. Feb 13 07:32:18.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.233:22-180.101.88.197:40891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:19.085690 kernel: audit: type=1131 audit(1707809538.990:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.90.233:22-180.101.88.197:40891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:19.146881 systemd[1]: Started sshd@21-147.75.90.233:22-180.101.88.197:51872.service. Feb 13 07:32:19.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.233:22-180.101.88.197:51872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:19.239660 kernel: audit: type=1130 audit(1707809539.146:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.233:22-180.101.88.197:51872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:20.175683 sshd[1812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 07:32:20.175000 audit[1812]: USER_AUTH pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:20.268538 kernel: audit: type=1100 audit(1707809540.175:202): pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:21.992415 sshd[1812]: Failed password for root from 180.101.88.197 port 51872 ssh2 Feb 13 07:32:23.630000 audit[1812]: ANOM_LOGIN_FAILURES pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:23.631062 sshd[1812]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:32:23.630000 audit[1812]: USER_AUTH pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:23.788152 kernel: audit: type=2100 audit(1707809543.630:203): pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:23.788185 kernel: audit: type=1100 audit(1707809543.630:204): pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:25.527754 sshd[1812]: Failed password for root from 180.101.88.197 port 51872 ssh2 Feb 13 07:32:27.085000 audit[1812]: USER_AUTH pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:27.179673 kernel: audit: type=1100 audit(1707809547.085:205): pid=1812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:28.531420 sshd[1812]: Failed password for root from 180.101.88.197 port 51872 ssh2 Feb 13 07:32:28.891359 sshd[1812]: Received disconnect from 180.101.88.197 port 51872:11: [preauth] Feb 13 07:32:28.891359 sshd[1812]: Disconnected from authenticating user root 180.101.88.197 port 51872 [preauth] Feb 13 07:32:28.891905 sshd[1812]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 07:32:28.893944 systemd[1]: sshd@21-147.75.90.233:22-180.101.88.197:51872.service: Deactivated successfully. Feb 13 07:32:28.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.233:22-180.101.88.197:51872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:28.987528 kernel: audit: type=1131 audit(1707809548.893:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.90.233:22-180.101.88.197:51872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:29.041843 systemd[1]: Started sshd@22-147.75.90.233:22-180.101.88.197:16518.service. Feb 13 07:32:29.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.233:22-180.101.88.197:16518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:29.134528 kernel: audit: type=1130 audit(1707809549.041:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.233:22-180.101.88.197:16518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:30.057936 sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 07:32:30.057000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:30.151676 kernel: audit: type=1100 audit(1707809550.057:208): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:31.914473 sshd[1817]: Failed password for root from 180.101.88.197 port 16518 ssh2 Feb 13 07:32:33.509000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:33.603673 kernel: audit: type=1100 audit(1707809553.509:209): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:35.777740 sshd[1817]: Failed password for root from 180.101.88.197 port 16518 ssh2 Feb 13 07:32:36.962000 audit[1817]: USER_AUTH pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:37.056680 kernel: audit: type=1100 audit(1707809556.962:210): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 07:32:38.644064 sshd[1817]: Failed password for root from 180.101.88.197 port 16518 ssh2 Feb 13 07:32:40.416898 sshd[1817]: Received disconnect from 180.101.88.197 port 16518:11: [preauth] Feb 13 07:32:40.416898 sshd[1817]: Disconnected from authenticating user root 180.101.88.197 port 16518 [preauth] Feb 13 07:32:40.417420 sshd[1817]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 07:32:40.419428 systemd[1]: sshd@22-147.75.90.233:22-180.101.88.197:16518.service: Deactivated successfully. Feb 13 07:32:40.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.233:22-180.101.88.197:16518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:32:40.513693 kernel: audit: type=1131 audit(1707809560.419:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.90.233:22-180.101.88.197:16518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:17.701716 systemd[1]: Started sshd@23-147.75.90.233:22-218.92.0.24:48389.service. Feb 13 07:33:17.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.233:22-218.92.0.24:48389 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:17.795588 kernel: audit: type=1130 audit(1707809597.701:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.233:22-218.92.0.24:48389 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:20.312248 sshd[1825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:33:20.312000 audit[1825]: USER_AUTH pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:20.405657 kernel: audit: type=1100 audit(1707809600.312:213): pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:22.700876 sshd[1825]: Failed password for root from 218.92.0.24 port 48389 ssh2 Feb 13 07:33:23.928000 audit[1825]: USER_AUTH pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:24.021666 kernel: audit: type=1100 audit(1707809603.928:214): pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:26.061603 sshd[1825]: Failed password for root from 218.92.0.24 port 48389 ssh2 Feb 13 07:33:27.549000 audit[1825]: USER_AUTH pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:27.642673 kernel: audit: type=1100 audit(1707809607.549:215): pid=1825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:29.229846 sshd[1825]: Failed password for root from 218.92.0.24 port 48389 ssh2 Feb 13 07:33:31.183150 sshd[1825]: Received disconnect from 218.92.0.24 port 48389:11: [preauth] Feb 13 07:33:31.183150 sshd[1825]: Disconnected from authenticating user root 218.92.0.24 port 48389 [preauth] Feb 13 07:33:31.183682 sshd[1825]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:33:31.185714 systemd[1]: sshd@23-147.75.90.233:22-218.92.0.24:48389.service: Deactivated successfully. Feb 13 07:33:31.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.233:22-218.92.0.24:48389 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:31.279673 kernel: audit: type=1131 audit(1707809611.185:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.90.233:22-218.92.0.24:48389 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:32.540339 systemd[1]: Started sshd@24-147.75.90.233:22-218.92.0.24:56606.service. Feb 13 07:33:32.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.233:22-218.92.0.24:56606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:32.633683 kernel: audit: type=1130 audit(1707809612.539:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.233:22-218.92.0.24:56606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:37.976861 sshd[1830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:33:37.975000 audit[1830]: USER_AUTH pid=1830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:38.069658 kernel: audit: type=1100 audit(1707809617.975:218): pid=1830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:39.698239 sshd[1830]: Failed password for root from 218.92.0.24 port 56606 ssh2 Feb 13 07:33:43.594000 audit[1830]: USER_AUTH pid=1830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:43.688678 kernel: audit: type=1100 audit(1707809623.594:219): pid=1830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:33:45.477052 sshd[1830]: Failed password for root from 218.92.0.24 port 56606 ssh2 Feb 13 07:33:53.596285 sshd[1830]: Received disconnect from 218.92.0.24 port 56606:11: [preauth] Feb 13 07:33:53.596285 sshd[1830]: Disconnected from authenticating user root 218.92.0.24 port 56606 [preauth] Feb 13 07:33:53.596834 sshd[1830]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:33:53.598838 systemd[1]: sshd@24-147.75.90.233:22-218.92.0.24:56606.service: Deactivated successfully. Feb 13 07:33:53.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.233:22-218.92.0.24:56606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:53.692671 kernel: audit: type=1131 audit(1707809633.597:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.90.233:22-218.92.0.24:56606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:54.931821 systemd[1]: Started sshd@25-147.75.90.233:22-218.92.0.24:37339.service. Feb 13 07:33:54.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.233:22-218.92.0.24:37339 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:33:55.024493 kernel: audit: type=1130 audit(1707809634.930:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.233:22-218.92.0.24:37339 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:34:06.516178 sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:34:06.514000 audit[1834]: USER_AUTH pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:06.608675 kernel: audit: type=1100 audit(1707809646.514:222): pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:08.222070 sshd[1834]: Failed password for root from 218.92.0.24 port 37339 ssh2 Feb 13 07:34:10.158000 audit[1834]: USER_AUTH pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:10.252671 kernel: audit: type=1100 audit(1707809650.158:223): pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:12.412811 sshd[1834]: Failed password for root from 218.92.0.24 port 37339 ssh2 Feb 13 07:34:14.491000 audit[1834]: USER_AUTH pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:14.584669 kernel: audit: type=1100 audit(1707809654.491:224): pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:16.629536 sshd[1834]: Failed password for root from 218.92.0.24 port 37339 ssh2 Feb 13 07:34:19.549327 sshd[1834]: Received disconnect from 218.92.0.24 port 37339:11: [preauth] Feb 13 07:34:19.549327 sshd[1834]: Disconnected from authenticating user root 218.92.0.24 port 37339 [preauth] Feb 13 07:34:19.549857 sshd[1834]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:34:19.551892 systemd[1]: sshd@25-147.75.90.233:22-218.92.0.24:37339.service: Deactivated successfully. Feb 13 07:34:19.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.233:22-218.92.0.24:37339 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:34:19.645701 kernel: audit: type=1131 audit(1707809659.550:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.90.233:22-218.92.0.24:37339 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:34:19.904998 systemd[1]: Started sshd@26-147.75.90.233:22-218.92.0.24:14024.service. Feb 13 07:34:19.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.233:22-218.92.0.24:14024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:34:19.998684 kernel: audit: type=1130 audit(1707809659.903:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.233:22-218.92.0.24:14024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:34:33.995526 sshd[1838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:34:33.994000 audit[1838]: USER_AUTH pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:34.087681 kernel: audit: type=1100 audit(1707809673.994:227): pid=1838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:34:36.073009 sshd[1838]: Failed password for root from 218.92.0.24 port 14024 ssh2 Feb 13 07:34:37.617373 sshd[1838]: Received disconnect from 218.92.0.24 port 14024:11: [preauth] Feb 13 07:34:37.617373 sshd[1838]: Disconnected from authenticating user root 218.92.0.24 port 14024 [preauth] Feb 13 07:34:37.619852 systemd[1]: sshd@26-147.75.90.233:22-218.92.0.24:14024.service: Deactivated successfully. Feb 13 07:34:37.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.233:22-218.92.0.24:14024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:34:37.713798 kernel: audit: type=1131 audit(1707809677.618:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.90.233:22-218.92.0.24:14024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:37:41.870026 systemd[1]: Started sshd@27-147.75.90.233:22-190.92.203.136:52036.service. Feb 13 07:37:41.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.233:22-190.92.203.136:52036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:37:41.874921 sshd[1843]: kex_exchange_identification: Connection closed by remote host Feb 13 07:37:41.874921 sshd[1843]: Connection closed by 190.92.203.136 port 52036 Feb 13 07:37:41.875117 systemd[1]: sshd@27-147.75.90.233:22-190.92.203.136:52036.service: Deactivated successfully. Feb 13 07:37:41.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.233:22-190.92.203.136:52036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:37:42.055321 kernel: audit: type=1130 audit(1707809861.869:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.233:22-190.92.203.136:52036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:37:42.055355 kernel: audit: type=1131 audit(1707809861.874:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.90.233:22-190.92.203.136:52036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:40:15.781810 systemd[1]: Started sshd@28-147.75.90.233:22-178.62.106.230:49435.service. Feb 13 07:40:15.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.233:22-178.62.106.230:49435 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:40:15.874543 kernel: audit: type=1130 audit(1707810015.780:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.233:22-178.62.106.230:49435 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:40:15.942583 sshd[1849]: kex_exchange_identification: Connection closed by remote host Feb 13 07:40:15.942583 sshd[1849]: Connection closed by 178.62.106.230 port 49435 Feb 13 07:40:15.943043 systemd[1]: sshd@28-147.75.90.233:22-178.62.106.230:49435.service: Deactivated successfully. Feb 13 07:40:15.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.233:22-178.62.106.230:49435 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:40:16.034533 kernel: audit: type=1131 audit(1707810015.941:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.90.233:22-178.62.106.230:49435 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:43:04.068354 systemd[1]: Started sshd@29-147.75.90.233:22-85.209.11.254:22378.service. Feb 13 07:43:04.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.233:22-85.209.11.254:22378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:43:04.161671 kernel: audit: type=1130 audit(1707810184.066:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.233:22-85.209.11.254:22378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:43:05.653027 sshd[1856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 user=operator Feb 13 07:43:05.651000 audit[1856]: USER_AUTH pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="operator" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 07:43:05.746671 kernel: audit: type=1100 audit(1707810185.651:234): pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="operator" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 07:43:08.021329 sshd[1856]: Failed password for operator from 85.209.11.254 port 22378 ssh2 Feb 13 07:43:10.209165 sshd[1856]: Connection closed by authenticating user operator 85.209.11.254 port 22378 [preauth] Feb 13 07:43:10.211896 systemd[1]: sshd@29-147.75.90.233:22-85.209.11.254:22378.service: Deactivated successfully. Feb 13 07:43:10.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.233:22-85.209.11.254:22378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:43:10.304549 kernel: audit: type=1131 audit(1707810190.210:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.90.233:22-85.209.11.254:22378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:00.583453 systemd[1]: Started sshd@30-147.75.90.233:22-218.92.0.113:40999.service. Feb 13 07:45:00.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.233:22-218.92.0.113:40999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:00.676622 kernel: audit: type=1130 audit(1707810300.582:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.233:22-218.92.0.113:40999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:01.656814 sshd[1861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 07:45:01.655000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:01.749676 kernel: audit: type=1100 audit(1707810301.655:237): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:02.946428 sshd[1861]: Failed password for root from 218.92.0.113 port 40999 ssh2 Feb 13 07:45:03.473000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:03.567671 kernel: audit: type=1100 audit(1707810303.473:238): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:06.038509 sshd[1861]: Failed password for root from 218.92.0.113 port 40999 ssh2 Feb 13 07:45:06.930000 audit[1861]: USER_AUTH pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:07.024671 kernel: audit: type=1100 audit(1707810306.930:239): pid=1861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:08.908681 sshd[1861]: Failed password for root from 218.92.0.113 port 40999 ssh2 Feb 13 07:45:10.399509 sshd[1861]: Received disconnect from 218.92.0.113 port 40999:11: [preauth] Feb 13 07:45:10.399509 sshd[1861]: Disconnected from authenticating user root 218.92.0.113 port 40999 [preauth] Feb 13 07:45:10.400015 sshd[1861]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 07:45:10.402041 systemd[1]: sshd@30-147.75.90.233:22-218.92.0.113:40999.service: Deactivated successfully. Feb 13 07:45:10.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.233:22-218.92.0.113:40999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:10.495688 kernel: audit: type=1131 audit(1707810310.401:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.90.233:22-218.92.0.113:40999 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:10.600682 systemd[1]: Started sshd@31-147.75.90.233:22-218.92.0.113:52604.service. Feb 13 07:45:10.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.233:22-218.92.0.113:52604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:10.694681 kernel: audit: type=1130 audit(1707810310.599:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.233:22-218.92.0.113:52604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:12.272360 sshd[1867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 07:45:12.271000 audit[1867]: USER_AUTH pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:12.365672 kernel: audit: type=1100 audit(1707810312.271:242): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:14.073701 sshd[1867]: Failed password for root from 218.92.0.113 port 52604 ssh2 Feb 13 07:45:15.746000 audit[1867]: ANOM_LOGIN_FAILURES pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:15.747733 sshd[1867]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:45:15.746000 audit[1867]: USER_AUTH pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:15.903746 kernel: audit: type=2100 audit(1707810315.746:243): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:15.903779 kernel: audit: type=1100 audit(1707810315.746:244): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:17.628882 sshd[1867]: Failed password for root from 218.92.0.113 port 52604 ssh2 Feb 13 07:45:19.221000 audit[1867]: USER_AUTH pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:19.315674 kernel: audit: type=1100 audit(1707810319.221:245): pid=1867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:20.983690 sshd[1867]: Failed password for root from 218.92.0.113 port 52604 ssh2 Feb 13 07:45:22.697429 sshd[1867]: Received disconnect from 218.92.0.113 port 52604:11: [preauth] Feb 13 07:45:22.697429 sshd[1867]: Disconnected from authenticating user root 218.92.0.113 port 52604 [preauth] Feb 13 07:45:22.698019 sshd[1867]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 07:45:22.700061 systemd[1]: sshd@31-147.75.90.233:22-218.92.0.113:52604.service: Deactivated successfully. Feb 13 07:45:22.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.233:22-218.92.0.113:52604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:22.793677 kernel: audit: type=1131 audit(1707810322.699:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.90.233:22-218.92.0.113:52604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:22.821275 systemd[1]: Started sshd@32-147.75.90.233:22-218.92.0.113:22038.service. Feb 13 07:45:22.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.233:22-218.92.0.113:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:22.914686 kernel: audit: type=1130 audit(1707810322.819:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.233:22-218.92.0.113:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:23.810967 sshd[1871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 07:45:23.809000 audit[1871]: USER_AUTH pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:23.903691 kernel: audit: type=1100 audit(1707810323.809:248): pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:25.787746 sshd[1871]: Failed password for root from 218.92.0.113 port 22038 ssh2 Feb 13 07:45:27.258000 audit[1871]: USER_AUTH pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:27.352668 kernel: audit: type=1100 audit(1707810327.258:249): pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:29.121459 sshd[1871]: Failed password for root from 218.92.0.113 port 22038 ssh2 Feb 13 07:45:30.708000 audit[1871]: USER_AUTH pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:30.802671 kernel: audit: type=1100 audit(1707810330.708:250): pid=1871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 07:45:32.982600 sshd[1871]: Failed password for root from 218.92.0.113 port 22038 ssh2 Feb 13 07:45:34.160946 sshd[1871]: Received disconnect from 218.92.0.113 port 22038:11: [preauth] Feb 13 07:45:34.160946 sshd[1871]: Disconnected from authenticating user root 218.92.0.113 port 22038 [preauth] Feb 13 07:45:34.161466 sshd[1871]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 07:45:34.163499 systemd[1]: sshd@32-147.75.90.233:22-218.92.0.113:22038.service: Deactivated successfully. Feb 13 07:45:34.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.233:22-218.92.0.113:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:45:34.257684 kernel: audit: type=1131 audit(1707810334.162:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.90.233:22-218.92.0.113:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:15.620740 systemd[1]: Started sshd@33-147.75.90.233:22-218.92.0.112:36656.service. Feb 13 07:47:15.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.233:22-218.92.0.112:36656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:15.713546 kernel: audit: type=1130 audit(1707810435.620:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.233:22-218.92.0.112:36656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:16.593084 sshd[1876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 07:47:16.592000 audit[1876]: ANOM_LOGIN_FAILURES pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:16.593331 sshd[1876]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:47:16.593000 audit[1876]: USER_AUTH pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:16.750455 kernel: audit: type=2100 audit(1707810436.592:253): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:16.750487 kernel: audit: type=1100 audit(1707810436.593:254): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:18.750672 sshd[1876]: Failed password for root from 218.92.0.112 port 36656 ssh2 Feb 13 07:47:20.038000 audit[1876]: ANOM_LOGIN_FAILURES pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:20.039140 sshd[1876]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:47:20.038000 audit[1876]: USER_AUTH pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:20.195669 kernel: audit: type=2100 audit(1707810440.038:255): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:20.195701 kernel: audit: type=1100 audit(1707810440.038:256): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:21.745013 sshd[1876]: Failed password for root from 218.92.0.112 port 36656 ssh2 Feb 13 07:47:23.485000 audit[1876]: ANOM_LOGIN_FAILURES pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:23.486307 sshd[1876]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:47:23.485000 audit[1876]: USER_AUTH pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:23.643640 kernel: audit: type=2100 audit(1707810443.485:257): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:23.643675 kernel: audit: type=1100 audit(1707810443.485:258): pid=1876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:25.603415 sshd[1876]: Failed password for root from 218.92.0.112 port 36656 ssh2 Feb 13 07:47:26.934231 sshd[1876]: Received disconnect from 218.92.0.112 port 36656:11: [preauth] Feb 13 07:47:26.934231 sshd[1876]: Disconnected from authenticating user root 218.92.0.112 port 36656 [preauth] Feb 13 07:47:26.934779 sshd[1876]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 07:47:26.936839 systemd[1]: sshd@33-147.75.90.233:22-218.92.0.112:36656.service: Deactivated successfully. Feb 13 07:47:26.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.233:22-218.92.0.112:36656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:27.030545 kernel: audit: type=1131 audit(1707810446.936:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.90.233:22-218.92.0.112:36656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:27.102053 systemd[1]: Started sshd@34-147.75.90.233:22-218.92.0.112:62535.service. Feb 13 07:47:27.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.233:22-218.92.0.112:62535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:27.195547 kernel: audit: type=1130 audit(1707810447.101:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.233:22-218.92.0.112:62535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:28.138397 sshd[1881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 07:47:28.138000 audit[1881]: ANOM_LOGIN_FAILURES pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:28.138676 sshd[1881]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:47:28.138000 audit[1881]: USER_AUTH pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:28.294992 kernel: audit: type=2100 audit(1707810448.138:261): pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:28.295017 kernel: audit: type=1100 audit(1707810448.138:262): pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:30.611819 sshd[1881]: Failed password for root from 218.92.0.112 port 62535 ssh2 Feb 13 07:47:31.593000 audit[1881]: ANOM_LOGIN_FAILURES pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:31.594015 sshd[1881]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:47:31.593000 audit[1881]: USER_AUTH pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:31.751389 kernel: audit: type=2100 audit(1707810451.593:263): pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:31.751420 kernel: audit: type=1100 audit(1707810451.593:264): pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:33.142425 sshd[1881]: Failed password for root from 218.92.0.112 port 62535 ssh2 Feb 13 07:47:33.399000 audit[1881]: USER_AUTH pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:33.492663 kernel: audit: type=1100 audit(1707810453.399:265): pid=1881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:35.557131 sshd[1881]: Failed password for root from 218.92.0.112 port 62535 ssh2 Feb 13 07:47:36.854883 sshd[1881]: Received disconnect from 218.92.0.112 port 62535:11: [preauth] Feb 13 07:47:36.854883 sshd[1881]: Disconnected from authenticating user root 218.92.0.112 port 62535 [preauth] Feb 13 07:47:36.855402 sshd[1881]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 07:47:36.857451 systemd[1]: sshd@34-147.75.90.233:22-218.92.0.112:62535.service: Deactivated successfully. Feb 13 07:47:36.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.233:22-218.92.0.112:62535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:36.951689 kernel: audit: type=1131 audit(1707810456.857:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.90.233:22-218.92.0.112:62535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:37.008576 systemd[1]: Started sshd@35-147.75.90.233:22-218.92.0.112:12547.service. Feb 13 07:47:37.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.233:22-218.92.0.112:12547 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:37.101488 kernel: audit: type=1130 audit(1707810457.008:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.233:22-218.92.0.112:12547 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:38.028065 sshd[1885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 07:47:38.027000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:38.121680 kernel: audit: type=1100 audit(1707810458.027:268): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:39.874288 sshd[1885]: Failed password for root from 218.92.0.112 port 12547 ssh2 Feb 13 07:47:41.481000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:41.575545 kernel: audit: type=1100 audit(1707810461.481:269): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:43.739843 sshd[1885]: Failed password for root from 218.92.0.112 port 12547 ssh2 Feb 13 07:47:44.935000 audit[1885]: USER_AUTH pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:45.028524 kernel: audit: type=1100 audit(1707810464.935:270): pid=1885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 07:47:46.938005 sshd[1885]: Failed password for root from 218.92.0.112 port 12547 ssh2 Feb 13 07:47:48.389805 sshd[1885]: Received disconnect from 218.92.0.112 port 12547:11: [preauth] Feb 13 07:47:48.389805 sshd[1885]: Disconnected from authenticating user root 218.92.0.112 port 12547 [preauth] Feb 13 07:47:48.390343 sshd[1885]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 07:47:48.392361 systemd[1]: sshd@35-147.75.90.233:22-218.92.0.112:12547.service: Deactivated successfully. Feb 13 07:47:48.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.233:22-218.92.0.112:12547 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:47:48.486557 kernel: audit: type=1131 audit(1707810468.392:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.90.233:22-218.92.0.112:12547 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:17.916422 systemd[1]: Started sshd@36-147.75.90.233:22-218.92.0.118:46690.service. Feb 13 07:49:17.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.233:22-218.92.0.118:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:18.009516 kernel: audit: type=1130 audit(1707810557.915:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.233:22-218.92.0.118:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:18.921204 sshd[1894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 07:49:18.920000 audit[1894]: USER_AUTH pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:19.014783 kernel: audit: type=1100 audit(1707810558.920:273): pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:20.827816 sshd[1894]: Failed password for root from 218.92.0.118 port 46690 ssh2 Feb 13 07:49:22.371000 audit[1894]: USER_AUTH pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:22.465676 kernel: audit: type=1100 audit(1707810562.371:274): pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:24.494902 sshd[1894]: Failed password for root from 218.92.0.118 port 46690 ssh2 Feb 13 07:49:25.822000 audit[1894]: USER_AUTH pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:25.916561 kernel: audit: type=1100 audit(1707810565.822:275): pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:27.690229 sshd[1894]: Failed password for root from 218.92.0.118 port 46690 ssh2 Feb 13 07:49:29.274840 sshd[1894]: Received disconnect from 218.92.0.118 port 46690:11: [preauth] Feb 13 07:49:29.274840 sshd[1894]: Disconnected from authenticating user root 218.92.0.118 port 46690 [preauth] Feb 13 07:49:29.275367 sshd[1894]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 07:49:29.277413 systemd[1]: sshd@36-147.75.90.233:22-218.92.0.118:46690.service: Deactivated successfully. Feb 13 07:49:29.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.233:22-218.92.0.118:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:29.371541 kernel: audit: type=1131 audit(1707810569.276:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.90.233:22-218.92.0.118:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:29.454110 systemd[1]: Started sshd@37-147.75.90.233:22-218.92.0.118:14388.service. Feb 13 07:49:29.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.233:22-218.92.0.118:14388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:29.547551 kernel: audit: type=1130 audit(1707810569.452:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.233:22-218.92.0.118:14388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:30.544072 sshd[1900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 07:49:30.542000 audit[1900]: USER_AUTH pid=1900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:30.637673 kernel: audit: type=1100 audit(1707810570.542:278): pid=1900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:32.430660 sshd[1900]: Failed password for root from 218.92.0.118 port 14388 ssh2 Feb 13 07:49:34.008000 audit[1900]: USER_AUTH pid=1900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:34.102685 kernel: audit: type=1100 audit(1707810574.008:279): pid=1900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:36.111601 sshd[1900]: Failed password for root from 218.92.0.118 port 14388 ssh2 Feb 13 07:49:37.473000 audit[1900]: USER_AUTH pid=1900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:37.567678 kernel: audit: type=1100 audit(1707810577.473:280): pid=1900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:39.321448 sshd[1900]: Failed password for root from 218.92.0.118 port 14388 ssh2 Feb 13 07:49:40.939962 sshd[1900]: Received disconnect from 218.92.0.118 port 14388:11: [preauth] Feb 13 07:49:40.939962 sshd[1900]: Disconnected from authenticating user root 218.92.0.118 port 14388 [preauth] Feb 13 07:49:40.940469 sshd[1900]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 07:49:40.942482 systemd[1]: sshd@37-147.75.90.233:22-218.92.0.118:14388.service: Deactivated successfully. Feb 13 07:49:40.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.233:22-218.92.0.118:14388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:41.036688 kernel: audit: type=1131 audit(1707810580.941:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.90.233:22-218.92.0.118:14388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:41.099026 systemd[1]: Started sshd@38-147.75.90.233:22-218.92.0.118:34521.service. Feb 13 07:49:41.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.233:22-218.92.0.118:34521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:41.192694 kernel: audit: type=1130 audit(1707810581.097:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.233:22-218.92.0.118:34521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:42.152551 sshd[1904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 07:49:42.151000 audit[1904]: USER_AUTH pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:42.245673 kernel: audit: type=1100 audit(1707810582.151:283): pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:44.018882 sshd[1904]: Failed password for root from 218.92.0.118 port 34521 ssh2 Feb 13 07:49:45.610000 audit[1904]: USER_AUTH pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:45.704674 kernel: audit: type=1100 audit(1707810585.610:284): pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:47.889866 sshd[1904]: Failed password for root from 218.92.0.118 port 34521 ssh2 Feb 13 07:49:49.070000 audit[1904]: USER_AUTH pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:49.164667 kernel: audit: type=1100 audit(1707810589.070:285): pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 07:49:50.897750 sshd[1904]: Failed password for root from 218.92.0.118 port 34521 ssh2 Feb 13 07:49:52.530825 sshd[1904]: Received disconnect from 218.92.0.118 port 34521:11: [preauth] Feb 13 07:49:52.530825 sshd[1904]: Disconnected from authenticating user root 218.92.0.118 port 34521 [preauth] Feb 13 07:49:52.531335 sshd[1904]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 07:49:52.533439 systemd[1]: sshd@38-147.75.90.233:22-218.92.0.118:34521.service: Deactivated successfully. Feb 13 07:49:52.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.233:22-218.92.0.118:34521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:49:52.627688 kernel: audit: type=1131 audit(1707810592.532:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.90.233:22-218.92.0.118:34521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:50:30.271423 systemd[1]: Started sshd@39-147.75.90.233:22-141.98.11.90:52650.service. Feb 13 07:50:30.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.233:22-141.98.11.90:52650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:50:30.364687 kernel: audit: type=1130 audit(1707810630.270:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.233:22-141.98.11.90:52650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:50:31.832742 sshd[1909]: Connection closed by authenticating user nobody 141.98.11.90 port 52650 [preauth] Feb 13 07:50:31.831000 audit[1909]: USER_ERR pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 07:50:31.835407 systemd[1]: sshd@39-147.75.90.233:22-141.98.11.90:52650.service: Deactivated successfully. Feb 13 07:50:31.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.233:22-141.98.11.90:52650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:50:32.016416 kernel: audit: type=1109 audit(1707810631.831:288): pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 07:50:32.016447 kernel: audit: type=1131 audit(1707810631.834:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.90.233:22-141.98.11.90:52650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:52:45.472005 systemd[1]: Started sshd@40-147.75.90.233:22-218.92.0.24:39287.service. Feb 13 07:52:45.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.233:22-218.92.0.24:39287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:52:45.565681 kernel: audit: type=1130 audit(1707810765.471:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.233:22-218.92.0.24:39287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:52:50.657466 sshd[1913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:52:50.657000 audit[1913]: USER_AUTH pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:52:50.748648 kernel: audit: type=1100 audit(1707810770.657:291): pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:52:52.333398 sshd[1913]: Failed password for root from 218.92.0.24 port 39287 ssh2 Feb 13 07:52:54.332000 audit[1913]: USER_AUTH pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:52:54.425682 kernel: audit: type=1100 audit(1707810774.332:292): pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:52:56.223860 sshd[1913]: Failed password for root from 218.92.0.24 port 39287 ssh2 Feb 13 07:52:58.700000 audit[1913]: USER_AUTH pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:52:58.792517 kernel: audit: type=1100 audit(1707810778.700:293): pid=1913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:00.476022 sshd[1913]: Failed password for root from 218.92.0.24 port 39287 ssh2 Feb 13 07:53:02.374411 sshd[1913]: Received disconnect from 218.92.0.24 port 39287:11: [preauth] Feb 13 07:53:02.374411 sshd[1913]: Disconnected from authenticating user root 218.92.0.24 port 39287 [preauth] Feb 13 07:53:02.375011 sshd[1913]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:53:02.377110 systemd[1]: sshd@40-147.75.90.233:22-218.92.0.24:39287.service: Deactivated successfully. Feb 13 07:53:02.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.233:22-218.92.0.24:39287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:02.471686 kernel: audit: type=1131 audit(1707810782.377:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.90.233:22-218.92.0.24:39287 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:02.734852 systemd[1]: Started sshd@41-147.75.90.233:22-218.92.0.24:57930.service. Feb 13 07:53:02.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.233:22-218.92.0.24:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:02.827490 kernel: audit: type=1130 audit(1707810782.734:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.233:22-218.92.0.24:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:10.801061 sshd[1924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:53:10.800000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:10.898667 kernel: audit: type=1100 audit(1707810790.800:296): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:12.556800 sshd[1924]: Failed password for root from 218.92.0.24 port 57930 ssh2 Feb 13 07:53:14.452000 audit[1924]: ANOM_LOGIN_FAILURES pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:14.453174 sshd[1924]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 07:53:14.452000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:14.608756 kernel: audit: type=2100 audit(1707810794.452:297): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:14.608786 kernel: audit: type=1100 audit(1707810794.452:298): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:16.424866 sshd[1924]: Failed password for root from 218.92.0.24 port 57930 ssh2 Feb 13 07:53:18.084000 audit[1924]: USER_AUTH pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:18.176526 kernel: audit: type=1100 audit(1707810798.084:299): pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:19.936770 sshd[1924]: Failed password for root from 218.92.0.24 port 57930 ssh2 Feb 13 07:53:21.722457 sshd[1924]: Received disconnect from 218.92.0.24 port 57930:11: [preauth] Feb 13 07:53:21.722457 sshd[1924]: Disconnected from authenticating user root 218.92.0.24 port 57930 [preauth] Feb 13 07:53:21.722989 sshd[1924]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:53:21.725021 systemd[1]: sshd@41-147.75.90.233:22-218.92.0.24:57930.service: Deactivated successfully. Feb 13 07:53:21.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.233:22-218.92.0.24:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:21.818664 kernel: audit: type=1131 audit(1707810801.725:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.90.233:22-218.92.0.24:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:22.078197 systemd[1]: Started sshd@42-147.75.90.233:22-218.92.0.24:35274.service. Feb 13 07:53:22.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.233:22-218.92.0.24:35274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:22.171489 kernel: audit: type=1130 audit(1707810802.078:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.233:22-218.92.0.24:35274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:25.244728 sshd[1931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:53:25.244000 audit[1931]: USER_AUTH pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:25.336531 kernel: audit: type=1100 audit(1707810805.244:302): pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:27.392346 sshd[1931]: Failed password for root from 218.92.0.24 port 35274 ssh2 Feb 13 07:53:29.568000 audit[1931]: USER_AUTH pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:29.662677 kernel: audit: type=1100 audit(1707810809.568:303): pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:31.265529 sshd[1931]: Failed password for root from 218.92.0.24 port 35274 ssh2 Feb 13 07:53:34.466000 audit[1931]: USER_AUTH pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:34.560675 kernel: audit: type=1100 audit(1707810814.466:304): pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 07:53:36.849853 sshd[1931]: Failed password for root from 218.92.0.24 port 35274 ssh2 Feb 13 07:53:38.102784 sshd[1931]: Received disconnect from 218.92.0.24 port 35274:11: [preauth] Feb 13 07:53:38.102784 sshd[1931]: Disconnected from authenticating user root 218.92.0.24 port 35274 [preauth] Feb 13 07:53:38.103335 sshd[1931]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 07:53:38.105352 systemd[1]: sshd@42-147.75.90.233:22-218.92.0.24:35274.service: Deactivated successfully. Feb 13 07:53:38.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.233:22-218.92.0.24:35274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:53:38.198508 kernel: audit: type=1131 audit(1707810818.104:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.90.233:22-218.92.0.24:35274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:55:16.251239 systemd[1]: Started sshd@43-147.75.90.233:22-185.161.248.87:64001.service. Feb 13 07:55:16.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:55:16.343672 kernel: audit: type=1130 audit(1707810916.250:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:55:16.439697 sshd[1939]: kex_exchange_identification: Connection closed by remote host Feb 13 07:55:16.439697 sshd[1939]: Connection closed by 185.161.248.87 port 64001 Feb 13 07:55:16.440323 systemd[1]: sshd@43-147.75.90.233:22-185.161.248.87:64001.service: Deactivated successfully. Feb 13 07:55:16.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 07:55:16.534557 kernel: audit: type=1131 audit(1707810916.440:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.90.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:02:45.797615 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T08:02:45.796Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1146} Feb 13 08:02:45.817004 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T08:02:45.816Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1146,"took":"19.331797ms"} Feb 13 08:03:23.102320 systemd[1]: Started sshd@44-147.75.90.233:22-218.92.0.107:36098.service. Feb 13 08:03:23.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.233:22-218.92.0.107:36098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:23.195686 kernel: audit: type=1130 audit(1707811403.100:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.233:22-218.92.0.107:36098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:24.887920 sshd[1953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 08:03:24.886000 audit[1953]: USER_AUTH pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:24.980679 kernel: audit: type=1100 audit(1707811404.886:309): pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:27.266520 sshd[1953]: Failed password for root from 218.92.0.107 port 36098 ssh2 Feb 13 08:03:28.355000 audit[1953]: USER_AUTH pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:28.448679 kernel: audit: type=1100 audit(1707811408.355:310): pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:29.952375 sshd[1953]: Failed password for root from 218.92.0.107 port 36098 ssh2 Feb 13 08:03:30.172000 audit[1953]: USER_AUTH pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:30.267677 kernel: audit: type=1100 audit(1707811410.172:311): pid=1953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:32.376633 sshd[1953]: Failed password for root from 218.92.0.107 port 36098 ssh2 Feb 13 08:03:33.652172 sshd[1953]: Received disconnect from 218.92.0.107 port 36098:11: [preauth] Feb 13 08:03:33.652172 sshd[1953]: Disconnected from authenticating user root 218.92.0.107 port 36098 [preauth] Feb 13 08:03:33.652678 sshd[1953]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 08:03:33.654756 systemd[1]: sshd@44-147.75.90.233:22-218.92.0.107:36098.service: Deactivated successfully. Feb 13 08:03:33.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.233:22-218.92.0.107:36098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:33.748687 kernel: audit: type=1131 audit(1707811413.653:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.90.233:22-218.92.0.107:36098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:33.793314 systemd[1]: Started sshd@45-147.75.90.233:22-218.92.0.107:56365.service. Feb 13 08:03:33.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.233:22-218.92.0.107:56365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:33.886691 kernel: audit: type=1130 audit(1707811413.791:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.233:22-218.92.0.107:56365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:35.037337 sshd[1958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 08:03:35.036000 audit[1958]: USER_AUTH pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:35.129677 kernel: audit: type=1100 audit(1707811415.036:314): pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:37.260181 sshd[1958]: Failed password for root from 218.92.0.107 port 56365 ssh2 Feb 13 08:03:38.487000 audit[1958]: ANOM_LOGIN_FAILURES pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:38.489445 sshd[1958]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 08:03:38.488000 audit[1958]: USER_AUTH pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:38.644922 kernel: audit: type=2100 audit(1707811418.487:315): pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:38.644955 kernel: audit: type=1100 audit(1707811418.488:316): pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:40.123725 sshd[1958]: Failed password for root from 218.92.0.107 port 56365 ssh2 Feb 13 08:03:40.291000 audit[1958]: USER_AUTH pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:40.385676 kernel: audit: type=1100 audit(1707811420.291:317): pid=1958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:41.868368 sshd[1958]: Failed password for root from 218.92.0.107 port 56365 ssh2 Feb 13 08:03:42.096741 sshd[1958]: Received disconnect from 218.92.0.107 port 56365:11: [preauth] Feb 13 08:03:42.096741 sshd[1958]: Disconnected from authenticating user root 218.92.0.107 port 56365 [preauth] Feb 13 08:03:42.097293 sshd[1958]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 08:03:42.099331 systemd[1]: sshd@45-147.75.90.233:22-218.92.0.107:56365.service: Deactivated successfully. Feb 13 08:03:42.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.233:22-218.92.0.107:56365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:42.192490 kernel: audit: type=1131 audit(1707811422.098:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.90.233:22-218.92.0.107:56365 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:42.284590 systemd[1]: Started sshd@46-147.75.90.233:22-218.92.0.107:58742.service. Feb 13 08:03:42.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.233:22-218.92.0.107:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:42.376532 kernel: audit: type=1130 audit(1707811422.283:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.233:22-218.92.0.107:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:44.154657 sshd[1963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 08:03:44.153000 audit[1963]: USER_AUTH pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:44.246541 kernel: audit: type=1100 audit(1707811424.153:320): pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:45.278326 sshd[1963]: Failed password for root from 218.92.0.107 port 58742 ssh2 Feb 13 08:03:45.980000 audit[1963]: USER_AUTH pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:46.074561 kernel: audit: type=1100 audit(1707811425.980:321): pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:47.576724 sshd[1963]: Failed password for root from 218.92.0.107 port 58742 ssh2 Feb 13 08:03:47.808000 audit[1963]: USER_AUTH pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:47.902684 kernel: audit: type=1100 audit(1707811427.808:322): pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 08:03:50.012465 sshd[1963]: Failed password for root from 218.92.0.107 port 58742 ssh2 Feb 13 08:03:51.281217 sshd[1963]: Received disconnect from 218.92.0.107 port 58742:11: [preauth] Feb 13 08:03:51.281217 sshd[1963]: Disconnected from authenticating user root 218.92.0.107 port 58742 [preauth] Feb 13 08:03:51.281940 sshd[1963]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 08:03:51.284021 systemd[1]: sshd@46-147.75.90.233:22-218.92.0.107:58742.service: Deactivated successfully. Feb 13 08:03:51.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.233:22-218.92.0.107:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:03:51.376539 kernel: audit: type=1131 audit(1707811431.283:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.90.233:22-218.92.0.107:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:04:55.907465 systemd[1]: Started sshd@47-147.75.90.233:22-218.92.0.29:19336.service. Feb 13 08:04:55.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.233:22-218.92.0.29:19336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:04:56.000671 kernel: audit: type=1130 audit(1707811495.906:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.233:22-218.92.0.29:19336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:04:56.934776 sshd[1968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 08:04:56.933000 audit[1968]: USER_AUTH pid=1968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:04:57.027680 kernel: audit: type=1100 audit(1707811496.933:325): pid=1968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:04:59.277846 sshd[1968]: Failed password for root from 218.92.0.29 port 19336 ssh2 Feb 13 08:05:00.386000 audit[1968]: USER_AUTH pid=1968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:00.479669 kernel: audit: type=1100 audit(1707811500.386:326): pid=1968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:02.278877 sshd[1968]: Failed password for root from 218.92.0.29 port 19336 ssh2 Feb 13 08:05:03.840000 audit[1968]: USER_AUTH pid=1968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:03.934677 kernel: audit: type=1100 audit(1707811503.840:327): pid=1968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:05.476652 sshd[1968]: Failed password for root from 218.92.0.29 port 19336 ssh2 Feb 13 08:05:05.640305 sshd[1968]: Received disconnect from 218.92.0.29 port 19336:11: [preauth] Feb 13 08:05:05.640305 sshd[1968]: Disconnected from authenticating user root 218.92.0.29 port 19336 [preauth] Feb 13 08:05:05.640832 sshd[1968]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 08:05:05.643113 systemd[1]: sshd@47-147.75.90.233:22-218.92.0.29:19336.service: Deactivated successfully. Feb 13 08:05:05.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.233:22-218.92.0.29:19336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:05.734534 kernel: audit: type=1131 audit(1707811505.642:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.90.233:22-218.92.0.29:19336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:05.782819 systemd[1]: Started sshd@48-147.75.90.233:22-218.92.0.29:36639.service. Feb 13 08:05:05.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.233:22-218.92.0.29:36639 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:05.875578 kernel: audit: type=1130 audit(1707811505.781:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.233:22-218.92.0.29:36639 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:07.818448 sshd[1972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 08:05:07.817000 audit[1972]: USER_AUTH pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:07.910678 kernel: audit: type=1100 audit(1707811507.817:330): pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:10.005967 sshd[1972]: Failed password for root from 218.92.0.29 port 36639 ssh2 Feb 13 08:05:11.264000 audit[1972]: USER_AUTH pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:11.357539 kernel: audit: type=1100 audit(1707811511.264:331): pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:11.635183 systemd[1]: Started sshd@49-147.75.90.233:22-61.177.172.179:10984.service. Feb 13 08:05:11.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.233:22-61.177.172.179:10984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:11.728540 kernel: audit: type=1130 audit(1707811511.633:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.233:22-61.177.172.179:10984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:12.756263 sshd[1975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 13 08:05:12.755000 audit[1975]: USER_AUTH pid=1975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:12.849678 kernel: audit: type=1100 audit(1707811512.755:333): pid=1975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:13.333088 sshd[1972]: Failed password for root from 218.92.0.29 port 36639 ssh2 Feb 13 08:05:14.627926 sshd[1975]: Failed password for root from 61.177.172.179 port 10984 ssh2 Feb 13 08:05:14.712000 audit[1972]: USER_AUTH pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:14.805678 kernel: audit: type=1100 audit(1707811514.712:334): pid=1972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:16.225000 audit[1975]: USER_AUTH pid=1975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:16.318681 kernel: audit: type=1100 audit(1707811516.225:335): pid=1975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:16.859728 sshd[1972]: Failed password for root from 218.92.0.29 port 36639 ssh2 Feb 13 08:05:17.646727 sshd[1975]: Failed password for root from 61.177.172.179 port 10984 ssh2 Feb 13 08:05:18.046000 audit[1975]: USER_AUTH pid=1975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:18.139681 kernel: audit: type=1100 audit(1707811518.046:336): pid=1975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:18.152590 sshd[1972]: Received disconnect from 218.92.0.29 port 36639:11: [preauth] Feb 13 08:05:18.152590 sshd[1972]: Disconnected from authenticating user root 218.92.0.29 port 36639 [preauth] Feb 13 08:05:18.152737 sshd[1972]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 08:05:18.153270 systemd[1]: sshd@48-147.75.90.233:22-218.92.0.29:36639.service: Deactivated successfully. Feb 13 08:05:18.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.233:22-218.92.0.29:36639 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:18.245682 kernel: audit: type=1131 audit(1707811518.151:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.90.233:22-218.92.0.29:36639 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:18.289639 systemd[1]: Started sshd@50-147.75.90.233:22-218.92.0.29:17807.service. Feb 13 08:05:18.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.233:22-218.92.0.29:17807 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:18.380541 kernel: audit: type=1130 audit(1707811518.288:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.233:22-218.92.0.29:17807 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:19.606044 sshd[1979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 08:05:19.604000 audit[1979]: USER_AUTH pid=1979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:19.697688 kernel: audit: type=1100 audit(1707811519.604:339): pid=1979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:20.411325 sshd[1975]: Failed password for root from 61.177.172.179 port 10984 ssh2 Feb 13 08:05:21.504032 sshd[1975]: Received disconnect from 61.177.172.179 port 10984:11: [preauth] Feb 13 08:05:21.504032 sshd[1975]: Disconnected from authenticating user root 61.177.172.179 port 10984 [preauth] Feb 13 08:05:21.504563 sshd[1975]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 13 08:05:21.506947 systemd[1]: sshd@49-147.75.90.233:22-61.177.172.179:10984.service: Deactivated successfully. Feb 13 08:05:21.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.233:22-61.177.172.179:10984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:21.599687 kernel: audit: type=1131 audit(1707811521.505:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.90.233:22-61.177.172.179:10984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:21.659273 systemd[1]: Started sshd@51-147.75.90.233:22-61.177.172.179:20083.service. Feb 13 08:05:21.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.233:22-61.177.172.179:20083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:21.751489 kernel: audit: type=1130 audit(1707811521.657:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.233:22-61.177.172.179:20083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:21.772775 sshd[1979]: Failed password for root from 218.92.0.29 port 17807 ssh2 Feb 13 08:05:22.724407 sshd[1983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 13 08:05:22.723000 audit[1983]: USER_AUTH pid=1983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:22.817672 kernel: audit: type=1100 audit(1707811522.723:342): pid=1983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:23.049000 audit[1979]: USER_AUTH pid=1979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:23.150677 kernel: audit: type=1100 audit(1707811523.049:343): pid=1979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:24.636233 sshd[1983]: Failed password for root from 61.177.172.179 port 20083 ssh2 Feb 13 08:05:24.766678 sshd[1979]: Failed password for root from 218.92.0.29 port 17807 ssh2 Feb 13 08:05:26.188000 audit[1983]: USER_AUTH pid=1983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:26.282679 kernel: audit: type=1100 audit(1707811526.188:344): pid=1983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:26.487000 audit[1979]: USER_AUTH pid=1979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:26.587545 kernel: audit: type=1100 audit(1707811526.487:345): pid=1979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 08:05:28.316909 sshd[1983]: Failed password for root from 61.177.172.179 port 20083 ssh2 Feb 13 08:05:28.616371 sshd[1979]: Failed password for root from 218.92.0.29 port 17807 ssh2 Feb 13 08:05:29.644000 audit[1983]: USER_AUTH pid=1983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:29.738679 kernel: audit: type=1100 audit(1707811529.644:346): pid=1983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:29.937064 sshd[1979]: Received disconnect from 218.92.0.29 port 17807:11: [preauth] Feb 13 08:05:29.937064 sshd[1979]: Disconnected from authenticating user root 218.92.0.29 port 17807 [preauth] Feb 13 08:05:29.937529 sshd[1979]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 08:05:29.939502 systemd[1]: sshd@50-147.75.90.233:22-218.92.0.29:17807.service: Deactivated successfully. Feb 13 08:05:29.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.233:22-218.92.0.29:17807 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:30.032661 kernel: audit: type=1131 audit(1707811529.938:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.90.233:22-218.92.0.29:17807 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:31.852882 sshd[1983]: Failed password for root from 61.177.172.179 port 20083 ssh2 Feb 13 08:05:33.110653 sshd[1983]: Received disconnect from 61.177.172.179 port 20083:11: [preauth] Feb 13 08:05:33.110653 sshd[1983]: Disconnected from authenticating user root 61.177.172.179 port 20083 [preauth] Feb 13 08:05:33.111172 sshd[1983]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 13 08:05:33.113258 systemd[1]: sshd@51-147.75.90.233:22-61.177.172.179:20083.service: Deactivated successfully. Feb 13 08:05:33.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.233:22-61.177.172.179:20083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:33.206700 kernel: audit: type=1131 audit(1707811533.112:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.90.233:22-61.177.172.179:20083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:33.277238 systemd[1]: Started sshd@52-147.75.90.233:22-61.177.172.179:36502.service. Feb 13 08:05:33.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.233:22-61.177.172.179:36502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:33.368545 kernel: audit: type=1130 audit(1707811533.276:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.233:22-61.177.172.179:36502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:34.300552 sshd[1990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 13 08:05:34.299000 audit[1990]: USER_AUTH pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:34.393674 kernel: audit: type=1100 audit(1707811534.299:350): pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:36.192277 sshd[1990]: Failed password for root from 61.177.172.179 port 36502 ssh2 Feb 13 08:05:37.748000 audit[1990]: USER_AUTH pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:37.842679 kernel: audit: type=1100 audit(1707811537.748:351): pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:40.052739 sshd[1990]: Failed password for root from 61.177.172.179 port 36502 ssh2 Feb 13 08:05:41.206000 audit[1990]: USER_AUTH pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:41.299679 kernel: audit: type=1100 audit(1707811541.206:352): pid=1990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.179 addr=61.177.172.179 terminal=ssh res=failed' Feb 13 08:05:43.394977 sshd[1990]: Failed password for root from 61.177.172.179 port 36502 ssh2 Feb 13 08:05:44.665288 sshd[1990]: Received disconnect from 61.177.172.179 port 36502:11: [preauth] Feb 13 08:05:44.665288 sshd[1990]: Disconnected from authenticating user root 61.177.172.179 port 36502 [preauth] Feb 13 08:05:44.665833 sshd[1990]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.179 user=root Feb 13 08:05:44.667883 systemd[1]: sshd@52-147.75.90.233:22-61.177.172.179:36502.service: Deactivated successfully. Feb 13 08:05:44.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.233:22-61.177.172.179:36502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:05:44.761518 kernel: audit: type=1131 audit(1707811544.667:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.90.233:22-61.177.172.179:36502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:06:25.033160 update_engine[1158]: I0213 08:06:25.033049 1158 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 08:06:25.033160 update_engine[1158]: I0213 08:06:25.033125 1158 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.033814 1158 omaha_request_params.cc:62] Current group set to lts Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.034003 1158 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.034018 1158 update_attempter.cc:643] Scheduling an action processor start. Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.034049 1158 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.034247 1158 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.034265 1158 omaha_request_action.cc:271] Request: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: Feb 13 08:06:25.034320 update_engine[1158]: I0213 08:06:25.034274 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 08:06:25.035777 update_engine[1158]: I0213 08:06:25.034642 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 08:06:25.035777 update_engine[1158]: E0213 08:06:25.034843 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 08:06:25.035777 update_engine[1158]: I0213 08:06:25.034955 1158 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 08:06:25.036059 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 08:06:34.991405 update_engine[1158]: I0213 08:06:34.991286 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 08:06:34.992233 update_engine[1158]: I0213 08:06:34.991744 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 08:06:34.992233 update_engine[1158]: E0213 08:06:34.991936 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 08:06:34.992233 update_engine[1158]: I0213 08:06:34.992053 1158 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 08:06:44.991284 update_engine[1158]: I0213 08:06:44.991160 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 08:06:44.992104 update_engine[1158]: I0213 08:06:44.991652 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 08:06:44.992104 update_engine[1158]: E0213 08:06:44.991911 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 08:06:44.992104 update_engine[1158]: I0213 08:06:44.992069 1158 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 08:06:54.991412 update_engine[1158]: I0213 08:06:54.991204 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.991647 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 08:06:54.992199 update_engine[1158]: E0213 08:06:54.991833 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.991941 1158 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.991956 1158 omaha_request_action.cc:621] Omaha request response: Feb 13 08:06:54.992199 update_engine[1158]: E0213 08:06:54.992067 1158 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.992094 1158 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.992102 1158 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.992111 1158 update_attempter.cc:306] Processing Done. Feb 13 08:06:54.992199 update_engine[1158]: E0213 08:06:54.992136 1158 update_attempter.cc:619] Update failed. Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.992146 1158 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.992154 1158 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 08:06:54.992199 update_engine[1158]: I0213 08:06:54.992163 1158 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992314 1158 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992364 1158 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992374 1158 omaha_request_action.cc:271] Request: Feb 13 08:06:54.993335 update_engine[1158]: Feb 13 08:06:54.993335 update_engine[1158]: Feb 13 08:06:54.993335 update_engine[1158]: Feb 13 08:06:54.993335 update_engine[1158]: Feb 13 08:06:54.993335 update_engine[1158]: Feb 13 08:06:54.993335 update_engine[1158]: Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992384 1158 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992643 1158 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 08:06:54.993335 update_engine[1158]: E0213 08:06:54.992786 1158 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992885 1158 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992898 1158 omaha_request_action.cc:621] Omaha request response: Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992909 1158 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992918 1158 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992926 1158 update_attempter.cc:306] Processing Done. Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992934 1158 update_attempter.cc:310] Error event sent. Feb 13 08:06:54.993335 update_engine[1158]: I0213 08:06:54.992955 1158 update_check_scheduler.cc:74] Next update check in 46m33s Feb 13 08:06:54.995044 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 08:06:54.995044 locksmithd[1181]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 08:07:45.803941 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T08:07:45.803Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1746} Feb 13 08:07:45.819352 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T08:07:45.818Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1746,"took":"15.149833ms"} Feb 13 08:08:33.393065 systemd[1]: Started sshd@53-147.75.90.233:22-85.209.11.27:57144.service. Feb 13 08:08:33.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.233:22-85.209.11.27:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:08:33.485700 kernel: audit: type=1130 audit(1707811713.391:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.233:22-85.209.11.27:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:08:35.578006 sshd[2001]: Invalid user admin from 85.209.11.27 port 57144 Feb 13 08:08:35.835588 sshd[2001]: pam_faillock(sshd:auth): User unknown Feb 13 08:08:35.836733 sshd[2001]: pam_unix(sshd:auth): check pass; user unknown Feb 13 08:08:35.836822 sshd[2001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.27 Feb 13 08:08:35.837852 sshd[2001]: pam_faillock(sshd:auth): User unknown Feb 13 08:08:35.836000 audit[2001]: USER_AUTH pid=2001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 13 08:08:35.930674 kernel: audit: type=1100 audit(1707811715.836:355): pid=2001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 13 08:08:37.577684 sshd[2001]: Failed password for invalid user admin from 85.209.11.27 port 57144 ssh2 Feb 13 08:08:38.106908 sshd[2001]: Connection closed by invalid user admin 85.209.11.27 port 57144 [preauth] Feb 13 08:08:38.109408 systemd[1]: sshd@53-147.75.90.233:22-85.209.11.27:57144.service: Deactivated successfully. Feb 13 08:08:38.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.233:22-85.209.11.27:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:08:38.202543 kernel: audit: type=1131 audit(1707811718.108:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.90.233:22-85.209.11.27:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:10:53.920724 systemd[1]: Started sshd@54-147.75.90.233:22-61.177.172.136:54796.service. Feb 13 08:10:53.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.233:22-61.177.172.136:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:10:54.013677 kernel: audit: type=1130 audit(1707811853.919:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.233:22-61.177.172.136:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:45.808319 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T08:12:45.807Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2303} Feb 13 08:12:45.810790 etcd-wrapper[1394]: {"level":"info","ts":"2024-02-13T08:12:45.810Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2303,"took":"2.199795ms"} Feb 13 08:12:50.756981 systemd[1]: Started sshd@55-147.75.90.233:22-141.98.11.169:45658.service. Feb 13 08:12:50.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.233:22-141.98.11.169:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:50.850666 kernel: audit: type=1130 audit(1707811970.755:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.233:22-141.98.11.169:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:51.595372 sshd[2010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:12:51.594000 audit[2010]: USER_AUTH pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:12:51.687530 kernel: audit: type=1100 audit(1707811971.594:359): pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:12:53.145687 sshd[2010]: Failed password for root from 141.98.11.169 port 45658 ssh2 Feb 13 08:12:53.415679 sshd[2010]: Connection closed by authenticating user root 141.98.11.169 port 45658 [preauth] Feb 13 08:12:53.418063 systemd[1]: sshd@55-147.75.90.233:22-141.98.11.169:45658.service: Deactivated successfully. Feb 13 08:12:53.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.233:22-141.98.11.169:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:53.511689 kernel: audit: type=1131 audit(1707811973.417:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.90.233:22-141.98.11.169:45658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:53.586813 systemd[1]: Started sshd@56-147.75.90.233:22-141.98.11.169:44770.service. Feb 13 08:12:53.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.233:22-141.98.11.169:44770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:53.678505 kernel: audit: type=1130 audit(1707811973.585:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.233:22-141.98.11.169:44770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:53.925838 sshd[2007]: Timeout before authentication for 61.177.172.136 port 54796 Feb 13 08:12:53.927225 systemd[1]: sshd@54-147.75.90.233:22-61.177.172.136:54796.service: Deactivated successfully. Feb 13 08:12:53.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.233:22-61.177.172.136:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:54.025674 kernel: audit: type=1131 audit(1707811973.926:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.90.233:22-61.177.172.136:54796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:54.428038 sshd[2014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:12:54.426000 audit[2014]: USER_AUTH pid=2014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:12:54.520674 kernel: audit: type=1100 audit(1707811974.426:363): pid=2014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:12:56.725949 sshd[2014]: Failed password for root from 141.98.11.169 port 44770 ssh2 Feb 13 08:12:58.010676 sshd[2014]: Connection closed by authenticating user root 141.98.11.169 port 44770 [preauth] Feb 13 08:12:58.013268 systemd[1]: sshd@56-147.75.90.233:22-141.98.11.169:44770.service: Deactivated successfully. Feb 13 08:12:58.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.233:22-141.98.11.169:44770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:58.105542 kernel: audit: type=1131 audit(1707811978.012:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.90.233:22-141.98.11.169:44770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:58.210966 systemd[1]: Started sshd@57-147.75.90.233:22-141.98.11.169:45034.service. Feb 13 08:12:58.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.233:22-141.98.11.169:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:58.303657 kernel: audit: type=1130 audit(1707811978.209:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.233:22-141.98.11.169:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:12:59.081822 sshd[2020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:12:59.080000 audit[2020]: USER_AUTH pid=2020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:12:59.174553 kernel: audit: type=1100 audit(1707811979.080:366): pid=2020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:01.063884 sshd[2020]: Failed password for root from 141.98.11.169 port 45034 ssh2 Feb 13 08:13:02.552106 sshd[2020]: Connection closed by authenticating user root 141.98.11.169 port 45034 [preauth] Feb 13 08:13:02.554541 systemd[1]: sshd@57-147.75.90.233:22-141.98.11.169:45034.service: Deactivated successfully. Feb 13 08:13:02.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.233:22-141.98.11.169:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:02.647684 kernel: audit: type=1131 audit(1707811982.553:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.90.233:22-141.98.11.169:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:02.721252 systemd[1]: Started sshd@58-147.75.90.233:22-141.98.11.169:48806.service. Feb 13 08:13:02.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.233:22-141.98.11.169:48806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:02.814679 kernel: audit: type=1130 audit(1707811982.719:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.233:22-141.98.11.169:48806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:03.589769 sshd[2026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:03.588000 audit[2026]: USER_AUTH pid=2026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:03.682658 kernel: audit: type=1100 audit(1707811983.588:369): pid=2026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:05.456226 sshd[2026]: Failed password for root from 141.98.11.169 port 48806 ssh2 Feb 13 08:13:07.153108 sshd[2026]: Connection closed by authenticating user root 141.98.11.169 port 48806 [preauth] Feb 13 08:13:07.155536 systemd[1]: sshd@58-147.75.90.233:22-141.98.11.169:48806.service: Deactivated successfully. Feb 13 08:13:07.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.233:22-141.98.11.169:48806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:07.248530 kernel: audit: type=1131 audit(1707811987.154:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.90.233:22-141.98.11.169:48806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:07.339319 systemd[1]: Started sshd@59-147.75.90.233:22-141.98.11.169:52750.service. Feb 13 08:13:07.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.233:22-141.98.11.169:52750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:07.431512 kernel: audit: type=1130 audit(1707811987.337:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.233:22-141.98.11.169:52750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:08.225088 sshd[2030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:08.223000 audit[2030]: ANOM_LOGIN_FAILURES pid=2030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:08.225334 sshd[2030]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 08:13:08.223000 audit[2030]: USER_AUTH pid=2030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:08.380607 kernel: audit: type=2100 audit(1707811988.223:372): pid=2030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:08.380639 kernel: audit: type=1100 audit(1707811988.223:373): pid=2030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:10.442865 sshd[2030]: Failed password for root from 141.98.11.169 port 52750 ssh2 Feb 13 08:13:11.796644 sshd[2030]: Connection closed by authenticating user root 141.98.11.169 port 52750 [preauth] Feb 13 08:13:11.799124 systemd[1]: sshd@59-147.75.90.233:22-141.98.11.169:52750.service: Deactivated successfully. Feb 13 08:13:11.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.233:22-141.98.11.169:52750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:11.892689 kernel: audit: type=1131 audit(1707811991.798:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.90.233:22-141.98.11.169:52750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:11.996453 systemd[1]: Started sshd@60-147.75.90.233:22-141.98.11.169:58796.service. Feb 13 08:13:11.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.233:22-141.98.11.169:58796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:12.089490 kernel: audit: type=1130 audit(1707811991.995:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.233:22-141.98.11.169:58796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:12.853588 sshd[2035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:12.852000 audit[2035]: USER_AUTH pid=2035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:12.946659 kernel: audit: type=1100 audit(1707811992.852:376): pid=2035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:14.954738 sshd[2035]: Failed password for root from 141.98.11.169 port 58796 ssh2 Feb 13 08:13:16.374176 sshd[2035]: Connection closed by authenticating user root 141.98.11.169 port 58796 [preauth] Feb 13 08:13:16.376691 systemd[1]: sshd@60-147.75.90.233:22-141.98.11.169:58796.service: Deactivated successfully. Feb 13 08:13:16.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.233:22-141.98.11.169:58796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:16.468674 kernel: audit: type=1131 audit(1707811996.375:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.90.233:22-141.98.11.169:58796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:16.568765 systemd[1]: Started sshd@61-147.75.90.233:22-141.98.11.169:59378.service. Feb 13 08:13:16.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.233:22-141.98.11.169:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:16.662687 kernel: audit: type=1130 audit(1707811996.567:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.233:22-141.98.11.169:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:17.437156 sshd[2042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:17.435000 audit[2042]: USER_AUTH pid=2042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:17.528560 kernel: audit: type=1100 audit(1707811997.435:379): pid=2042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:19.223148 sshd[2042]: Failed password for root from 141.98.11.169 port 59378 ssh2 Feb 13 08:13:20.903780 sshd[2042]: Connection closed by authenticating user root 141.98.11.169 port 59378 [preauth] Feb 13 08:13:20.906324 systemd[1]: sshd@61-147.75.90.233:22-141.98.11.169:59378.service: Deactivated successfully. Feb 13 08:13:20.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.233:22-141.98.11.169:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:20.999578 kernel: audit: type=1131 audit(1707812000.905:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.90.233:22-141.98.11.169:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:21.068601 systemd[1]: Started sshd@62-147.75.90.233:22-141.98.11.169:33330.service. Feb 13 08:13:21.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.233:22-141.98.11.169:33330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:21.161703 kernel: audit: type=1130 audit(1707812001.067:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.233:22-141.98.11.169:33330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:21.909784 sshd[2047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:21.908000 audit[2047]: USER_AUTH pid=2047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:22.002545 kernel: audit: type=1100 audit(1707812001.908:382): pid=2047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:23.244676 sshd[2047]: Failed password for root from 141.98.11.169 port 33330 ssh2 Feb 13 08:13:23.807791 sshd[2047]: Connection closed by authenticating user root 141.98.11.169 port 33330 [preauth] Feb 13 08:13:23.810291 systemd[1]: sshd@62-147.75.90.233:22-141.98.11.169:33330.service: Deactivated successfully. Feb 13 08:13:23.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.233:22-141.98.11.169:33330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:23.903531 kernel: audit: type=1131 audit(1707812003.809:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.90.233:22-141.98.11.169:33330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:23.973911 systemd[1]: Started sshd@63-147.75.90.233:22-141.98.11.169:37040.service. Feb 13 08:13:23.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.233:22-141.98.11.169:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:24.065682 kernel: audit: type=1130 audit(1707812003.972:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.233:22-141.98.11.169:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:24.819302 sshd[2052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:24.818000 audit[2052]: USER_AUTH pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:24.912678 kernel: audit: type=1100 audit(1707812004.818:385): pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:26.901427 sshd[2052]: Failed password for root from 141.98.11.169 port 37040 ssh2 Feb 13 08:13:28.281264 sshd[2052]: Connection closed by authenticating user root 141.98.11.169 port 37040 [preauth] Feb 13 08:13:28.283765 systemd[1]: sshd@63-147.75.90.233:22-141.98.11.169:37040.service: Deactivated successfully. Feb 13 08:13:28.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.233:22-141.98.11.169:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:28.376536 kernel: audit: type=1131 audit(1707812008.282:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.90.233:22-141.98.11.169:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:28.446953 systemd[1]: Started sshd@64-147.75.90.233:22-141.98.11.169:34976.service. Feb 13 08:13:28.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.233:22-141.98.11.169:34976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:28.539689 kernel: audit: type=1130 audit(1707812008.445:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.233:22-141.98.11.169:34976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:29.294081 sshd[2056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:29.292000 audit[2056]: USER_AUTH pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:29.386562 kernel: audit: type=1100 audit(1707812009.292:388): pid=2056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:31.060250 sshd[2056]: Failed password for root from 141.98.11.169 port 34976 ssh2 Feb 13 08:13:32.756459 sshd[2056]: Connection closed by authenticating user root 141.98.11.169 port 34976 [preauth] Feb 13 08:13:32.758898 systemd[1]: sshd@64-147.75.90.233:22-141.98.11.169:34976.service: Deactivated successfully. Feb 13 08:13:32.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.233:22-141.98.11.169:34976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:32.852678 kernel: audit: type=1131 audit(1707812012.757:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.90.233:22-141.98.11.169:34976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:32.921298 systemd[1]: Started sshd@65-147.75.90.233:22-141.98.11.169:36934.service. Feb 13 08:13:32.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.233:22-141.98.11.169:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:33.013491 kernel: audit: type=1130 audit(1707812012.919:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.233:22-141.98.11.169:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:33.776064 sshd[2060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:33.774000 audit[2060]: USER_AUTH pid=2060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:33.868677 kernel: audit: type=1100 audit(1707812013.774:391): pid=2060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:35.426550 sshd[2060]: Failed password for root from 141.98.11.169 port 36934 ssh2 Feb 13 08:13:37.238306 sshd[2060]: Connection closed by authenticating user root 141.98.11.169 port 36934 [preauth] Feb 13 08:13:37.240753 systemd[1]: sshd@65-147.75.90.233:22-141.98.11.169:36934.service: Deactivated successfully. Feb 13 08:13:37.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.233:22-141.98.11.169:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:37.333552 kernel: audit: type=1131 audit(1707812017.239:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.90.233:22-141.98.11.169:36934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:37.410596 systemd[1]: Started sshd@66-147.75.90.233:22-141.98.11.169:39644.service. Feb 13 08:13:37.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.233:22-141.98.11.169:39644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:37.503682 kernel: audit: type=1130 audit(1707812017.409:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.233:22-141.98.11.169:39644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:38.344245 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:38.343000 audit[2064]: USER_AUTH pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:38.436494 kernel: audit: type=1100 audit(1707812018.343:394): pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:40.681858 sshd[2064]: Failed password for root from 141.98.11.169 port 39644 ssh2 Feb 13 08:13:41.813427 sshd[2064]: Connection closed by authenticating user root 141.98.11.169 port 39644 [preauth] Feb 13 08:13:41.815923 systemd[1]: sshd@66-147.75.90.233:22-141.98.11.169:39644.service: Deactivated successfully. Feb 13 08:13:41.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.233:22-141.98.11.169:39644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:41.908676 kernel: audit: type=1131 audit(1707812021.814:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.90.233:22-141.98.11.169:39644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:41.986213 systemd[1]: Started sshd@67-147.75.90.233:22-141.98.11.169:41020.service. Feb 13 08:13:41.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.233:22-141.98.11.169:41020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:42.079686 kernel: audit: type=1130 audit(1707812021.985:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.233:22-141.98.11.169:41020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:43.335697 sshd[2068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:43.334000 audit[2068]: USER_AUTH pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:43.428681 kernel: audit: type=1100 audit(1707812023.334:397): pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:45.357821 sshd[2068]: Failed password for root from 141.98.11.169 port 41020 ssh2 Feb 13 08:13:46.804041 sshd[2068]: Connection closed by authenticating user root 141.98.11.169 port 41020 [preauth] Feb 13 08:13:46.806481 systemd[1]: sshd@67-147.75.90.233:22-141.98.11.169:41020.service: Deactivated successfully. Feb 13 08:13:46.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.233:22-141.98.11.169:41020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:46.899489 kernel: audit: type=1131 audit(1707812026.805:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.90.233:22-141.98.11.169:41020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:46.973630 systemd[1]: Started sshd@68-147.75.90.233:22-141.98.11.169:49290.service. Feb 13 08:13:46.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.233:22-141.98.11.169:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:47.065553 kernel: audit: type=1130 audit(1707812026.972:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.233:22-141.98.11.169:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:47.817307 sshd[2072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:47.816000 audit[2072]: USER_AUTH pid=2072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:47.908551 kernel: audit: type=1100 audit(1707812027.816:400): pid=2072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:49.723902 sshd[2072]: Failed password for root from 141.98.11.169 port 49290 ssh2 Feb 13 08:13:51.278977 sshd[2072]: Connection closed by authenticating user root 141.98.11.169 port 49290 [preauth] Feb 13 08:13:51.281414 systemd[1]: sshd@68-147.75.90.233:22-141.98.11.169:49290.service: Deactivated successfully. Feb 13 08:13:51.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.233:22-141.98.11.169:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:51.374542 kernel: audit: type=1131 audit(1707812031.280:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.90.233:22-141.98.11.169:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:51.447785 systemd[1]: Started sshd@69-147.75.90.233:22-141.98.11.169:51544.service. Feb 13 08:13:51.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.233:22-141.98.11.169:51544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:51.539702 kernel: audit: type=1130 audit(1707812031.446:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.233:22-141.98.11.169:51544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:52.309927 sshd[2077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:52.308000 audit[2077]: USER_AUTH pid=2077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:52.402661 kernel: audit: type=1100 audit(1707812032.308:403): pid=2077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:53.900427 sshd[2077]: Failed password for root from 141.98.11.169 port 51544 ssh2 Feb 13 08:13:54.125882 sshd[2077]: Connection closed by authenticating user root 141.98.11.169 port 51544 [preauth] Feb 13 08:13:54.128309 systemd[1]: sshd@69-147.75.90.233:22-141.98.11.169:51544.service: Deactivated successfully. Feb 13 08:13:54.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.233:22-141.98.11.169:51544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:54.221703 kernel: audit: type=1131 audit(1707812034.127:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.90.233:22-141.98.11.169:51544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:54.290765 systemd[1]: Started sshd@70-147.75.90.233:22-141.98.11.169:50956.service. Feb 13 08:13:54.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.233:22-141.98.11.169:50956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:54.383689 kernel: audit: type=1130 audit(1707812034.289:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.233:22-141.98.11.169:50956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:55.136236 sshd[2082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:55.135000 audit[2082]: USER_AUTH pid=2082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:55.228686 kernel: audit: type=1100 audit(1707812035.135:406): pid=2082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:57.474409 sshd[2082]: Failed password for root from 141.98.11.169 port 50956 ssh2 Feb 13 08:13:58.598812 sshd[2082]: Connection closed by authenticating user root 141.98.11.169 port 50956 [preauth] Feb 13 08:13:58.601252 systemd[1]: sshd@70-147.75.90.233:22-141.98.11.169:50956.service: Deactivated successfully. Feb 13 08:13:58.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.233:22-141.98.11.169:50956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:58.694684 kernel: audit: type=1131 audit(1707812038.600:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.90.233:22-141.98.11.169:50956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:58.777021 systemd[1]: Started sshd@71-147.75.90.233:22-141.98.11.169:48204.service. Feb 13 08:13:58.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.233:22-141.98.11.169:48204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:58.870686 kernel: audit: type=1130 audit(1707812038.775:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.233:22-141.98.11.169:48204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:13:59.688743 sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:13:59.687000 audit[2086]: USER_AUTH pid=2086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:13:59.781677 kernel: audit: type=1100 audit(1707812039.687:409): pid=2086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:01.575394 sshd[2086]: Failed password for root from 141.98.11.169 port 48204 ssh2 Feb 13 08:14:03.157324 sshd[2086]: Connection closed by authenticating user root 141.98.11.169 port 48204 [preauth] Feb 13 08:14:03.159852 systemd[1]: sshd@71-147.75.90.233:22-141.98.11.169:48204.service: Deactivated successfully. Feb 13 08:14:03.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.233:22-141.98.11.169:48204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:03.253700 kernel: audit: type=1131 audit(1707812043.159:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.90.233:22-141.98.11.169:48204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:03.322688 systemd[1]: Started sshd@72-147.75.90.233:22-141.98.11.169:49562.service. Feb 13 08:14:03.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.233:22-141.98.11.169:49562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:03.415687 kernel: audit: type=1130 audit(1707812043.322:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.233:22-141.98.11.169:49562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:04.249029 sshd[2090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:14:04.248000 audit[2090]: USER_AUTH pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:04.340677 kernel: audit: type=1100 audit(1707812044.248:412): pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:05.819736 sshd[2090]: Failed password for root from 141.98.11.169 port 49562 ssh2 Feb 13 08:14:06.065005 sshd[2090]: Connection closed by authenticating user root 141.98.11.169 port 49562 [preauth] Feb 13 08:14:06.067568 systemd[1]: sshd@72-147.75.90.233:22-141.98.11.169:49562.service: Deactivated successfully. Feb 13 08:14:06.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.233:22-141.98.11.169:49562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:06.160488 kernel: audit: type=1131 audit(1707812046.067:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.90.233:22-141.98.11.169:49562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:06.228644 systemd[1]: Started sshd@73-147.75.90.233:22-141.98.11.169:51206.service. Feb 13 08:14:06.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.233:22-141.98.11.169:51206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:06.321548 kernel: audit: type=1130 audit(1707812046.228:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.233:22-141.98.11.169:51206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:07.164935 sshd[2094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:14:07.164000 audit[2094]: USER_AUTH pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:07.257673 kernel: audit: type=1100 audit(1707812047.164:415): pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:09.818771 sshd[2094]: Failed password for root from 141.98.11.169 port 51206 ssh2 Feb 13 08:14:10.625728 sshd[2094]: Connection closed by authenticating user root 141.98.11.169 port 51206 [preauth] Feb 13 08:14:10.628199 systemd[1]: sshd@73-147.75.90.233:22-141.98.11.169:51206.service: Deactivated successfully. Feb 13 08:14:10.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.233:22-141.98.11.169:51206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:10.721700 kernel: audit: type=1131 audit(1707812050.628:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.90.233:22-141.98.11.169:51206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:10.792389 systemd[1]: Started sshd@74-147.75.90.233:22-141.98.11.169:50792.service. Feb 13 08:14:10.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.233:22-141.98.11.169:50792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:10.885708 kernel: audit: type=1130 audit(1707812050.792:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.233:22-141.98.11.169:50792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:11.702083 sshd[2098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 13 08:14:11.701000 audit[2098]: USER_AUTH pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:11.794664 kernel: audit: type=1100 audit(1707812051.701:418): pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 13 08:14:13.568774 sshd[2098]: Failed password for root from 141.98.11.169 port 50792 ssh2 Feb 13 08:14:15.165781 sshd[2098]: Connection closed by authenticating user root 141.98.11.169 port 50792 [preauth] Feb 13 08:14:15.168214 systemd[1]: sshd@74-147.75.90.233:22-141.98.11.169:50792.service: Deactivated successfully. Feb 13 08:14:15.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.233:22-141.98.11.169:50792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:14:15.261676 kernel: audit: type=1131 audit(1707812055.168:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.90.233:22-141.98.11.169:50792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'