Feb 13 08:26:59.553465 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 13 08:26:59.553480 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 08:26:59.553488 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 08:26:59.553492 kernel: BIOS-provided physical RAM map: Feb 13 08:26:59.553495 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 08:26:59.553499 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 08:26:59.553504 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 08:26:59.553507 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 08:26:59.553511 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 08:26:59.553531 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000062ad9fff] usable Feb 13 08:26:59.553535 kernel: BIOS-e820: [mem 0x0000000062ada000-0x0000000062adafff] ACPI NVS Feb 13 08:26:59.553539 kernel: BIOS-e820: [mem 0x0000000062adb000-0x0000000062adbfff] reserved Feb 13 08:26:59.553542 kernel: BIOS-e820: [mem 0x0000000062adc000-0x000000006c0c4fff] usable Feb 13 08:26:59.553546 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Feb 13 08:26:59.553551 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Feb 13 08:26:59.553556 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Feb 13 08:26:59.553560 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Feb 13 08:26:59.553564 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Feb 13 08:26:59.553568 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Feb 13 08:26:59.553572 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 08:26:59.553576 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 08:26:59.553580 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 08:26:59.553584 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 08:26:59.553588 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 08:26:59.553591 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Feb 13 08:26:59.553596 kernel: NX (Execute Disable) protection: active Feb 13 08:26:59.553600 kernel: SMBIOS 3.2.1 present. Feb 13 08:26:59.553604 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 13 08:26:59.553608 kernel: tsc: Detected 3400.000 MHz processor Feb 13 08:26:59.553612 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 08:26:59.553616 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 08:26:59.553621 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 08:26:59.553625 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Feb 13 08:26:59.553629 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 08:26:59.553634 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Feb 13 08:26:59.553638 kernel: Using GB pages for direct mapping Feb 13 08:26:59.553643 kernel: ACPI: Early table checksum verification disabled Feb 13 08:26:59.553647 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 08:26:59.553651 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 08:26:59.553655 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Feb 13 08:26:59.553661 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 08:26:59.553666 kernel: ACPI: FACS 0x000000006D762F80 000040 Feb 13 08:26:59.553671 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Feb 13 08:26:59.553676 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Feb 13 08:26:59.553680 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 08:26:59.553685 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 08:26:59.553689 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 08:26:59.553694 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 08:26:59.553698 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 08:26:59.553703 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 08:26:59.553708 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 08:26:59.553712 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 08:26:59.553717 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 08:26:59.553721 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 08:26:59.553726 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 08:26:59.553730 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 08:26:59.553735 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 08:26:59.553739 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 08:26:59.553744 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 08:26:59.553749 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 08:26:59.553753 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 13 08:26:59.553758 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 08:26:59.553762 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 08:26:59.553767 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 08:26:59.553772 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xa7b 01072009 AMI 00010013) Feb 13 08:26:59.553776 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 08:26:59.553781 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 08:26:59.553786 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 08:26:59.553790 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 08:26:59.553795 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 08:26:59.553800 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Feb 13 08:26:59.553804 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Feb 13 08:26:59.553808 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Feb 13 08:26:59.553813 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Feb 13 08:26:59.553817 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Feb 13 08:26:59.553823 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Feb 13 08:26:59.553827 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Feb 13 08:26:59.553831 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Feb 13 08:26:59.553836 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Feb 13 08:26:59.553840 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Feb 13 08:26:59.553845 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Feb 13 08:26:59.553849 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Feb 13 08:26:59.553854 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Feb 13 08:26:59.553858 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Feb 13 08:26:59.553864 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Feb 13 08:26:59.553868 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Feb 13 08:26:59.553872 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Feb 13 08:26:59.553877 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Feb 13 08:26:59.553881 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Feb 13 08:26:59.553886 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Feb 13 08:26:59.553890 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Feb 13 08:26:59.553895 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Feb 13 08:26:59.553899 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Feb 13 08:26:59.553904 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Feb 13 08:26:59.553909 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Feb 13 08:26:59.553913 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Feb 13 08:26:59.553918 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Feb 13 08:26:59.553922 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Feb 13 08:26:59.553927 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Feb 13 08:26:59.553931 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Feb 13 08:26:59.553936 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Feb 13 08:26:59.553940 kernel: No NUMA configuration found Feb 13 08:26:59.553945 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Feb 13 08:26:59.553950 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Feb 13 08:26:59.553954 kernel: Zone ranges: Feb 13 08:26:59.553959 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 08:26:59.553963 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 08:26:59.553968 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Feb 13 08:26:59.553972 kernel: Movable zone start for each node Feb 13 08:26:59.553977 kernel: Early memory node ranges Feb 13 08:26:59.553981 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 08:26:59.553986 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 08:26:59.553991 kernel: node 0: [mem 0x0000000040400000-0x0000000062ad9fff] Feb 13 08:26:59.553995 kernel: node 0: [mem 0x0000000062adc000-0x000000006c0c4fff] Feb 13 08:26:59.554000 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Feb 13 08:26:59.554004 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Feb 13 08:26:59.554009 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Feb 13 08:26:59.554014 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Feb 13 08:26:59.554022 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 08:26:59.554026 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 08:26:59.554031 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 08:26:59.554036 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 08:26:59.554042 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 13 08:26:59.554047 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 13 08:26:59.554052 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Feb 13 08:26:59.554056 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 08:26:59.554061 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 08:26:59.554066 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 08:26:59.554072 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 08:26:59.554076 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 08:26:59.554081 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 08:26:59.554086 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 08:26:59.554091 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 08:26:59.554096 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 08:26:59.554100 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 08:26:59.554105 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 08:26:59.554110 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 08:26:59.554115 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 08:26:59.554120 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 08:26:59.554125 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 08:26:59.554130 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 08:26:59.554134 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 08:26:59.554139 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 08:26:59.554144 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 08:26:59.554149 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 08:26:59.554154 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 08:26:59.554159 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 08:26:59.554164 kernel: TSC deadline timer available Feb 13 08:26:59.554169 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 08:26:59.554174 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Feb 13 08:26:59.554179 kernel: Booting paravirtualized kernel on bare hardware Feb 13 08:26:59.554183 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 08:26:59.554188 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 08:26:59.554193 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 08:26:59.554198 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 08:26:59.554203 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 08:26:59.554208 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Feb 13 08:26:59.554213 kernel: Policy zone: Normal Feb 13 08:26:59.554218 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 08:26:59.554223 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 08:26:59.554228 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 08:26:59.554233 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 08:26:59.554238 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 08:26:59.554244 kernel: Memory: 32555728K/33281940K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 725952K reserved, 0K cma-reserved) Feb 13 08:26:59.554249 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 08:26:59.554253 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 08:26:59.554258 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 08:26:59.554263 kernel: rcu: Hierarchical RCU implementation. Feb 13 08:26:59.554268 kernel: rcu: RCU event tracing is enabled. Feb 13 08:26:59.554273 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 08:26:59.554278 kernel: Rude variant of Tasks RCU enabled. Feb 13 08:26:59.554282 kernel: Tracing variant of Tasks RCU enabled. Feb 13 08:26:59.554288 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 08:26:59.554293 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 08:26:59.554298 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 08:26:59.554303 kernel: random: crng init done Feb 13 08:26:59.554307 kernel: Console: colour dummy device 80x25 Feb 13 08:26:59.554312 kernel: printk: console [tty0] enabled Feb 13 08:26:59.554317 kernel: printk: console [ttyS1] enabled Feb 13 08:26:59.554322 kernel: ACPI: Core revision 20210730 Feb 13 08:26:59.554327 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 13 08:26:59.554333 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 08:26:59.554337 kernel: DMAR: Host address width 39 Feb 13 08:26:59.554342 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 13 08:26:59.554347 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 13 08:26:59.554352 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 08:26:59.554357 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 08:26:59.554362 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Feb 13 08:26:59.554366 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Feb 13 08:26:59.554371 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 13 08:26:59.554377 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 08:26:59.554381 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 08:26:59.554386 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 08:26:59.554391 kernel: x2apic enabled Feb 13 08:26:59.554396 kernel: Switched APIC routing to cluster x2apic. Feb 13 08:26:59.554401 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 13 08:26:59.554405 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 08:26:59.554410 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 08:26:59.554415 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 08:26:59.554421 kernel: process: using mwait in idle threads Feb 13 08:26:59.554426 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 08:26:59.554430 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 08:26:59.554435 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 08:26:59.554440 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 08:26:59.554445 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 08:26:59.554450 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 08:26:59.554455 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 08:26:59.554459 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 08:26:59.554465 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 08:26:59.554490 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 08:26:59.554495 kernel: TAA: Mitigation: TSX disabled Feb 13 08:26:59.554500 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 08:26:59.554505 kernel: SRBDS: Mitigation: Microcode Feb 13 08:26:59.554526 kernel: GDS: Vulnerable: No microcode Feb 13 08:26:59.554531 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 08:26:59.554536 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 08:26:59.554540 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 08:26:59.554546 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 08:26:59.554551 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 08:26:59.554556 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 08:26:59.554560 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 08:26:59.554565 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 08:26:59.554570 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 08:26:59.554575 kernel: Freeing SMP alternatives memory: 32K Feb 13 08:26:59.554580 kernel: pid_max: default: 32768 minimum: 301 Feb 13 08:26:59.554584 kernel: LSM: Security Framework initializing Feb 13 08:26:59.554590 kernel: SELinux: Initializing. Feb 13 08:26:59.554595 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 08:26:59.554600 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 08:26:59.554605 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 08:26:59.554609 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 08:26:59.554614 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 08:26:59.554619 kernel: ... version: 4 Feb 13 08:26:59.554624 kernel: ... bit width: 48 Feb 13 08:26:59.554629 kernel: ... generic registers: 4 Feb 13 08:26:59.554634 kernel: ... value mask: 0000ffffffffffff Feb 13 08:26:59.554639 kernel: ... max period: 00007fffffffffff Feb 13 08:26:59.554644 kernel: ... fixed-purpose events: 3 Feb 13 08:26:59.554649 kernel: ... event mask: 000000070000000f Feb 13 08:26:59.554654 kernel: signal: max sigframe size: 2032 Feb 13 08:26:59.554658 kernel: rcu: Hierarchical SRCU implementation. Feb 13 08:26:59.554663 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 08:26:59.554668 kernel: smp: Bringing up secondary CPUs ... Feb 13 08:26:59.554673 kernel: x86: Booting SMP configuration: Feb 13 08:26:59.554678 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 08:26:59.554683 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 08:26:59.554688 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 08:26:59.554693 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 08:26:59.554698 kernel: smpboot: Max logical packages: 1 Feb 13 08:26:59.554703 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 08:26:59.554708 kernel: devtmpfs: initialized Feb 13 08:26:59.554712 kernel: x86/mm: Memory block size: 128MB Feb 13 08:26:59.554718 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x62ada000-0x62adafff] (4096 bytes) Feb 13 08:26:59.554723 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Feb 13 08:26:59.554728 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 08:26:59.554733 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 08:26:59.554738 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 08:26:59.554742 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 08:26:59.554747 kernel: audit: initializing netlink subsys (disabled) Feb 13 08:26:59.554752 kernel: audit: type=2000 audit(1707812813.111:1): state=initialized audit_enabled=0 res=1 Feb 13 08:26:59.554757 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 08:26:59.554762 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 08:26:59.554767 kernel: cpuidle: using governor menu Feb 13 08:26:59.554772 kernel: ACPI: bus type PCI registered Feb 13 08:26:59.554777 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 08:26:59.554781 kernel: dca service started, version 1.12.1 Feb 13 08:26:59.554786 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 08:26:59.554791 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 08:26:59.554796 kernel: PCI: Using configuration type 1 for base access Feb 13 08:26:59.554801 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 08:26:59.554806 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 08:26:59.554811 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 08:26:59.554816 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 08:26:59.554821 kernel: ACPI: Added _OSI(Module Device) Feb 13 08:26:59.554825 kernel: ACPI: Added _OSI(Processor Device) Feb 13 08:26:59.554830 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 08:26:59.554835 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 08:26:59.554840 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 08:26:59.554844 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 08:26:59.554850 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 08:26:59.554855 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 08:26:59.554860 kernel: ACPI: Dynamic OEM Table Load: Feb 13 08:26:59.554864 kernel: ACPI: SSDT 0xFFFF91BB40215900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 08:26:59.554869 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 08:26:59.554874 kernel: ACPI: Dynamic OEM Table Load: Feb 13 08:26:59.554879 kernel: ACPI: SSDT 0xFFFF91BB41CEC000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 08:26:59.554884 kernel: ACPI: Dynamic OEM Table Load: Feb 13 08:26:59.554888 kernel: ACPI: SSDT 0xFFFF91BB41C53000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 08:26:59.554893 kernel: ACPI: Dynamic OEM Table Load: Feb 13 08:26:59.554899 kernel: ACPI: SSDT 0xFFFF91BB41C50000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 08:26:59.554903 kernel: ACPI: Dynamic OEM Table Load: Feb 13 08:26:59.554908 kernel: ACPI: SSDT 0xFFFF91BB40148000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 08:26:59.554913 kernel: ACPI: Dynamic OEM Table Load: Feb 13 08:26:59.554918 kernel: ACPI: SSDT 0xFFFF91BB41CED800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 08:26:59.554922 kernel: ACPI: Interpreter enabled Feb 13 08:26:59.554927 kernel: ACPI: PM: (supports S0 S5) Feb 13 08:26:59.554932 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 08:26:59.554937 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 08:26:59.554942 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 08:26:59.554947 kernel: HEST: Table parsing has been initialized. Feb 13 08:26:59.554952 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 08:26:59.554957 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 08:26:59.554962 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 08:26:59.554966 kernel: ACPI: PM: Power Resource [USBC] Feb 13 08:26:59.554971 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 08:26:59.554976 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 08:26:59.554981 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 08:26:59.554986 kernel: ACPI: PM: Power Resource [WRST] Feb 13 08:26:59.554991 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 13 08:26:59.554996 kernel: ACPI: PM: Power Resource [FN00] Feb 13 08:26:59.555001 kernel: ACPI: PM: Power Resource [FN01] Feb 13 08:26:59.555005 kernel: ACPI: PM: Power Resource [FN02] Feb 13 08:26:59.555010 kernel: ACPI: PM: Power Resource [FN03] Feb 13 08:26:59.555015 kernel: ACPI: PM: Power Resource [FN04] Feb 13 08:26:59.555019 kernel: ACPI: PM: Power Resource [PIN] Feb 13 08:26:59.555024 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 08:26:59.555089 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 08:26:59.555132 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 08:26:59.555171 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 08:26:59.555178 kernel: PCI host bridge to bus 0000:00 Feb 13 08:26:59.555220 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 08:26:59.555256 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 08:26:59.555293 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 08:26:59.555329 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Feb 13 08:26:59.555363 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 08:26:59.555398 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 08:26:59.555445 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 08:26:59.555512 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 08:26:59.555556 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.555603 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 13 08:26:59.555645 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.555690 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 13 08:26:59.555733 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Feb 13 08:26:59.555773 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 13 08:26:59.555815 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 13 08:26:59.555864 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 08:26:59.555904 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Feb 13 08:26:59.555950 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 08:26:59.555990 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Feb 13 08:26:59.556035 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 08:26:59.556076 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Feb 13 08:26:59.556118 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 08:26:59.556164 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 08:26:59.556204 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Feb 13 08:26:59.556245 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Feb 13 08:26:59.556288 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 08:26:59.556330 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 08:26:59.556373 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 08:26:59.556416 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 08:26:59.556459 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 08:26:59.556503 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Feb 13 08:26:59.556545 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 08:26:59.556596 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 08:26:59.556639 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Feb 13 08:26:59.556681 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 08:26:59.556725 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 08:26:59.556766 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Feb 13 08:26:59.556807 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 08:26:59.556853 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 08:26:59.556893 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Feb 13 08:26:59.556934 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Feb 13 08:26:59.556976 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 13 08:26:59.557017 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 13 08:26:59.557056 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 13 08:26:59.557098 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Feb 13 08:26:59.557137 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 08:26:59.557183 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 08:26:59.557226 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.557273 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 08:26:59.557315 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.557359 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 08:26:59.557403 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.557447 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 08:26:59.557492 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.557536 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 13 08:26:59.557577 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.557623 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 08:26:59.557665 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 08:26:59.557713 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 08:26:59.557757 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 08:26:59.557798 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Feb 13 08:26:59.557838 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 08:26:59.557882 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 08:26:59.557922 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 08:26:59.557964 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 08:26:59.558011 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 08:26:59.558054 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 08:26:59.558097 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Feb 13 08:26:59.558139 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 13 08:26:59.558181 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 08:26:59.558223 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 08:26:59.558272 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 08:26:59.558314 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 08:26:59.558357 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Feb 13 08:26:59.558399 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 13 08:26:59.558441 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 08:26:59.558486 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 08:26:59.558528 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 08:26:59.558573 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 13 08:26:59.558613 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 08:26:59.558655 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 08:26:59.558719 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 08:26:59.558762 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Feb 13 08:26:59.558803 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 08:26:59.558845 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Feb 13 08:26:59.558888 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.558929 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 08:26:59.558969 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 08:26:59.559008 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 13 08:26:59.559055 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 13 08:26:59.559096 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Feb 13 08:26:59.559138 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 08:26:59.559182 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Feb 13 08:26:59.559278 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 13 08:26:59.559319 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 08:26:59.559359 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 08:26:59.559399 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 13 08:26:59.559440 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 08:26:59.559509 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 08:26:59.559569 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 13 08:26:59.559611 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 08:26:59.559653 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 08:26:59.559695 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 08:26:59.559735 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 08:26:59.559776 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 13 08:26:59.559821 kernel: pci_bus 0000:08: extended config space not accessible Feb 13 08:26:59.559869 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 08:26:59.559913 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Feb 13 08:26:59.559958 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Feb 13 08:26:59.560002 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 08:26:59.560045 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 08:26:59.560089 kernel: pci 0000:08:00.0: supports D1 D2 Feb 13 08:26:59.560133 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 08:26:59.560175 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 08:26:59.560217 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 08:26:59.560260 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 13 08:26:59.560267 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 08:26:59.560273 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 08:26:59.560280 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 08:26:59.560285 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 08:26:59.560290 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 08:26:59.560295 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 08:26:59.560300 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 08:26:59.560305 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 08:26:59.560311 kernel: iommu: Default domain type: Translated Feb 13 08:26:59.560317 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 08:26:59.560359 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 13 08:26:59.560403 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 08:26:59.560446 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 13 08:26:59.560454 kernel: vgaarb: loaded Feb 13 08:26:59.560459 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 08:26:59.560465 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 08:26:59.560472 kernel: PTP clock support registered Feb 13 08:26:59.560499 kernel: PCI: Using ACPI for IRQ routing Feb 13 08:26:59.560505 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 08:26:59.560510 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 08:26:59.560535 kernel: e820: reserve RAM buffer [mem 0x62ada000-0x63ffffff] Feb 13 08:26:59.560540 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Feb 13 08:26:59.560545 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Feb 13 08:26:59.560550 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Feb 13 08:26:59.560555 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 13 08:26:59.560560 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 13 08:26:59.560566 kernel: clocksource: Switched to clocksource tsc-early Feb 13 08:26:59.560572 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 08:26:59.560577 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 08:26:59.560582 kernel: pnp: PnP ACPI init Feb 13 08:26:59.560625 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 08:26:59.560668 kernel: pnp 00:02: [dma 0 disabled] Feb 13 08:26:59.560709 kernel: pnp 00:03: [dma 0 disabled] Feb 13 08:26:59.560749 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 08:26:59.560787 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 08:26:59.560825 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 08:26:59.560864 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 08:26:59.560901 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 08:26:59.560937 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 08:26:59.560975 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 08:26:59.561010 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 08:26:59.561047 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 08:26:59.561082 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 08:26:59.561118 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 08:26:59.561157 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 08:26:59.561193 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 08:26:59.561230 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 08:26:59.561265 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 08:26:59.561301 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 08:26:59.561337 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 08:26:59.561373 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 08:26:59.561414 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 08:26:59.561421 kernel: pnp: PnP ACPI: found 10 devices Feb 13 08:26:59.561427 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 08:26:59.561433 kernel: NET: Registered PF_INET protocol family Feb 13 08:26:59.561438 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 08:26:59.561444 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 08:26:59.561449 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 08:26:59.561454 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 08:26:59.561459 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 08:26:59.561465 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 08:26:59.561493 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 08:26:59.561499 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 08:26:59.561505 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 08:26:59.561510 kernel: NET: Registered PF_XDP protocol family Feb 13 08:26:59.561570 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Feb 13 08:26:59.561610 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Feb 13 08:26:59.561652 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Feb 13 08:26:59.561693 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 08:26:59.561736 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 08:26:59.561779 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 08:26:59.561824 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 08:26:59.561866 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 08:26:59.561907 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 08:26:59.561948 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 13 08:26:59.561991 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 08:26:59.562032 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 08:26:59.562072 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 08:26:59.562112 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 08:26:59.562153 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 13 08:26:59.562193 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 08:26:59.562235 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 08:26:59.562276 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 13 08:26:59.562316 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 08:26:59.562360 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 08:26:59.562402 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 08:26:59.562443 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 13 08:26:59.562507 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 08:26:59.562550 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 08:26:59.562591 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 13 08:26:59.562629 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 08:26:59.562665 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 08:26:59.562703 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 08:26:59.562739 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 08:26:59.562775 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Feb 13 08:26:59.562811 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 08:26:59.562852 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Feb 13 08:26:59.562891 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 08:26:59.562933 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 13 08:26:59.562973 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Feb 13 08:26:59.563015 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 13 08:26:59.563053 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Feb 13 08:26:59.563095 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 08:26:59.563133 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 13 08:26:59.563173 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 13 08:26:59.563214 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 13 08:26:59.563221 kernel: PCI: CLS 64 bytes, default 64 Feb 13 08:26:59.563227 kernel: DMAR: No ATSR found Feb 13 08:26:59.563232 kernel: DMAR: No SATC found Feb 13 08:26:59.563237 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 13 08:26:59.563243 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 13 08:26:59.563248 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 13 08:26:59.563253 kernel: DMAR: IOMMU feature pasid inconsistent Feb 13 08:26:59.563258 kernel: DMAR: IOMMU feature eafs inconsistent Feb 13 08:26:59.563264 kernel: DMAR: IOMMU feature prs inconsistent Feb 13 08:26:59.563270 kernel: DMAR: IOMMU feature nest inconsistent Feb 13 08:26:59.563275 kernel: DMAR: IOMMU feature mts inconsistent Feb 13 08:26:59.563281 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 13 08:26:59.563286 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 13 08:26:59.563291 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 08:26:59.563297 kernel: DMAR: dmar1: Using Queued invalidation Feb 13 08:26:59.563338 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 08:26:59.563381 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 08:26:59.563425 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 13 08:26:59.563466 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 13 08:26:59.563510 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 13 08:26:59.563552 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 13 08:26:59.563592 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 13 08:26:59.563634 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 13 08:26:59.563674 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 13 08:26:59.563734 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 13 08:26:59.563773 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 13 08:26:59.563814 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 13 08:26:59.563856 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 13 08:26:59.563895 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 13 08:26:59.563937 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 13 08:26:59.563976 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 13 08:26:59.564017 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 13 08:26:59.564057 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 13 08:26:59.564097 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 13 08:26:59.564138 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 13 08:26:59.564179 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 13 08:26:59.564220 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 13 08:26:59.564259 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 13 08:26:59.564301 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 13 08:26:59.564343 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 13 08:26:59.564386 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 08:26:59.564427 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 13 08:26:59.564495 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 13 08:26:59.564559 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 13 08:26:59.564566 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 08:26:59.564572 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 08:26:59.564577 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Feb 13 08:26:59.564582 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 13 08:26:59.564587 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 08:26:59.564592 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 08:26:59.564599 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 08:26:59.564604 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 13 08:26:59.564651 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 08:26:59.564658 kernel: Initialise system trusted keyrings Feb 13 08:26:59.564664 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 08:26:59.564669 kernel: Key type asymmetric registered Feb 13 08:26:59.564674 kernel: Asymmetric key parser 'x509' registered Feb 13 08:26:59.564679 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 08:26:59.564686 kernel: io scheduler mq-deadline registered Feb 13 08:26:59.564691 kernel: io scheduler kyber registered Feb 13 08:26:59.564696 kernel: io scheduler bfq registered Feb 13 08:26:59.564736 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 13 08:26:59.564776 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 13 08:26:59.564819 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 13 08:26:59.564859 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 13 08:26:59.564900 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 13 08:26:59.564942 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 13 08:26:59.564983 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 13 08:26:59.565028 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 08:26:59.565036 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 08:26:59.565041 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 08:26:59.565046 kernel: pstore: Registered erst as persistent store backend Feb 13 08:26:59.565052 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 08:26:59.565057 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 08:26:59.565064 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 08:26:59.565069 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 08:26:59.565110 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 08:26:59.565118 kernel: i8042: PNP: No PS/2 controller found. Feb 13 08:26:59.565154 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 08:26:59.565190 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 08:26:59.565228 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T08:26:58 UTC (1707812818) Feb 13 08:26:59.565264 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 08:26:59.565273 kernel: fail to initialize ptp_kvm Feb 13 08:26:59.565278 kernel: intel_pstate: Intel P-state driver initializing Feb 13 08:26:59.565284 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 08:26:59.565289 kernel: intel_pstate: HWP enabled Feb 13 08:26:59.565294 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 08:26:59.565300 kernel: vesafb: scrolling: redraw Feb 13 08:26:59.565305 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 08:26:59.565310 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x000000004d6e44c9, using 768k, total 768k Feb 13 08:26:59.565316 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 08:26:59.565321 kernel: fb0: VESA VGA frame buffer device Feb 13 08:26:59.565326 kernel: NET: Registered PF_INET6 protocol family Feb 13 08:26:59.565332 kernel: Segment Routing with IPv6 Feb 13 08:26:59.565337 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 08:26:59.565342 kernel: NET: Registered PF_PACKET protocol family Feb 13 08:26:59.565347 kernel: Key type dns_resolver registered Feb 13 08:26:59.565352 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 08:26:59.565357 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 08:26:59.565363 kernel: IPI shorthand broadcast: enabled Feb 13 08:26:59.565368 kernel: sched_clock: Marking stable (1839395124, 1353820159)->(4616809773, -1423594490) Feb 13 08:26:59.565374 kernel: registered taskstats version 1 Feb 13 08:26:59.565379 kernel: Loading compiled-in X.509 certificates Feb 13 08:26:59.565384 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 08:26:59.565389 kernel: Key type .fscrypt registered Feb 13 08:26:59.565394 kernel: Key type fscrypt-provisioning registered Feb 13 08:26:59.565399 kernel: pstore: Using crash dump compression: deflate Feb 13 08:26:59.565404 kernel: ima: Allocated hash algorithm: sha1 Feb 13 08:26:59.565410 kernel: ima: No architecture policies found Feb 13 08:26:59.565416 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 08:26:59.565421 kernel: Write protecting the kernel read-only data: 28672k Feb 13 08:26:59.565426 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 08:26:59.565431 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 08:26:59.565436 kernel: Run /init as init process Feb 13 08:26:59.565441 kernel: with arguments: Feb 13 08:26:59.565446 kernel: /init Feb 13 08:26:59.565452 kernel: with environment: Feb 13 08:26:59.565457 kernel: HOME=/ Feb 13 08:26:59.565462 kernel: TERM=linux Feb 13 08:26:59.565469 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 08:26:59.565497 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 08:26:59.565504 systemd[1]: Detected architecture x86-64. Feb 13 08:26:59.565510 systemd[1]: Running in initrd. Feb 13 08:26:59.565535 systemd[1]: No hostname configured, using default hostname. Feb 13 08:26:59.565540 systemd[1]: Hostname set to . Feb 13 08:26:59.565546 systemd[1]: Initializing machine ID from random generator. Feb 13 08:26:59.565552 systemd[1]: Queued start job for default target initrd.target. Feb 13 08:26:59.565557 systemd[1]: Started systemd-ask-password-console.path. Feb 13 08:26:59.565562 systemd[1]: Reached target cryptsetup.target. Feb 13 08:26:59.565568 systemd[1]: Reached target paths.target. Feb 13 08:26:59.565573 systemd[1]: Reached target slices.target. Feb 13 08:26:59.565578 systemd[1]: Reached target swap.target. Feb 13 08:26:59.565583 systemd[1]: Reached target timers.target. Feb 13 08:26:59.565589 systemd[1]: Listening on iscsid.socket. Feb 13 08:26:59.565595 systemd[1]: Listening on iscsiuio.socket. Feb 13 08:26:59.565601 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 08:26:59.565606 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 08:26:59.565612 systemd[1]: Listening on systemd-journald.socket. Feb 13 08:26:59.565617 systemd[1]: Listening on systemd-networkd.socket. Feb 13 08:26:59.565622 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 08:26:59.565628 kernel: tsc: Refined TSC clocksource calibration: 3407.991 MHz Feb 13 08:26:59.565634 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fcb8dbdf, max_idle_ns: 440795301826 ns Feb 13 08:26:59.565639 kernel: clocksource: Switched to clocksource tsc Feb 13 08:26:59.565644 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 08:26:59.565650 systemd[1]: Reached target sockets.target. Feb 13 08:26:59.565655 systemd[1]: Starting kmod-static-nodes.service... Feb 13 08:26:59.565660 systemd[1]: Finished network-cleanup.service. Feb 13 08:26:59.565666 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 08:26:59.565671 systemd[1]: Starting systemd-journald.service... Feb 13 08:26:59.565677 systemd[1]: Starting systemd-modules-load.service... Feb 13 08:26:59.565685 systemd-journald[269]: Journal started Feb 13 08:26:59.565710 systemd-journald[269]: Runtime Journal (/run/log/journal/56357ac02ea944108371228f283c33fd) is 8.0M, max 636.8M, 628.8M free. Feb 13 08:26:59.567983 systemd-modules-load[270]: Inserted module 'overlay' Feb 13 08:26:59.574000 audit: BPF prog-id=6 op=LOAD Feb 13 08:26:59.592524 kernel: audit: type=1334 audit(1707812819.574:2): prog-id=6 op=LOAD Feb 13 08:26:59.592552 systemd[1]: Starting systemd-resolved.service... Feb 13 08:26:59.641513 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 08:26:59.641528 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 08:26:59.671506 kernel: Bridge firewalling registered Feb 13 08:26:59.671522 systemd[1]: Started systemd-journald.service. Feb 13 08:26:59.685558 systemd-modules-load[270]: Inserted module 'br_netfilter' Feb 13 08:26:59.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.692037 systemd-resolved[272]: Positive Trust Anchors: Feb 13 08:26:59.808143 kernel: audit: type=1130 audit(1707812819.693:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.808187 kernel: SCSI subsystem initialized Feb 13 08:26:59.808204 kernel: audit: type=1130 audit(1707812819.745:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.808226 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 08:26:59.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.692041 systemd-resolved[272]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 08:26:59.909136 kernel: device-mapper: uevent: version 1.0.3 Feb 13 08:26:59.909175 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 08:26:59.909184 kernel: audit: type=1130 audit(1707812819.864:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.692061 systemd-resolved[272]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 08:26:59.982727 kernel: audit: type=1130 audit(1707812819.917:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.693615 systemd-resolved[272]: Defaulting to hostname 'linux'. Feb 13 08:26:59.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.693718 systemd[1]: Finished kmod-static-nodes.service. Feb 13 08:27:00.090251 kernel: audit: type=1130 audit(1707812819.991:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.090340 kernel: audit: type=1130 audit(1707812820.044:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:26:59.745597 systemd[1]: Started systemd-resolved.service. Feb 13 08:26:59.865569 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 08:26:59.909631 systemd-modules-load[270]: Inserted module 'dm_multipath' Feb 13 08:26:59.917894 systemd[1]: Finished systemd-modules-load.service. Feb 13 08:26:59.991878 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 08:27:00.044770 systemd[1]: Reached target nss-lookup.target. Feb 13 08:27:00.099082 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 08:27:00.119062 systemd[1]: Starting systemd-sysctl.service... Feb 13 08:27:00.119353 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 08:27:00.122253 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 08:27:00.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.122947 systemd[1]: Finished systemd-sysctl.service. Feb 13 08:27:00.171689 kernel: audit: type=1130 audit(1707812820.121:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.183836 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 08:27:00.248581 kernel: audit: type=1130 audit(1707812820.183:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.241094 systemd[1]: Starting dracut-cmdline.service... Feb 13 08:27:00.260579 dracut-cmdline[293]: dracut-dracut-053 Feb 13 08:27:00.260579 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 08:27:00.260579 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 08:27:00.362510 kernel: Loading iSCSI transport class v2.0-870. Feb 13 08:27:00.362528 kernel: iscsi: registered transport (tcp) Feb 13 08:27:00.362535 kernel: iscsi: registered transport (qla4xxx) Feb 13 08:27:00.380227 kernel: QLogic iSCSI HBA Driver Feb 13 08:27:00.396400 systemd[1]: Finished dracut-cmdline.service. Feb 13 08:27:00.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:00.396941 systemd[1]: Starting dracut-pre-udev.service... Feb 13 08:27:00.452541 kernel: raid6: avx2x4 gen() 48398 MB/s Feb 13 08:27:00.487540 kernel: raid6: avx2x4 xor() 22159 MB/s Feb 13 08:27:00.522506 kernel: raid6: avx2x2 gen() 53731 MB/s Feb 13 08:27:00.557544 kernel: raid6: avx2x2 xor() 31913 MB/s Feb 13 08:27:00.592506 kernel: raid6: avx2x1 gen() 45036 MB/s Feb 13 08:27:00.627543 kernel: raid6: avx2x1 xor() 27637 MB/s Feb 13 08:27:00.661526 kernel: raid6: sse2x4 gen() 21313 MB/s Feb 13 08:27:00.695504 kernel: raid6: sse2x4 xor() 11970 MB/s Feb 13 08:27:00.729503 kernel: raid6: sse2x2 gen() 21643 MB/s Feb 13 08:27:00.763541 kernel: raid6: sse2x2 xor() 13382 MB/s Feb 13 08:27:00.797509 kernel: raid6: sse2x1 gen() 18290 MB/s Feb 13 08:27:00.849107 kernel: raid6: sse2x1 xor() 8912 MB/s Feb 13 08:27:00.849122 kernel: raid6: using algorithm avx2x2 gen() 53731 MB/s Feb 13 08:27:00.849129 kernel: raid6: .... xor() 31913 MB/s, rmw enabled Feb 13 08:27:00.867181 kernel: raid6: using avx2x2 recovery algorithm Feb 13 08:27:00.913547 kernel: xor: automatically using best checksumming function avx Feb 13 08:27:00.991523 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 08:27:00.996341 systemd[1]: Finished dracut-pre-udev.service. Feb 13 08:27:01.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:01.005000 audit: BPF prog-id=7 op=LOAD Feb 13 08:27:01.005000 audit: BPF prog-id=8 op=LOAD Feb 13 08:27:01.006405 systemd[1]: Starting systemd-udevd.service... Feb 13 08:27:01.014748 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 13 08:27:01.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:01.020707 systemd[1]: Started systemd-udevd.service. Feb 13 08:27:01.060599 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 13 08:27:01.037136 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 08:27:01.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:01.065532 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 08:27:01.077492 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 08:27:01.159160 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 08:27:01.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:01.185477 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 08:27:01.187477 kernel: libata version 3.00 loaded. Feb 13 08:27:01.187497 kernel: ACPI: bus type USB registered Feb 13 08:27:01.221819 kernel: usbcore: registered new interface driver usbfs Feb 13 08:27:01.239653 kernel: usbcore: registered new interface driver hub Feb 13 08:27:01.239702 kernel: usbcore: registered new device driver usb Feb 13 08:27:01.257477 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 08:27:01.290330 kernel: AES CTR mode by8 optimization enabled Feb 13 08:27:01.307483 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 08:27:01.307501 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 08:27:01.307579 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 08:27:01.324329 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 13 08:27:01.363832 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 08:27:01.364515 kernel: pps pps0: new PPS source ptp0 Feb 13 08:27:01.394047 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 13 08:27:01.394121 kernel: scsi host0: ahci Feb 13 08:27:01.394139 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 08:27:01.437739 kernel: scsi host1: ahci Feb 13 08:27:01.443529 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:44 Feb 13 08:27:01.443601 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 13 08:27:01.443666 kernel: scsi host2: ahci Feb 13 08:27:01.469630 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 08:27:01.469741 kernel: scsi host3: ahci Feb 13 08:27:01.521625 kernel: scsi host4: ahci Feb 13 08:27:01.521696 kernel: pps pps1: new PPS source ptp1 Feb 13 08:27:01.521749 kernel: scsi host5: ahci Feb 13 08:27:01.544186 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 13 08:27:01.556103 kernel: scsi host6: ahci Feb 13 08:27:01.566006 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 08:27:01.579907 kernel: scsi host7: ahci Feb 13 08:27:01.579931 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:45 Feb 13 08:27:01.589745 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 13 08:27:01.589817 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 129 Feb 13 08:27:01.604193 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 08:27:01.662193 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 129 Feb 13 08:27:01.662208 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 129 Feb 13 08:27:01.677570 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 129 Feb 13 08:27:01.692959 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 129 Feb 13 08:27:01.708267 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 129 Feb 13 08:27:01.723577 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 129 Feb 13 08:27:01.738887 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 129 Feb 13 08:27:01.789691 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Feb 13 08:27:01.789761 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 08:27:02.053536 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 08:27:02.076473 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 08:27:02.076492 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 08:27:02.076584 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 08:27:02.109500 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 08:27:02.123510 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 08:27:02.137472 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 13 08:27:02.151500 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 08:27:02.166471 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 08:27:02.180472 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 08:27:02.193509 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 08:27:02.209521 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 08:27:02.255328 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 08:27:02.255347 kernel: ata1.00: Features: NCQ-prio Feb 13 08:27:02.255355 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 08:27:02.282529 kernel: ata2.00: Features: NCQ-prio Feb 13 08:27:02.299475 kernel: ata1.00: configured for UDMA/133 Feb 13 08:27:02.299493 kernel: ata2.00: configured for UDMA/133 Feb 13 08:27:02.299504 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 08:27:02.327523 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 08:27:02.345518 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 08:27:02.362514 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Feb 13 08:27:02.399186 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 08:27:02.399293 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 13 08:27:02.443883 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 08:27:02.443999 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 08:27:02.476582 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 08:27:02.476655 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 08:27:02.476705 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:02.476713 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 08:27:02.489838 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 08:27:02.519573 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 08:27:02.519645 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 08:27:02.519732 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 08:27:02.519800 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 08:27:02.519853 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 08:27:02.519905 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 08:27:02.519957 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 08:27:02.520007 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 08:27:02.536538 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 08:27:02.536555 kernel: hub 1-0:1.0: USB hub found Feb 13 08:27:02.536640 kernel: hub 1-0:1.0: 16 ports detected Feb 13 08:27:02.536696 kernel: hub 2-0:1.0: USB hub found Feb 13 08:27:02.536763 kernel: hub 2-0:1.0: 10 ports detected Feb 13 08:27:02.537506 kernel: usb: port power management may be unreliable Feb 13 08:27:02.568602 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 08:27:02.568705 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 08:27:02.569516 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 13 08:27:02.595957 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 08:27:02.677158 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 08:27:02.677234 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 08:27:02.677294 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 08:27:02.690516 kernel: port_module: 9 callbacks suppressed Feb 13 08:27:02.690531 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 13 08:27:02.690599 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:02.718021 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 08:27:02.886925 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 08:27:02.886941 kernel: GPT:9289727 != 937703087 Feb 13 08:27:02.886949 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 08:27:02.902627 kernel: GPT:9289727 != 937703087 Feb 13 08:27:02.915742 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 08:27:02.915769 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 08:27:02.915779 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 08:27:02.976704 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:02.976720 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 08:27:03.022879 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 08:27:03.038544 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (520) Feb 13 08:27:03.069631 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 08:27:03.118425 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 08:27:03.118507 kernel: hub 1-14:1.0: USB hub found Feb 13 08:27:03.118578 kernel: hub 1-14:1.0: 4 ports detected Feb 13 08:27:03.118634 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 13 08:27:03.089386 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 08:27:03.132762 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 08:27:03.173726 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 13 08:27:03.166320 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 08:27:03.184536 systemd[1]: Starting disk-uuid.service... Feb 13 08:27:03.232568 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:03.232579 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 08:27:03.232586 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:03.232635 disk-uuid[693]: Primary Header is updated. Feb 13 08:27:03.232635 disk-uuid[693]: Secondary Entries is updated. Feb 13 08:27:03.232635 disk-uuid[693]: Secondary Header is updated. Feb 13 08:27:03.284566 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 08:27:03.284577 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:03.284584 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 08:27:03.430510 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 08:27:03.564540 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 08:27:03.595294 kernel: usbcore: registered new interface driver usbhid Feb 13 08:27:03.595343 kernel: usbhid: USB HID core driver Feb 13 08:27:03.628644 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 08:27:03.745612 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 08:27:03.745750 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 08:27:03.745759 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 08:27:04.273421 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 08:27:04.293227 disk-uuid[694]: The operation has completed successfully. Feb 13 08:27:04.302690 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 08:27:04.329350 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 08:27:04.426297 kernel: audit: type=1130 audit(1707812824.336:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.426312 kernel: audit: type=1131 audit(1707812824.336:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.329394 systemd[1]: Finished disk-uuid.service. Feb 13 08:27:04.456575 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 08:27:04.347745 systemd[1]: Starting verity-setup.service... Feb 13 08:27:04.533729 systemd[1]: Found device dev-mapper-usr.device. Feb 13 08:27:04.544807 systemd[1]: Mounting sysusr-usr.mount... Feb 13 08:27:04.557106 systemd[1]: Finished verity-setup.service. Feb 13 08:27:04.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.626477 kernel: audit: type=1130 audit(1707812824.570:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.685464 systemd[1]: Mounted sysusr-usr.mount. Feb 13 08:27:04.699697 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 08:27:04.692781 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 08:27:04.782783 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 08:27:04.782798 kernel: BTRFS info (device sdb6): using free space tree Feb 13 08:27:04.782806 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 08:27:04.782813 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 08:27:04.693179 systemd[1]: Starting ignition-setup.service... Feb 13 08:27:04.714926 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 08:27:04.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.790920 systemd[1]: Finished ignition-setup.service. Feb 13 08:27:04.911712 kernel: audit: type=1130 audit(1707812824.806:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.911803 kernel: audit: type=1130 audit(1707812824.862:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.806824 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 08:27:04.943229 kernel: audit: type=1334 audit(1707812824.919:24): prog-id=9 op=LOAD Feb 13 08:27:04.919000 audit: BPF prog-id=9 op=LOAD Feb 13 08:27:04.863161 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 08:27:04.921288 systemd[1]: Starting systemd-networkd.service... Feb 13 08:27:04.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:05.013406 ignition[871]: Ignition 2.14.0 Feb 13 08:27:05.032667 kernel: audit: type=1130 audit(1707812824.968:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.958355 systemd-networkd[881]: lo: Link UP Feb 13 08:27:05.013411 ignition[871]: Stage: fetch-offline Feb 13 08:27:05.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.958357 systemd-networkd[881]: lo: Gained carrier Feb 13 08:27:05.181027 kernel: audit: type=1130 audit(1707812825.047:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:05.181038 kernel: audit: type=1130 audit(1707812825.107:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:05.181046 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 08:27:05.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:05.013438 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 08:27:05.221590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 13 08:27:04.958634 systemd-networkd[881]: Enumeration completed Feb 13 08:27:05.013452 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 08:27:04.958672 systemd[1]: Started systemd-networkd.service. Feb 13 08:27:05.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:05.016418 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 08:27:05.267589 iscsid[901]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 08:27:05.267589 iscsid[901]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 08:27:05.267589 iscsid[901]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 08:27:05.267589 iscsid[901]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 08:27:05.267589 iscsid[901]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 08:27:05.267589 iscsid[901]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 08:27:05.267589 iscsid[901]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 08:27:05.426608 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 08:27:05.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:05.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:04.959398 systemd-networkd[881]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 08:27:05.016508 ignition[871]: parsed url from cmdline: "" Feb 13 08:27:04.968547 systemd[1]: Reached target network.target. Feb 13 08:27:05.016510 ignition[871]: no config URL provided Feb 13 08:27:05.026827 unknown[871]: fetched base config from "system" Feb 13 08:27:05.016532 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 08:27:05.026831 unknown[871]: fetched user config from "system" Feb 13 08:27:05.016544 ignition[871]: parsing config with SHA512: 5ebcd13c5b829f675ce32ba7a510ce7b60c17fd387365cebe9a3258f6bb9de1e432fdbb2fd976dff80dcba64f4a6a64590efdd83f41afc86446848610253689f Feb 13 08:27:05.027047 systemd[1]: Starting iscsiuio.service... Feb 13 08:27:05.026978 ignition[871]: fetch-offline: fetch-offline passed Feb 13 08:27:05.040721 systemd[1]: Started iscsiuio.service. Feb 13 08:27:05.026981 ignition[871]: POST message to Packet Timeline Feb 13 08:27:05.047846 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 08:27:05.026986 ignition[871]: POST Status error: resource requires networking Feb 13 08:27:05.107736 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 08:27:05.027017 ignition[871]: Ignition finished successfully Feb 13 08:27:05.108181 systemd[1]: Starting ignition-kargs.service... Feb 13 08:27:05.185388 ignition[890]: Ignition 2.14.0 Feb 13 08:27:05.182507 systemd-networkd[881]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 08:27:05.185392 ignition[890]: Stage: kargs Feb 13 08:27:05.212141 systemd[1]: Starting iscsid.service... Feb 13 08:27:05.185448 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 08:27:05.228668 systemd[1]: Started iscsid.service. Feb 13 08:27:05.185461 ignition[890]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 08:27:05.244002 systemd[1]: Starting dracut-initqueue.service... Feb 13 08:27:05.188585 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 08:27:05.257669 systemd[1]: Finished dracut-initqueue.service. Feb 13 08:27:05.188984 ignition[890]: kargs: kargs passed Feb 13 08:27:05.275724 systemd[1]: Reached target remote-fs-pre.target. Feb 13 08:27:05.188987 ignition[890]: POST message to Packet Timeline Feb 13 08:27:05.275758 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 08:27:05.188998 ignition[890]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 08:27:05.293747 systemd[1]: Reached target remote-fs.target. Feb 13 08:27:05.190903 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44006->[::1]:53: read: connection refused Feb 13 08:27:05.338511 systemd[1]: Starting dracut-pre-mount.service... Feb 13 08:27:05.391255 ignition[890]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 08:27:05.371742 systemd[1]: Finished dracut-pre-mount.service. Feb 13 08:27:05.391663 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46655->[::1]:53: read: connection refused Feb 13 08:27:05.395537 systemd-networkd[881]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 08:27:05.423811 systemd-networkd[881]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 08:27:05.452065 systemd-networkd[881]: enp2s0f1np1: Link UP Feb 13 08:27:05.452209 systemd-networkd[881]: enp2s0f1np1: Gained carrier Feb 13 08:27:05.464711 systemd-networkd[881]: enp2s0f0np0: Link UP Feb 13 08:27:05.464895 systemd-networkd[881]: eno2: Link UP Feb 13 08:27:05.465059 systemd-networkd[881]: eno1: Link UP Feb 13 08:27:05.792244 ignition[890]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 08:27:05.793540 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41107->[::1]:53: read: connection refused Feb 13 08:27:06.215965 systemd-networkd[881]: enp2s0f0np0: Gained carrier Feb 13 08:27:06.224707 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 13 08:27:06.252656 systemd-networkd[881]: enp2s0f0np0: DHCPv4 address 145.40.67.53/31, gateway 145.40.67.52 acquired from 145.40.83.140 Feb 13 08:27:06.593920 ignition[890]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 08:27:06.595165 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40868->[::1]:53: read: connection refused Feb 13 08:27:06.704944 systemd-networkd[881]: enp2s0f1np1: Gained IPv6LL Feb 13 08:27:07.856924 systemd-networkd[881]: enp2s0f0np0: Gained IPv6LL Feb 13 08:27:08.196742 ignition[890]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 08:27:08.198050 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60148->[::1]:53: read: connection refused Feb 13 08:27:11.401387 ignition[890]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 08:27:11.446442 ignition[890]: GET result: OK Feb 13 08:27:11.640084 ignition[890]: Ignition finished successfully Feb 13 08:27:11.644551 systemd[1]: Finished ignition-kargs.service. Feb 13 08:27:11.733237 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 08:27:11.733272 kernel: audit: type=1130 audit(1707812831.655:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:11.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:11.664400 ignition[918]: Ignition 2.14.0 Feb 13 08:27:11.657787 systemd[1]: Starting ignition-disks.service... Feb 13 08:27:11.664404 ignition[918]: Stage: disks Feb 13 08:27:11.664479 ignition[918]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 08:27:11.664511 ignition[918]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 08:27:11.666973 ignition[918]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 08:27:11.667396 ignition[918]: disks: disks passed Feb 13 08:27:11.667399 ignition[918]: POST message to Packet Timeline Feb 13 08:27:11.667409 ignition[918]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 08:27:11.690676 ignition[918]: GET result: OK Feb 13 08:27:11.879346 ignition[918]: Ignition finished successfully Feb 13 08:27:11.882332 systemd[1]: Finished ignition-disks.service. Feb 13 08:27:11.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:11.896016 systemd[1]: Reached target initrd-root-device.target. Feb 13 08:27:11.973732 kernel: audit: type=1130 audit(1707812831.895:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:11.959700 systemd[1]: Reached target local-fs-pre.target. Feb 13 08:27:11.959735 systemd[1]: Reached target local-fs.target. Feb 13 08:27:11.982716 systemd[1]: Reached target sysinit.target. Feb 13 08:27:11.997686 systemd[1]: Reached target basic.target. Feb 13 08:27:12.011443 systemd[1]: Starting systemd-fsck-root.service... Feb 13 08:27:12.032360 systemd-fsck[933]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 08:27:12.045040 systemd[1]: Finished systemd-fsck-root.service. Feb 13 08:27:12.137764 kernel: audit: type=1130 audit(1707812832.053:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.137778 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 08:27:12.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.058814 systemd[1]: Mounting sysroot.mount... Feb 13 08:27:12.145103 systemd[1]: Mounted sysroot.mount. Feb 13 08:27:12.158739 systemd[1]: Reached target initrd-root-fs.target. Feb 13 08:27:12.166431 systemd[1]: Mounting sysroot-usr.mount... Feb 13 08:27:12.191360 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 08:27:12.200989 systemd[1]: Starting flatcar-static-network.service... Feb 13 08:27:12.217592 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 08:27:12.217629 systemd[1]: Reached target ignition-diskful.target. Feb 13 08:27:12.236487 systemd[1]: Mounted sysroot-usr.mount. Feb 13 08:27:12.261195 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 08:27:12.409223 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (944) Feb 13 08:27:12.409239 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 08:27:12.409246 kernel: BTRFS info (device sdb6): using free space tree Feb 13 08:27:12.409253 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 08:27:12.409260 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 08:27:12.274384 systemd[1]: Starting initrd-setup-root.service... Feb 13 08:27:12.472593 kernel: audit: type=1130 audit(1707812832.417:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.472632 coreos-metadata[941]: Feb 13 08:27:12.340 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 08:27:12.472632 coreos-metadata[941]: Feb 13 08:27:12.363 INFO Fetch successful Feb 13 08:27:12.659089 kernel: audit: type=1130 audit(1707812832.482:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.659102 kernel: audit: type=1130 audit(1707812832.546:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.659112 kernel: audit: type=1131 audit(1707812832.546:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.659172 coreos-metadata[940]: Feb 13 08:27:12.340 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 08:27:12.659172 coreos-metadata[940]: Feb 13 08:27:12.362 INFO Fetch successful Feb 13 08:27:12.659172 coreos-metadata[940]: Feb 13 08:27:12.379 INFO wrote hostname ci-3510.3.2-a-99b6014e22 to /sysroot/etc/hostname Feb 13 08:27:12.709704 initrd-setup-root[951]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 08:27:12.334819 systemd[1]: Finished initrd-setup-root.service. Feb 13 08:27:12.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.762683 initrd-setup-root[959]: cut: /sysroot/etc/group: No such file or directory Feb 13 08:27:12.802673 kernel: audit: type=1130 audit(1707812832.735:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.418833 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 08:27:12.812730 initrd-setup-root[967]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 08:27:12.482780 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 08:27:12.833707 initrd-setup-root[975]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 08:27:12.482819 systemd[1]: Finished flatcar-static-network.service. Feb 13 08:27:12.851633 ignition[1016]: INFO : Ignition 2.14.0 Feb 13 08:27:12.851633 ignition[1016]: INFO : Stage: mount Feb 13 08:27:12.851633 ignition[1016]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 08:27:12.851633 ignition[1016]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 08:27:12.851633 ignition[1016]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 08:27:12.851633 ignition[1016]: INFO : mount: mount passed Feb 13 08:27:12.851633 ignition[1016]: INFO : POST message to Packet Timeline Feb 13 08:27:12.851633 ignition[1016]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 08:27:12.851633 ignition[1016]: INFO : GET result: OK Feb 13 08:27:12.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.546756 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 08:27:13.014544 kernel: audit: type=1130 audit(1707812832.941:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.014587 ignition[1016]: INFO : Ignition finished successfully Feb 13 08:27:12.668074 systemd[1]: Starting ignition-mount.service... Feb 13 08:27:13.129561 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1033) Feb 13 08:27:13.129572 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 08:27:13.129579 kernel: BTRFS info (device sdb6): using free space tree Feb 13 08:27:13.129586 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 08:27:13.129593 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 08:27:12.697038 systemd[1]: Starting sysroot-boot.service... Feb 13 08:27:12.717238 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 08:27:12.717281 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 08:27:13.178731 ignition[1052]: INFO : Ignition 2.14.0 Feb 13 08:27:13.178731 ignition[1052]: INFO : Stage: files Feb 13 08:27:13.178731 ignition[1052]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 08:27:13.178731 ignition[1052]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 08:27:13.178731 ignition[1052]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 08:27:13.178731 ignition[1052]: DEBUG : files: compiled without relabeling support, skipping Feb 13 08:27:13.178731 ignition[1052]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 08:27:13.178731 ignition[1052]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 08:27:13.178731 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 08:27:13.410800 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1054) Feb 13 08:27:12.720542 systemd[1]: Finished sysroot-boot.service. Feb 13 08:27:13.417751 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem566670193" Feb 13 08:27:13.417751 ignition[1052]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem566670193": device or resource busy Feb 13 08:27:13.417751 ignition[1052]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem566670193", trying btrfs: device or resource busy Feb 13 08:27:13.417751 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem566670193" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem566670193" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem566670193" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem566670193" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 13 08:27:13.417751 ignition[1052]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 08:27:13.821710 kernel: audit: type=1130 audit(1707812833.502:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.929751 systemd[1]: Finished ignition-mount.service. Feb 13 08:27:13.837749 ignition[1052]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 08:27:13.837749 ignition[1052]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 08:27:13.837749 ignition[1052]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 08:27:13.837749 ignition[1052]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Feb 13 08:27:13.837749 ignition[1052]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Feb 13 08:27:13.837749 ignition[1052]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 08:27:13.837749 ignition[1052]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 08:27:13.837749 ignition[1052]: INFO : files: files passed Feb 13 08:27:13.837749 ignition[1052]: INFO : POST message to Packet Timeline Feb 13 08:27:13.837749 ignition[1052]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 08:27:13.837749 ignition[1052]: INFO : GET result: OK Feb 13 08:27:13.837749 ignition[1052]: INFO : Ignition finished successfully Feb 13 08:27:13.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:12.943743 systemd[1]: Starting ignition-files.service... Feb 13 08:27:13.007303 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 08:27:14.097797 initrd-setup-root-after-ignition[1084]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 08:27:13.143454 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 08:27:13.168442 unknown[1052]: wrote ssh authorized keys file for user: core Feb 13 08:27:14.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.228080 systemd[1]: mnt-oem566670193.mount: Deactivated successfully. Feb 13 08:27:13.481646 systemd[1]: Finished ignition-files.service. Feb 13 08:27:14.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.508744 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 08:27:14.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.569730 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 08:27:13.570052 systemd[1]: Starting ignition-quench.service... Feb 13 08:27:13.584820 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 08:27:13.614874 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 08:27:13.614937 systemd[1]: Finished ignition-quench.service. Feb 13 08:27:14.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.640854 systemd[1]: Reached target ignition-complete.target. Feb 13 08:27:14.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.664621 systemd[1]: Starting initrd-parse-etc.service... Feb 13 08:27:14.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.701401 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 08:27:14.337586 ignition[1099]: INFO : Ignition 2.14.0 Feb 13 08:27:14.337586 ignition[1099]: INFO : Stage: umount Feb 13 08:27:14.337586 ignition[1099]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 08:27:14.337586 ignition[1099]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 08:27:14.337586 ignition[1099]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 08:27:14.337586 ignition[1099]: INFO : umount: umount passed Feb 13 08:27:14.337586 ignition[1099]: INFO : POST message to Packet Timeline Feb 13 08:27:14.337586 ignition[1099]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 08:27:14.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.701474 systemd[1]: Finished initrd-parse-etc.service. Feb 13 08:27:14.481744 iscsid[901]: iscsid shutting down. Feb 13 08:27:14.496690 ignition[1099]: INFO : GET result: OK Feb 13 08:27:14.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.705791 systemd[1]: Reached target initrd-fs.target. Feb 13 08:27:14.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.731789 systemd[1]: Reached target initrd.target. Feb 13 08:27:13.759057 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 08:27:13.761311 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 08:27:13.794873 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 08:27:14.591849 ignition[1099]: INFO : Ignition finished successfully Feb 13 08:27:14.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.808583 systemd[1]: Starting initrd-cleanup.service... Feb 13 08:27:14.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.846462 systemd[1]: Stopped target nss-lookup.target. Feb 13 08:27:14.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.632000 audit: BPF prog-id=6 op=UNLOAD Feb 13 08:27:13.860172 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 08:27:13.881216 systemd[1]: Stopped target timers.target. Feb 13 08:27:14.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.901165 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 08:27:14.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.901540 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 08:27:14.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.923458 systemd[1]: Stopped target initrd.target. Feb 13 08:27:14.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.943165 systemd[1]: Stopped target basic.target. Feb 13 08:27:13.966145 systemd[1]: Stopped target ignition-complete.target. Feb 13 08:27:14.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:13.991175 systemd[1]: Stopped target ignition-diskful.target. Feb 13 08:27:14.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.007132 systemd[1]: Stopped target initrd-root-device.target. Feb 13 08:27:14.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.024170 systemd[1]: Stopped target remote-fs.target. Feb 13 08:27:14.042155 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 08:27:14.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.058191 systemd[1]: Stopped target sysinit.target. Feb 13 08:27:14.075190 systemd[1]: Stopped target local-fs.target. Feb 13 08:27:14.090161 systemd[1]: Stopped target local-fs-pre.target. Feb 13 08:27:14.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.107155 systemd[1]: Stopped target swap.target. Feb 13 08:27:14.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.128057 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 08:27:14.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.128415 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 08:27:14.144368 systemd[1]: Stopped target cryptsetup.target. Feb 13 08:27:14.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.160069 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 08:27:14.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.160427 systemd[1]: Stopped dracut-initqueue.service. Feb 13 08:27:14.177315 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 08:27:14.177687 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 08:27:14.192374 systemd[1]: Stopped target paths.target. Feb 13 08:27:14.208968 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 08:27:14.214673 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 08:27:14.235167 systemd[1]: Stopped target slices.target. Feb 13 08:27:14.249146 systemd[1]: Stopped target sockets.target. Feb 13 08:27:14.265171 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 08:27:14.265576 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 08:27:14.283258 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 08:27:14.283615 systemd[1]: Stopped ignition-files.service. Feb 13 08:27:14.298263 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 08:27:14.298652 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 08:27:14.317337 systemd[1]: Stopping ignition-mount.service... Feb 13 08:27:14.329758 systemd[1]: Stopping iscsid.service... Feb 13 08:27:15.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:14.345638 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 08:27:14.345810 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 08:27:14.367138 systemd[1]: Stopping sysroot-boot.service... Feb 13 08:27:14.382769 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 08:27:14.382907 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 08:27:14.403982 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 08:27:14.404063 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 08:27:14.423174 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 08:27:14.423916 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 08:27:14.423995 systemd[1]: Stopped iscsid.service. Feb 13 08:27:14.435144 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 08:27:14.435228 systemd[1]: Stopped sysroot-boot.service. Feb 13 08:27:14.457794 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 08:27:14.457963 systemd[1]: Closed iscsid.socket. Feb 13 08:27:14.473934 systemd[1]: Stopping iscsiuio.service... Feb 13 08:27:14.489198 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 08:27:14.489417 systemd[1]: Stopped iscsiuio.service. Feb 13 08:27:14.504240 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 08:27:14.504448 systemd[1]: Finished initrd-cleanup.service. Feb 13 08:27:14.522056 systemd[1]: Stopped target network.target. Feb 13 08:27:14.536836 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 08:27:14.536950 systemd[1]: Closed iscsiuio.socket. Feb 13 08:27:14.550998 systemd[1]: Stopping systemd-networkd.service... Feb 13 08:27:14.560623 systemd-networkd[881]: enp2s0f0np0: DHCPv6 lease lost Feb 13 08:27:14.569931 systemd[1]: Stopping systemd-resolved.service... Feb 13 08:27:14.570722 systemd-networkd[881]: enp2s0f1np1: DHCPv6 lease lost Feb 13 08:27:14.585327 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 08:27:15.152000 audit: BPF prog-id=9 op=UNLOAD Feb 13 08:27:14.585577 systemd[1]: Stopped systemd-resolved.service. Feb 13 08:27:14.601096 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 08:27:14.601344 systemd[1]: Stopped systemd-networkd.service. Feb 13 08:27:14.617281 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 08:27:14.617508 systemd[1]: Stopped ignition-mount.service. Feb 13 08:27:14.633098 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 08:27:14.633188 systemd[1]: Closed systemd-networkd.socket. Feb 13 08:27:14.647848 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 08:27:14.647998 systemd[1]: Stopped ignition-disks.service. Feb 13 08:27:14.663896 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 08:27:14.664019 systemd[1]: Stopped ignition-kargs.service. Feb 13 08:27:15.154472 systemd-journald[269]: Received SIGTERM from PID 1 (n/a). Feb 13 08:27:14.678967 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 08:27:14.679116 systemd[1]: Stopped ignition-setup.service. Feb 13 08:27:14.695959 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 08:27:14.696104 systemd[1]: Stopped initrd-setup-root.service. Feb 13 08:27:14.713730 systemd[1]: Stopping network-cleanup.service... Feb 13 08:27:14.725680 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 08:27:14.725908 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 08:27:14.740905 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 08:27:14.741032 systemd[1]: Stopped systemd-sysctl.service. Feb 13 08:27:14.758118 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 08:27:14.758255 systemd[1]: Stopped systemd-modules-load.service. Feb 13 08:27:14.775182 systemd[1]: Stopping systemd-udevd.service... Feb 13 08:27:14.793703 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 08:27:14.795164 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 08:27:14.795488 systemd[1]: Stopped systemd-udevd.service. Feb 13 08:27:14.807320 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 08:27:14.807463 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 08:27:14.820799 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 08:27:14.820895 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 08:27:14.836716 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 08:27:14.836843 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 08:27:14.852023 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 08:27:14.852183 systemd[1]: Stopped dracut-cmdline.service. Feb 13 08:27:14.866891 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 08:27:14.867038 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 08:27:14.883739 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 08:27:14.897660 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 08:27:14.897688 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 08:27:14.911749 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 08:27:14.911796 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 08:27:15.054652 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 08:27:15.054891 systemd[1]: Stopped network-cleanup.service. Feb 13 08:27:15.066087 systemd[1]: Reached target initrd-switch-root.target. Feb 13 08:27:15.082255 systemd[1]: Starting initrd-switch-root.service... Feb 13 08:27:15.106722 systemd[1]: Switching root. Feb 13 08:27:15.155135 systemd-journald[269]: Journal stopped Feb 13 08:27:18.891081 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 08:27:18.891094 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 08:27:18.891103 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 08:27:18.891109 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 08:27:18.891114 kernel: SELinux: policy capability open_perms=1 Feb 13 08:27:18.891119 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 08:27:18.891125 kernel: SELinux: policy capability always_check_network=0 Feb 13 08:27:18.891131 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 08:27:18.891136 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 08:27:18.891142 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 08:27:18.891147 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 08:27:18.891153 systemd[1]: Successfully loaded SELinux policy in 302.443ms. Feb 13 08:27:18.891160 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.643ms. Feb 13 08:27:18.891166 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 08:27:18.891174 systemd[1]: Detected architecture x86-64. Feb 13 08:27:18.891180 systemd[1]: Detected first boot. Feb 13 08:27:18.891186 systemd[1]: Hostname set to . Feb 13 08:27:18.891192 systemd[1]: Initializing machine ID from random generator. Feb 13 08:27:18.891198 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 08:27:18.891204 systemd[1]: Populated /etc with preset unit settings. Feb 13 08:27:18.891210 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 08:27:18.891217 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 08:27:18.891224 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 08:27:18.891230 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 13 08:27:18.891235 kernel: audit: type=1334 audit(1707812837.439:92): prog-id=12 op=LOAD Feb 13 08:27:18.891241 kernel: audit: type=1334 audit(1707812837.439:93): prog-id=3 op=UNLOAD Feb 13 08:27:18.891247 kernel: audit: type=1334 audit(1707812837.481:94): prog-id=13 op=LOAD Feb 13 08:27:18.891253 kernel: audit: type=1334 audit(1707812837.522:95): prog-id=14 op=LOAD Feb 13 08:27:18.891259 kernel: audit: type=1334 audit(1707812837.522:96): prog-id=4 op=UNLOAD Feb 13 08:27:18.891264 kernel: audit: type=1334 audit(1707812837.522:97): prog-id=5 op=UNLOAD Feb 13 08:27:18.891270 kernel: audit: type=1334 audit(1707812837.563:98): prog-id=15 op=LOAD Feb 13 08:27:18.891275 kernel: audit: type=1334 audit(1707812837.563:99): prog-id=12 op=UNLOAD Feb 13 08:27:18.891280 kernel: audit: type=1334 audit(1707812837.601:100): prog-id=16 op=LOAD Feb 13 08:27:18.891286 kernel: audit: type=1334 audit(1707812837.638:101): prog-id=17 op=LOAD Feb 13 08:27:18.891292 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 08:27:18.891298 systemd[1]: Stopped initrd-switch-root.service. Feb 13 08:27:18.891304 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 08:27:18.891311 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 08:27:18.891317 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 08:27:18.891323 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 08:27:18.891331 systemd[1]: Created slice system-getty.slice. Feb 13 08:27:18.891337 systemd[1]: Created slice system-modprobe.slice. Feb 13 08:27:18.891343 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 08:27:18.891350 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 08:27:18.891357 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 08:27:18.891364 systemd[1]: Created slice user.slice. Feb 13 08:27:18.891370 systemd[1]: Started systemd-ask-password-console.path. Feb 13 08:27:18.891376 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 08:27:18.891382 systemd[1]: Set up automount boot.automount. Feb 13 08:27:18.891388 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 08:27:18.891394 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 08:27:18.891400 systemd[1]: Stopped target initrd-fs.target. Feb 13 08:27:18.891407 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 08:27:18.891414 systemd[1]: Reached target integritysetup.target. Feb 13 08:27:18.891420 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 08:27:18.891426 systemd[1]: Reached target remote-fs.target. Feb 13 08:27:18.891432 systemd[1]: Reached target slices.target. Feb 13 08:27:18.891439 systemd[1]: Reached target swap.target. Feb 13 08:27:18.891445 systemd[1]: Reached target torcx.target. Feb 13 08:27:18.891451 systemd[1]: Reached target veritysetup.target. Feb 13 08:27:18.891458 systemd[1]: Listening on systemd-coredump.socket. Feb 13 08:27:18.891464 systemd[1]: Listening on systemd-initctl.socket. Feb 13 08:27:18.891473 systemd[1]: Listening on systemd-networkd.socket. Feb 13 08:27:18.891480 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 08:27:18.891487 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 08:27:18.891494 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 08:27:18.891500 systemd[1]: Mounting dev-hugepages.mount... Feb 13 08:27:18.891507 systemd[1]: Mounting dev-mqueue.mount... Feb 13 08:27:18.891513 systemd[1]: Mounting media.mount... Feb 13 08:27:18.891520 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 08:27:18.891526 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 08:27:18.891533 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 08:27:18.891539 systemd[1]: Mounting tmp.mount... Feb 13 08:27:18.891546 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 08:27:18.891553 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 08:27:18.891559 systemd[1]: Starting kmod-static-nodes.service... Feb 13 08:27:18.891566 systemd[1]: Starting modprobe@configfs.service... Feb 13 08:27:18.891572 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 08:27:18.891578 systemd[1]: Starting modprobe@drm.service... Feb 13 08:27:18.891585 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 08:27:18.891591 systemd[1]: Starting modprobe@fuse.service... Feb 13 08:27:18.891597 kernel: fuse: init (API version 7.34) Feb 13 08:27:18.891603 systemd[1]: Starting modprobe@loop.service... Feb 13 08:27:18.891610 kernel: loop: module loaded Feb 13 08:27:18.891617 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 08:27:18.891623 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 08:27:18.891629 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 08:27:18.891636 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 08:27:18.891642 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 08:27:18.891649 systemd[1]: Stopped systemd-journald.service. Feb 13 08:27:18.891655 systemd[1]: Starting systemd-journald.service... Feb 13 08:27:18.891661 systemd[1]: Starting systemd-modules-load.service... Feb 13 08:27:18.891671 systemd-journald[1251]: Journal started Feb 13 08:27:18.891695 systemd-journald[1251]: Runtime Journal (/run/log/journal/2774cfc0f03e4e4cab11a6b71386332f) is 8.0M, max 636.8M, 628.8M free. Feb 13 08:27:15.556000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 08:27:15.821000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 08:27:15.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 08:27:15.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 08:27:15.823000 audit: BPF prog-id=10 op=LOAD Feb 13 08:27:15.823000 audit: BPF prog-id=10 op=UNLOAD Feb 13 08:27:15.823000 audit: BPF prog-id=11 op=LOAD Feb 13 08:27:15.823000 audit: BPF prog-id=11 op=UNLOAD Feb 13 08:27:15.892000 audit[1140]: AVC avc: denied { associate } for pid=1140 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 08:27:15.892000 audit[1140]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1123 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:15.892000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 08:27:15.916000 audit[1140]: AVC avc: denied { associate } for pid=1140 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 08:27:15.916000 audit[1140]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b5 a2=1ed a3=0 items=2 ppid=1123 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:15.916000 audit: CWD cwd="/" Feb 13 08:27:15.916000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:15.916000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:15.916000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 08:27:17.439000 audit: BPF prog-id=12 op=LOAD Feb 13 08:27:17.439000 audit: BPF prog-id=3 op=UNLOAD Feb 13 08:27:17.481000 audit: BPF prog-id=13 op=LOAD Feb 13 08:27:17.522000 audit: BPF prog-id=14 op=LOAD Feb 13 08:27:17.522000 audit: BPF prog-id=4 op=UNLOAD Feb 13 08:27:17.522000 audit: BPF prog-id=5 op=UNLOAD Feb 13 08:27:17.563000 audit: BPF prog-id=15 op=LOAD Feb 13 08:27:17.563000 audit: BPF prog-id=12 op=UNLOAD Feb 13 08:27:17.601000 audit: BPF prog-id=16 op=LOAD Feb 13 08:27:17.638000 audit: BPF prog-id=17 op=LOAD Feb 13 08:27:17.638000 audit: BPF prog-id=13 op=UNLOAD Feb 13 08:27:17.638000 audit: BPF prog-id=14 op=UNLOAD Feb 13 08:27:17.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:17.699000 audit: BPF prog-id=15 op=UNLOAD Feb 13 08:27:17.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:17.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:18.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:18.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:18.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:18.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:18.863000 audit: BPF prog-id=18 op=LOAD Feb 13 08:27:18.863000 audit: BPF prog-id=19 op=LOAD Feb 13 08:27:18.863000 audit: BPF prog-id=20 op=LOAD Feb 13 08:27:18.863000 audit: BPF prog-id=16 op=UNLOAD Feb 13 08:27:18.863000 audit: BPF prog-id=17 op=UNLOAD Feb 13 08:27:18.887000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 08:27:18.887000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe2aeb8f30 a2=4000 a3=7ffe2aeb8fcc items=0 ppid=1 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:18.887000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 08:27:17.439333 systemd[1]: Queued start job for default target multi-user.target. Feb 13 08:27:15.890283 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 08:27:17.640790 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 08:27:15.890853 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 08:27:15.890866 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 08:27:15.890886 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 08:27:15.890893 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 08:27:15.890913 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 08:27:15.890921 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 08:27:15.891052 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 08:27:15.891076 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 08:27:15.891084 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 08:27:15.891497 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 08:27:15.891519 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 08:27:15.891532 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 08:27:15.891541 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 08:27:15.891552 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 08:27:15.891561 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 08:27:17.087636 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 08:27:17.087778 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 08:27:17.087834 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 08:27:17.087927 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 08:27:17.087958 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 08:27:17.087992 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-13T08:27:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 08:27:18.921671 systemd[1]: Starting systemd-network-generator.service... Feb 13 08:27:18.943474 systemd[1]: Starting systemd-remount-fs.service... Feb 13 08:27:18.965524 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 08:27:18.997974 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 08:27:18.997994 systemd[1]: Stopped verity-setup.service. Feb 13 08:27:19.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.032516 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 08:27:19.046475 systemd[1]: Started systemd-journald.service. Feb 13 08:27:19.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.055017 systemd[1]: Mounted dev-hugepages.mount. Feb 13 08:27:19.062760 systemd[1]: Mounted dev-mqueue.mount. Feb 13 08:27:19.069723 systemd[1]: Mounted media.mount. Feb 13 08:27:19.076744 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 08:27:19.085716 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 08:27:19.094715 systemd[1]: Mounted tmp.mount. Feb 13 08:27:19.101784 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 08:27:19.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.110854 systemd[1]: Finished kmod-static-nodes.service. Feb 13 08:27:19.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.119973 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 08:27:19.120098 systemd[1]: Finished modprobe@configfs.service. Feb 13 08:27:19.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.128906 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 08:27:19.129037 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 08:27:19.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.138015 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 08:27:19.138201 systemd[1]: Finished modprobe@drm.service. Feb 13 08:27:19.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.147259 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 08:27:19.147569 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 08:27:19.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.156311 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 08:27:19.156634 systemd[1]: Finished modprobe@fuse.service. Feb 13 08:27:19.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.165288 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 08:27:19.165755 systemd[1]: Finished modprobe@loop.service. Feb 13 08:27:19.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.174339 systemd[1]: Finished systemd-modules-load.service. Feb 13 08:27:19.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.183300 systemd[1]: Finished systemd-network-generator.service. Feb 13 08:27:19.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.192271 systemd[1]: Finished systemd-remount-fs.service. Feb 13 08:27:19.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.201274 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 08:27:19.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.211034 systemd[1]: Reached target network-pre.target. Feb 13 08:27:19.222290 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 08:27:19.233342 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 08:27:19.240729 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 08:27:19.241664 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 08:27:19.249057 systemd[1]: Starting systemd-journal-flush.service... Feb 13 08:27:19.252269 systemd-journald[1251]: Time spent on flushing to /var/log/journal/2774cfc0f03e4e4cab11a6b71386332f is 14.353ms for 1588 entries. Feb 13 08:27:19.252269 systemd-journald[1251]: System Journal (/var/log/journal/2774cfc0f03e4e4cab11a6b71386332f) is 8.0M, max 195.6M, 187.6M free. Feb 13 08:27:19.293696 systemd-journald[1251]: Received client request to flush runtime journal. Feb 13 08:27:19.265597 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 08:27:19.266088 systemd[1]: Starting systemd-random-seed.service... Feb 13 08:27:19.276603 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 08:27:19.277096 systemd[1]: Starting systemd-sysctl.service... Feb 13 08:27:19.284150 systemd[1]: Starting systemd-sysusers.service... Feb 13 08:27:19.291114 systemd[1]: Starting systemd-udev-settle.service... Feb 13 08:27:19.298830 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 08:27:19.306607 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 08:27:19.314676 systemd[1]: Finished systemd-journal-flush.service. Feb 13 08:27:19.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.322700 systemd[1]: Finished systemd-random-seed.service. Feb 13 08:27:19.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.330703 systemd[1]: Finished systemd-sysctl.service. Feb 13 08:27:19.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.338684 systemd[1]: Finished systemd-sysusers.service. Feb 13 08:27:19.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.347840 systemd[1]: Reached target first-boot-complete.target. Feb 13 08:27:19.355793 udevadm[1267]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 08:27:19.544830 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 08:27:19.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.554000 audit: BPF prog-id=21 op=LOAD Feb 13 08:27:19.554000 audit: BPF prog-id=22 op=LOAD Feb 13 08:27:19.554000 audit: BPF prog-id=7 op=UNLOAD Feb 13 08:27:19.554000 audit: BPF prog-id=8 op=UNLOAD Feb 13 08:27:19.555819 systemd[1]: Starting systemd-udevd.service... Feb 13 08:27:19.567624 systemd-udevd[1268]: Using default interface naming scheme 'v252'. Feb 13 08:27:19.586186 systemd[1]: Started systemd-udevd.service. Feb 13 08:27:19.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.597693 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 08:27:19.596000 audit: BPF prog-id=23 op=LOAD Feb 13 08:27:19.598871 systemd[1]: Starting systemd-networkd.service... Feb 13 08:27:19.617000 audit: BPF prog-id=24 op=LOAD Feb 13 08:27:19.631779 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 08:27:19.631872 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 08:27:19.631904 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 08:27:19.631000 audit: BPF prog-id=25 op=LOAD Feb 13 08:27:19.631000 audit: BPF prog-id=26 op=LOAD Feb 13 08:27:19.632414 systemd[1]: Starting systemd-userdbd.service... Feb 13 08:27:19.648313 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1335) Feb 13 08:27:19.669476 kernel: ACPI: button: Power Button [PWRF] Feb 13 08:27:19.699480 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 08:27:19.699529 kernel: IPMI message handler: version 39.2 Feb 13 08:27:19.702742 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 08:27:19.635000 audit[1345]: AVC avc: denied { confidentiality } for pid=1345 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 08:27:19.733476 kernel: ipmi device interface Feb 13 08:27:19.635000 audit[1345]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ff37c0a4c0 a1=4d8bc a2=7f32b24f5bc5 a3=5 items=42 ppid=1268 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:19.635000 audit: CWD cwd="/" Feb 13 08:27:19.635000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=1 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=2 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=3 name=(null) inode=19777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=4 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=5 name=(null) inode=19778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=6 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=7 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=8 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=9 name=(null) inode=19780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=10 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=11 name=(null) inode=19781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=12 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=13 name=(null) inode=19782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=14 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=15 name=(null) inode=19783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=16 name=(null) inode=19779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=17 name=(null) inode=19784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=18 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=19 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=20 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=21 name=(null) inode=19786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=22 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=23 name=(null) inode=19787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=24 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=25 name=(null) inode=19788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=26 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=27 name=(null) inode=19789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=28 name=(null) inode=19785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=29 name=(null) inode=19790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=30 name=(null) inode=19776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=31 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=32 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=33 name=(null) inode=19792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=34 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=35 name=(null) inode=19793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=36 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=37 name=(null) inode=19794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=38 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=39 name=(null) inode=19795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=40 name=(null) inode=19791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PATH item=41 name=(null) inode=19796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 08:27:19.635000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 08:27:19.751716 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 08:27:19.758187 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 08:27:19.789486 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 08:27:19.796206 systemd[1]: Started systemd-userdbd.service. Feb 13 08:27:19.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:19.834915 kernel: ipmi_si: IPMI System Interface driver Feb 13 08:27:19.834942 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 08:27:19.835021 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 08:27:19.852392 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 08:27:19.868327 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 08:27:19.902266 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 08:27:19.902388 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 08:27:19.902480 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 08:27:19.956512 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 08:27:19.956542 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 08:27:19.990414 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 08:27:20.010688 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 08:27:20.033479 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 13 08:27:20.073479 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 08:27:20.077505 systemd-networkd[1316]: bond0: netdev ready Feb 13 08:27:20.079544 systemd-networkd[1316]: lo: Link UP Feb 13 08:27:20.079546 systemd-networkd[1316]: lo: Gained carrier Feb 13 08:27:20.080001 systemd-networkd[1316]: Enumeration completed Feb 13 08:27:20.080061 systemd[1]: Started systemd-networkd.service. Feb 13 08:27:20.080279 systemd-networkd[1316]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 08:27:20.082314 systemd-networkd[1316]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:a5:ed.network. Feb 13 08:27:20.115338 kernel: intel_rapl_common: Found RAPL domain package Feb 13 08:27:20.115377 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 13 08:27:20.115457 kernel: intel_rapl_common: Found RAPL domain core Feb 13 08:27:20.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.146218 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 08:27:20.149698 kernel: intel_rapl_common: Found RAPL domain uncore Feb 13 08:27:20.149721 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 08:27:20.267474 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 08:27:20.285475 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 08:27:20.287670 systemd[1]: Finished systemd-udev-settle.service. Feb 13 08:27:20.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.296295 systemd[1]: Starting lvm2-activation-early.service... Feb 13 08:27:20.311964 lvm[1375]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 08:27:20.336877 systemd[1]: Finished lvm2-activation-early.service. Feb 13 08:27:20.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.345549 systemd[1]: Reached target cryptsetup.target. Feb 13 08:27:20.354140 systemd[1]: Starting lvm2-activation.service... Feb 13 08:27:20.356458 lvm[1376]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 08:27:20.378872 systemd[1]: Finished lvm2-activation.service. Feb 13 08:27:20.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.386539 systemd[1]: Reached target local-fs-pre.target. Feb 13 08:27:20.394506 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 08:27:20.394519 systemd[1]: Reached target local-fs.target. Feb 13 08:27:20.402502 systemd[1]: Reached target machines.target. Feb 13 08:27:20.411079 systemd[1]: Starting ldconfig.service... Feb 13 08:27:20.418195 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 08:27:20.418217 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 08:27:20.418717 systemd[1]: Starting systemd-boot-update.service... Feb 13 08:27:20.425913 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 08:27:20.435992 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 08:27:20.436064 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 08:27:20.436087 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 08:27:20.436562 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 08:27:20.436758 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1378 (bootctl) Feb 13 08:27:20.437319 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 08:27:20.452216 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 08:27:20.452543 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 08:27:20.453164 systemd-tmpfiles[1382]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 08:27:20.456268 systemd-tmpfiles[1382]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 08:27:20.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.456954 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 08:27:20.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.460828 systemd-tmpfiles[1382]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 08:27:20.512677 systemd-fsck[1386]: fsck.fat 4.2 (2021-01-31) Feb 13 08:27:20.512677 systemd-fsck[1386]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 13 08:27:20.513399 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 08:27:20.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.523262 systemd[1]: Mounting boot.mount... Feb 13 08:27:20.534921 systemd[1]: Mounted boot.mount. Feb 13 08:27:20.552878 systemd[1]: Finished systemd-boot-update.service. Feb 13 08:27:20.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.581709 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 08:27:20.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:20.590407 systemd[1]: Starting audit-rules.service... Feb 13 08:27:20.598116 systemd[1]: Starting clean-ca-certificates.service... Feb 13 08:27:20.608096 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 08:27:20.610000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 08:27:20.610000 audit[1406]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3bf3ccf0 a2=420 a3=0 items=0 ppid=1389 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:20.610000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 08:27:20.612405 augenrules[1406]: No rules Feb 13 08:27:20.617503 systemd[1]: Starting systemd-resolved.service... Feb 13 08:27:20.625337 systemd[1]: Starting systemd-timesyncd.service... Feb 13 08:27:20.632991 systemd[1]: Starting systemd-update-utmp.service... Feb 13 08:27:20.640770 systemd[1]: Finished audit-rules.service. Feb 13 08:27:20.647697 systemd[1]: Finished clean-ca-certificates.service. Feb 13 08:27:20.655682 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 08:27:20.667023 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 08:27:20.667497 systemd[1]: Finished systemd-update-utmp.service. Feb 13 08:27:20.692474 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 08:27:20.707111 ldconfig[1377]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 08:27:20.709649 systemd[1]: Finished ldconfig.service. Feb 13 08:27:20.715474 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 13 08:27:20.715495 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 08:27:20.735479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 08:27:20.740446 systemd-resolved[1411]: Positive Trust Anchors: Feb 13 08:27:20.740450 systemd-resolved[1411]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 08:27:20.740474 systemd-resolved[1411]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 08:27:20.744435 systemd-resolved[1411]: Using system hostname 'ci-3510.3.2-a-99b6014e22'. Feb 13 08:27:20.748632 systemd[1]: Started systemd-timesyncd.service. Feb 13 08:27:20.754194 systemd-networkd[1316]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:a5:ec.network. Feb 13 08:27:20.761758 systemd[1]: Reached target time-set.target. Feb 13 08:27:20.771124 systemd[1]: Starting systemd-update-done.service... Feb 13 08:27:20.777652 systemd[1]: Finished systemd-update-done.service. Feb 13 08:27:20.861540 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 08:27:20.947541 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 08:27:20.979497 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 13 08:27:20.981365 systemd-networkd[1316]: bond0: Link UP Feb 13 08:27:20.982201 systemd[1]: Started systemd-resolved.service. Feb 13 08:27:20.999753 systemd[1]: Reached target network.target. Feb 13 08:27:21.011547 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 08:27:21.011657 kernel: bond0: active interface up! Feb 13 08:27:21.044520 systemd[1]: Reached target nss-lookup.target. Feb 13 08:27:21.048474 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 13 08:27:21.048593 systemd-networkd[1316]: enp2s0f1np1: Link UP Feb 13 08:27:21.048757 systemd-networkd[1316]: enp2s0f1np1: Gained carrier Feb 13 08:27:21.049744 systemd-networkd[1316]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:a5:ec.network. Feb 13 08:27:21.056592 systemd[1]: Reached target sysinit.target. Feb 13 08:27:21.064661 systemd[1]: Started motdgen.path. Feb 13 08:27:21.081534 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 08:27:21.094512 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 08:27:21.102627 systemd[1]: Started logrotate.timer. Feb 13 08:27:21.110552 systemd[1]: Started mdadm.timer. Feb 13 08:27:21.117518 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 08:27:21.125505 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 08:27:21.125523 systemd[1]: Reached target paths.target. Feb 13 08:27:21.132543 systemd[1]: Reached target timers.target. Feb 13 08:27:21.139693 systemd[1]: Listening on dbus.socket. Feb 13 08:27:21.147101 systemd[1]: Starting docker.socket... Feb 13 08:27:21.162637 systemd[1]: Listening on sshd.socket. Feb 13 08:27:21.173477 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 08:27:21.175574 systemd-networkd[1316]: bond0: Gained carrier Feb 13 08:27:21.175698 systemd-networkd[1316]: enp2s0f0np0: Link UP Feb 13 08:27:21.175718 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.175837 systemd-networkd[1316]: enp2s0f0np0: Gained carrier Feb 13 08:27:21.188648 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 08:27:21.189017 systemd[1]: Listening on docker.socket. Feb 13 08:27:21.195474 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 08:27:21.195516 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 13 08:27:21.220621 systemd[1]: Reached target sockets.target. Feb 13 08:27:21.220715 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.220895 systemd-networkd[1316]: enp2s0f1np1: Link DOWN Feb 13 08:27:21.220898 systemd-networkd[1316]: enp2s0f1np1: Lost carrier Feb 13 08:27:21.228593 systemd[1]: Reached target basic.target. Feb 13 08:27:21.235599 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 08:27:21.235614 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 08:27:21.236058 systemd[1]: Starting containerd.service... Feb 13 08:27:21.236642 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.236823 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.242983 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 08:27:21.252009 systemd[1]: Starting coreos-metadata.service... Feb 13 08:27:21.259009 systemd[1]: Starting dbus.service... Feb 13 08:27:21.264960 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 08:27:21.269754 jq[1426]: false Feb 13 08:27:21.270442 coreos-metadata[1419]: Feb 13 08:27:21.270 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 08:27:21.272045 systemd[1]: Starting extend-filesystems.service... Feb 13 08:27:21.276686 dbus-daemon[1425]: [system] SELinux support is enabled Feb 13 08:27:21.278518 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 08:27:21.279098 systemd[1]: Starting motdgen.service... Feb 13 08:27:21.279208 extend-filesystems[1428]: Found sda Feb 13 08:27:21.279208 extend-filesystems[1428]: Found sdb Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb1 Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb2 Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb3 Feb 13 08:27:21.308800 extend-filesystems[1428]: Found usr Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb4 Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb6 Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb7 Feb 13 08:27:21.308800 extend-filesystems[1428]: Found sdb9 Feb 13 08:27:21.308800 extend-filesystems[1428]: Checking size of /dev/sdb9 Feb 13 08:27:21.308800 extend-filesystems[1428]: Resized partition /dev/sdb9 Feb 13 08:27:21.499522 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 13 08:27:21.499556 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 08:27:21.499687 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 13 08:27:21.499706 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 13 08:27:21.499726 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 13 08:27:21.499766 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 08:27:21.499811 coreos-metadata[1422]: Feb 13 08:27:21.279 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 08:27:21.286208 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 08:27:21.499998 extend-filesystems[1443]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 08:27:21.322171 systemd[1]: Starting sshd-keygen.service... Feb 13 08:27:21.341851 systemd[1]: Starting systemd-logind.service... Feb 13 08:27:21.359502 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 08:27:21.360009 systemd[1]: Starting tcsd.service... Feb 13 08:27:21.515877 update_engine[1455]: I0213 08:27:21.412101 1455 main.cc:92] Flatcar Update Engine starting Feb 13 08:27:21.515877 update_engine[1455]: I0213 08:27:21.415988 1455 update_check_scheduler.cc:74] Next update check in 11m32s Feb 13 08:27:21.363962 systemd-logind[1453]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 08:27:21.516173 jq[1456]: true Feb 13 08:27:21.363972 systemd-logind[1453]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 08:27:21.363982 systemd-logind[1453]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 08:27:21.364146 systemd-logind[1453]: New seat seat0. Feb 13 08:27:21.366795 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 08:27:21.367161 systemd[1]: Starting update-engine.service... Feb 13 08:27:21.395925 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 08:27:21.446563 systemd-networkd[1316]: enp2s0f1np1: Link UP Feb 13 08:27:21.446725 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.446763 systemd-networkd[1316]: enp2s0f1np1: Gained carrier Feb 13 08:27:21.446764 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.462795 systemd[1]: Started dbus.service. Feb 13 08:27:21.492662 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.492776 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:21.493718 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 08:27:21.493810 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 08:27:21.493967 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 08:27:21.494044 systemd[1]: Finished motdgen.service. Feb 13 08:27:21.507643 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 08:27:21.507716 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 08:27:21.526106 jq[1458]: true Feb 13 08:27:21.527545 dbus-daemon[1425]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 08:27:21.530603 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 08:27:21.530710 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 08:27:21.532898 systemd[1]: Started update-engine.service. Feb 13 08:27:21.534957 env[1459]: time="2024-02-13T08:27:21.534936481Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 08:27:21.543258 env[1459]: time="2024-02-13T08:27:21.543243887Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 08:27:21.543326 systemd[1]: Started systemd-logind.service. Feb 13 08:27:21.544836 env[1459]: time="2024-02-13T08:27:21.544824075Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 08:27:21.545419 env[1459]: time="2024-02-13T08:27:21.545403821Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 08:27:21.545460 env[1459]: time="2024-02-13T08:27:21.545419290Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 08:27:21.545535 env[1459]: time="2024-02-13T08:27:21.545523880Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 08:27:21.545567 env[1459]: time="2024-02-13T08:27:21.545534012Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 08:27:21.545567 env[1459]: time="2024-02-13T08:27:21.545541949Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 08:27:21.545567 env[1459]: time="2024-02-13T08:27:21.545547507Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 08:27:21.546923 env[1459]: time="2024-02-13T08:27:21.545589087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 08:27:21.547441 env[1459]: time="2024-02-13T08:27:21.547429492Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 08:27:21.547517 env[1459]: time="2024-02-13T08:27:21.547506160Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 08:27:21.547548 env[1459]: time="2024-02-13T08:27:21.547517116Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 08:27:21.547548 env[1459]: time="2024-02-13T08:27:21.547544171Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 08:27:21.549036 env[1459]: time="2024-02-13T08:27:21.547551984Z" level=info msg="metadata content store policy set" policy=shared Feb 13 08:27:21.553251 systemd[1]: Started locksmithd.service. Feb 13 08:27:21.559579 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 08:27:21.559663 systemd[1]: Reached target system-config.target. Feb 13 08:27:21.561596 bash[1485]: Updated "/home/core/.ssh/authorized_keys" Feb 13 08:27:21.567118 env[1459]: time="2024-02-13T08:27:21.567067842Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 08:27:21.567118 env[1459]: time="2024-02-13T08:27:21.567084930Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 08:27:21.567118 env[1459]: time="2024-02-13T08:27:21.567093369Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 08:27:21.567118 env[1459]: time="2024-02-13T08:27:21.567110377Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567118 env[1459]: time="2024-02-13T08:27:21.567118798Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567126399Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567133364Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567140618Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567147848Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567155144Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567162020Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567213 env[1459]: time="2024-02-13T08:27:21.567168886Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 08:27:21.567313 env[1459]: time="2024-02-13T08:27:21.567216662Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 08:27:21.567313 env[1459]: time="2024-02-13T08:27:21.567263458Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 08:27:21.567409 env[1459]: time="2024-02-13T08:27:21.567395508Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 08:27:21.567427 env[1459]: time="2024-02-13T08:27:21.567418603Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567446 env[1459]: time="2024-02-13T08:27:21.567427761Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 08:27:21.567462 env[1459]: time="2024-02-13T08:27:21.567455216Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567482 env[1459]: time="2024-02-13T08:27:21.567463540Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567498 env[1459]: time="2024-02-13T08:27:21.567478893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567498 env[1459]: time="2024-02-13T08:27:21.567490134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567535 env[1459]: time="2024-02-13T08:27:21.567501513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567535 env[1459]: time="2024-02-13T08:27:21.567513175Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567535 env[1459]: time="2024-02-13T08:27:21.567524410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567593 env[1459]: time="2024-02-13T08:27:21.567535507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567593 env[1459]: time="2024-02-13T08:27:21.567549066Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 08:27:21.567597 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 08:27:21.567672 env[1459]: time="2024-02-13T08:27:21.567640437Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567672 env[1459]: time="2024-02-13T08:27:21.567654707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567672 env[1459]: time="2024-02-13T08:27:21.567666225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.567718 env[1459]: time="2024-02-13T08:27:21.567677658Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 08:27:21.567718 env[1459]: time="2024-02-13T08:27:21.567694706Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 08:27:21.567718 env[1459]: time="2024-02-13T08:27:21.567706710Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 08:27:21.567790 env[1459]: time="2024-02-13T08:27:21.567722606Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 08:27:21.567720 systemd[1]: Reached target user-config.target. Feb 13 08:27:21.567946 env[1459]: time="2024-02-13T08:27:21.567808627Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 08:27:21.568185 env[1459]: time="2024-02-13T08:27:21.568154456Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568191247Z" level=info msg="Connect containerd service" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568210432Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568478422Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568571894Z" level=info msg="Start subscribing containerd event" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568593403Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568600466Z" level=info msg="Start recovering state" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568617574Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568632802Z" level=info msg="Start event monitor" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568639110Z" level=info msg="containerd successfully booted in 0.034056s" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568645985Z" level=info msg="Start snapshots syncer" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568654565Z" level=info msg="Start cni network conf syncer for default" Feb 13 08:27:21.570201 env[1459]: time="2024-02-13T08:27:21.568659203Z" level=info msg="Start streaming server" Feb 13 08:27:21.576964 systemd[1]: Started containerd.service. Feb 13 08:27:21.583737 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 08:27:21.608770 locksmithd[1494]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 08:27:21.799505 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 13 08:27:21.825030 extend-filesystems[1443]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 13 08:27:21.825030 extend-filesystems[1443]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 08:27:21.825030 extend-filesystems[1443]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 13 08:27:21.863545 extend-filesystems[1428]: Resized filesystem in /dev/sdb9 Feb 13 08:27:21.825445 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 08:27:21.825563 systemd[1]: Finished extend-filesystems.service. Feb 13 08:27:22.064573 systemd-networkd[1316]: bond0: Gained IPv6LL Feb 13 08:27:22.064846 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:22.071956 sshd_keygen[1452]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 08:27:22.083877 systemd[1]: Finished sshd-keygen.service. Feb 13 08:27:22.092383 systemd[1]: Starting issuegen.service... Feb 13 08:27:22.100778 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 08:27:22.100861 systemd[1]: Finished issuegen.service. Feb 13 08:27:22.109320 systemd[1]: Starting systemd-user-sessions.service... Feb 13 08:27:22.118748 systemd[1]: Finished systemd-user-sessions.service. Feb 13 08:27:22.127213 systemd[1]: Started getty@tty1.service. Feb 13 08:27:22.134150 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 08:27:22.142627 systemd[1]: Reached target getty.target. Feb 13 08:27:22.960836 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:22.960925 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:22.961852 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 08:27:22.971778 systemd[1]: Reached target network-online.target. Feb 13 08:27:23.992697 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 08:27:27.156232 login[1520]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 08:27:27.162787 systemd[1]: Created slice user-500.slice. Feb 13 08:27:27.163343 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 08:27:27.163513 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 08:27:27.164283 systemd-logind[1453]: New session 1 of user core. Feb 13 08:27:27.166236 systemd-logind[1453]: New session 2 of user core. Feb 13 08:27:27.168487 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 08:27:27.169159 systemd[1]: Starting user@500.service... Feb 13 08:27:27.170933 (systemd)[1524]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:27.236879 systemd[1524]: Queued start job for default target default.target. Feb 13 08:27:27.237100 systemd[1524]: Reached target paths.target. Feb 13 08:27:27.237130 systemd[1524]: Reached target sockets.target. Feb 13 08:27:27.237138 systemd[1524]: Reached target timers.target. Feb 13 08:27:27.237145 systemd[1524]: Reached target basic.target. Feb 13 08:27:27.237164 systemd[1524]: Reached target default.target. Feb 13 08:27:27.237177 systemd[1524]: Startup finished in 63ms. Feb 13 08:27:27.237225 systemd[1]: Started user@500.service. Feb 13 08:27:27.237791 systemd[1]: Started session-1.scope. Feb 13 08:27:27.238120 systemd[1]: Started session-2.scope. Feb 13 08:27:27.441859 coreos-metadata[1422]: Feb 13 08:27:27.441 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 08:27:27.442599 coreos-metadata[1419]: Feb 13 08:27:27.441 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 08:27:28.442173 coreos-metadata[1422]: Feb 13 08:27:28.442 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 08:27:28.442939 coreos-metadata[1419]: Feb 13 08:27:28.442 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 08:27:29.007517 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 13 08:27:29.007693 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 13 08:27:29.516380 coreos-metadata[1419]: Feb 13 08:27:29.516 INFO Fetch successful Feb 13 08:27:29.516652 coreos-metadata[1422]: Feb 13 08:27:29.516 INFO Fetch successful Feb 13 08:27:29.539424 systemd[1]: Finished coreos-metadata.service. Feb 13 08:27:29.540368 systemd[1]: Starting etcd-member.service... Feb 13 08:27:29.541044 systemd[1]: Started packet-phone-home.service. Feb 13 08:27:29.549804 unknown[1419]: wrote ssh authorized keys file for user: core Feb 13 08:27:29.553462 curl[1547]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 08:27:29.553640 curl[1547]: Dload Upload Total Spent Left Speed Feb 13 08:27:29.563764 systemd[1]: Starting docker.service... Feb 13 08:27:29.566254 update-ssh-keys[1557]: Updated "/home/core/.ssh/authorized_keys" Feb 13 08:27:29.566527 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 08:27:29.580571 env[1563]: time="2024-02-13T08:27:29.580546421Z" level=info msg="Starting up" Feb 13 08:27:29.581216 env[1563]: time="2024-02-13T08:27:29.581177192Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 08:27:29.581216 env[1563]: time="2024-02-13T08:27:29.581185965Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 08:27:29.581216 env[1563]: time="2024-02-13T08:27:29.581198698Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 08:27:29.581216 env[1563]: time="2024-02-13T08:27:29.581204678Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 08:27:29.582027 env[1563]: time="2024-02-13T08:27:29.582001987Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 08:27:29.582027 env[1563]: time="2024-02-13T08:27:29.582010047Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 08:27:29.582119 env[1563]: time="2024-02-13T08:27:29.582034079Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 08:27:29.582119 env[1563]: time="2024-02-13T08:27:29.582042749Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 08:27:29.595936 env[1563]: time="2024-02-13T08:27:29.595896238Z" level=info msg="Loading containers: start." Feb 13 08:27:29.669488 kernel: Initializing XFRM netlink socket Feb 13 08:27:29.713016 env[1563]: time="2024-02-13T08:27:29.712958935Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 08:27:29.713960 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:29.714082 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:29.720396 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:29.720620 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:29.745192 curl[1547]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 08:27:29.745932 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 08:27:29.781305 systemd-networkd[1316]: docker0: Link UP Feb 13 08:27:29.781457 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 08:27:29.785482 env[1563]: time="2024-02-13T08:27:29.785461949Z" level=info msg="Loading containers: done." Feb 13 08:27:29.791845 env[1563]: time="2024-02-13T08:27:29.791797795Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 08:27:29.791931 env[1563]: time="2024-02-13T08:27:29.791901368Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 08:27:29.791968 env[1563]: time="2024-02-13T08:27:29.791957718Z" level=info msg="Daemon has completed initialization" Feb 13 08:27:29.800235 systemd[1]: Started docker.service. Feb 13 08:27:29.804765 env[1563]: time="2024-02-13T08:27:29.804706685Z" level=info msg="API listen on /run/docker.sock" Feb 13 08:27:29.805447 etcd-wrapper[1551]: Error response from daemon: No such container: etcd-member Feb 13 08:27:29.825281 etcd-wrapper[1687]: Error: No such container: etcd-member Feb 13 08:27:29.880273 etcd-wrapper[1708]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 08:27:30.592686 systemd[1]: Created slice system-sshd.slice. Feb 13 08:27:30.593302 systemd[1]: Started sshd@0-145.40.67.53:22-139.178.68.195:42314.service. Feb 13 08:27:30.641785 sshd[1720]: Accepted publickey for core from 139.178.68.195 port 42314 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:30.642751 sshd[1720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:30.646272 systemd-logind[1453]: New session 3 of user core. Feb 13 08:27:30.647080 systemd[1]: Started session-3.scope. Feb 13 08:27:30.700252 systemd[1]: Started sshd@1-145.40.67.53:22-139.178.68.195:42330.service. Feb 13 08:27:30.732093 sshd[1725]: Accepted publickey for core from 139.178.68.195 port 42330 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:30.732779 sshd[1725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:30.734866 systemd-logind[1453]: New session 4 of user core. Feb 13 08:27:30.735318 systemd[1]: Started session-4.scope. Feb 13 08:27:30.788406 sshd[1725]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:30.789940 systemd[1]: sshd@1-145.40.67.53:22-139.178.68.195:42330.service: Deactivated successfully. Feb 13 08:27:30.790252 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 08:27:30.790535 systemd-logind[1453]: Session 4 logged out. Waiting for processes to exit. Feb 13 08:27:30.791034 systemd[1]: Started sshd@2-145.40.67.53:22-139.178.68.195:42336.service. Feb 13 08:27:30.791447 systemd-logind[1453]: Removed session 4. Feb 13 08:27:30.824866 sshd[1731]: Accepted publickey for core from 139.178.68.195 port 42336 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:30.828120 sshd[1731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:30.838491 systemd-logind[1453]: New session 5 of user core. Feb 13 08:27:30.840847 systemd[1]: Started session-5.scope. Feb 13 08:27:30.922067 sshd[1731]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:30.927723 systemd[1]: sshd@2-145.40.67.53:22-139.178.68.195:42336.service: Deactivated successfully. Feb 13 08:27:30.929390 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 08:27:30.931115 systemd-logind[1453]: Session 5 logged out. Waiting for processes to exit. Feb 13 08:27:30.933387 systemd-logind[1453]: Removed session 5. Feb 13 08:27:31.106360 etcd-wrapper[1708]: v3.5.0: Pulling from coreos/etcd Feb 13 08:27:31.423586 etcd-wrapper[1708]: 1813d21adc01: Pulling fs layer Feb 13 08:27:31.423586 etcd-wrapper[1708]: 6e96907ab677: Pulling fs layer Feb 13 08:27:31.423951 etcd-wrapper[1708]: 444ed0ea8673: Pulling fs layer Feb 13 08:27:31.423951 etcd-wrapper[1708]: 0fd2df5633f0: Pulling fs layer Feb 13 08:27:31.423951 etcd-wrapper[1708]: 8cc22b9456bb: Pulling fs layer Feb 13 08:27:31.423951 etcd-wrapper[1708]: 7ac70aecd290: Pulling fs layer Feb 13 08:27:31.423951 etcd-wrapper[1708]: 4b376c64dfe4: Pulling fs layer Feb 13 08:27:31.423951 etcd-wrapper[1708]: 0fd2df5633f0: Waiting Feb 13 08:27:31.423951 etcd-wrapper[1708]: 8cc22b9456bb: Waiting Feb 13 08:27:31.423951 etcd-wrapper[1708]: 7ac70aecd290: Waiting Feb 13 08:27:31.423951 etcd-wrapper[1708]: 4b376c64dfe4: Waiting Feb 13 08:27:31.765211 etcd-wrapper[1708]: 444ed0ea8673: Verifying Checksum Feb 13 08:27:31.765211 etcd-wrapper[1708]: 444ed0ea8673: Download complete Feb 13 08:27:31.781094 etcd-wrapper[1708]: 6e96907ab677: Verifying Checksum Feb 13 08:27:31.781094 etcd-wrapper[1708]: 6e96907ab677: Download complete Feb 13 08:27:31.814803 etcd-wrapper[1708]: 1813d21adc01: Verifying Checksum Feb 13 08:27:31.814803 etcd-wrapper[1708]: 1813d21adc01: Download complete Feb 13 08:27:32.093788 etcd-wrapper[1708]: 8cc22b9456bb: Download complete Feb 13 08:27:32.104303 etcd-wrapper[1708]: 0fd2df5633f0: Download complete Feb 13 08:27:32.115036 etcd-wrapper[1708]: 7ac70aecd290: Verifying Checksum Feb 13 08:27:32.115036 etcd-wrapper[1708]: 7ac70aecd290: Download complete Feb 13 08:27:32.333598 etcd-wrapper[1708]: 1813d21adc01: Pull complete Feb 13 08:27:32.417267 etcd-wrapper[1708]: 4b376c64dfe4: Download complete Feb 13 08:27:32.608762 systemd[1]: var-lib-docker-overlay2-523a7182b76162b7f1e8720ef6b9660cee2fc9ca1a4bd264b1f66fdc51a3b0a1-merged.mount: Deactivated successfully. Feb 13 08:27:32.846391 etcd-wrapper[1708]: 6e96907ab677: Pull complete Feb 13 08:27:32.999100 systemd[1]: var-lib-docker-overlay2-cc2b49c43b2178e1aeab16e9c7f1b7032b075d767e52b86509958532fc118d5a-merged.mount: Deactivated successfully. Feb 13 08:27:33.042139 etcd-wrapper[1708]: 444ed0ea8673: Pull complete Feb 13 08:27:33.216647 etcd-wrapper[1708]: 0fd2df5633f0: Pull complete Feb 13 08:27:33.242143 etcd-wrapper[1708]: 8cc22b9456bb: Pull complete Feb 13 08:27:33.277893 etcd-wrapper[1708]: 7ac70aecd290: Pull complete Feb 13 08:27:33.306326 etcd-wrapper[1708]: 4b376c64dfe4: Pull complete Feb 13 08:27:33.309561 etcd-wrapper[1708]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 08:27:33.310547 etcd-wrapper[1708]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 08:27:33.339519 systemd[1]: var-lib-docker-overlay2-d250d0a7b301fc4c54609fbea274dc442684dddbec77033c0c284f25c941fa0c-merged.mount: Deactivated successfully. Feb 13 08:27:33.363267 env[1459]: time="2024-02-13T08:27:33.363218734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 08:27:33.363267 env[1459]: time="2024-02-13T08:27:33.363251092Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 08:27:33.363267 env[1459]: time="2024-02-13T08:27:33.363262859Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 08:27:33.363653 env[1459]: time="2024-02-13T08:27:33.363376280Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/23f00784eb4a5f11e465b989af67a0427d909274602076bf54020063838d946a pid=1906 runtime=io.containerd.runc.v2 Feb 13 08:27:33.374423 systemd[1]: Started docker-23f00784eb4a5f11e465b989af67a0427d909274602076bf54020063838d946a.scope. Feb 13 08:27:33.440792 etcd-wrapper[1708]: {"level":"info","ts":1707812853.4405606,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 08:27:33.440792 etcd-wrapper[1708]: {"level":"info","ts":1707812853.4406123,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"2774cfc0f03e4e4cab11a6b71386332f"} Feb 13 08:27:33.440792 etcd-wrapper[1708]: {"level":"warn","ts":1707812853.440632,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 08:27:33.440792 etcd-wrapper[1708]: {"level":"warn","ts":1707812853.440637,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 08:27:33.440792 etcd-wrapper[1708]: {"level":"warn","ts":1707812853.4406412,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 08:27:33.440792 etcd-wrapper[1708]: {"level":"warn","ts":1707812853.4406452,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 08:27:33.440987 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.440Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.35:2379"]} Feb 13 08:27:33.440987 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.440Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 08:27:33.441150 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.441Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 08:27:33.441294 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.441Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"2774cfc0f03e4e4cab11a6b71386332f","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"2774cfc0f03e4e4cab11a6b71386332f=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 08:27:33.441966 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.441Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"630.052µs"} Feb 13 08:27:33.443285 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.443Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 08:27:33.443285 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.443Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 08:27:33.443285 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.443Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 08:27:33.443285 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.443Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 08:27:33.443285 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.443Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 08:27:33.443285 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.443Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 08:27:33.444014 etcd-wrapper[1708]: {"level":"warn","ts":"2024-02-13T08:27:33.443Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 08:27:33.444324 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.444Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 08:27:33.444440 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.444Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 08:27:33.444668 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.444Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 08:27:33.444731 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.444Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 08:27:33.445220 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.445Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 08:27:33.445314 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.445Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 08:27:33.446230 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.446Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 08:27:33.446230 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.446Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 08:27:33.446230 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:33.446Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 08:27:34.144777 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.144Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 08:27:34.146000 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:2774cfc0f03e4e4cab11a6b71386332f ClientURLs:[http://10.67.80.35:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 08:27:34.146000 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 08:27:34.146000 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 08:27:34.146000 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 08:27:34.146540 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 08:27:34.146540 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 08:27:34.146540 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 08:27:34.146540 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.145Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 08:27:34.146301 systemd[1]: Started etcd-member.service. Feb 13 08:27:34.147138 systemd[1]: Reached target multi-user.target. Feb 13 08:27:34.147863 etcd-wrapper[1708]: {"level":"info","ts":"2024-02-13T08:27:34.147Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 08:27:34.150424 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 08:27:34.154557 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 08:27:34.154637 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 08:27:34.154760 systemd[1]: Startup finished in 2.004s (kernel) + 16.406s (initrd) + 18.921s (userspace) = 37.333s. Feb 13 08:27:40.931080 systemd[1]: Started sshd@3-145.40.67.53:22-139.178.68.195:59580.service. Feb 13 08:27:40.963357 sshd[1955]: Accepted publickey for core from 139.178.68.195 port 59580 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:40.964226 sshd[1955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:40.967259 systemd-logind[1453]: New session 6 of user core. Feb 13 08:27:40.967938 systemd[1]: Started session-6.scope. Feb 13 08:27:41.024509 sshd[1955]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:41.026158 systemd[1]: sshd@3-145.40.67.53:22-139.178.68.195:59580.service: Deactivated successfully. Feb 13 08:27:41.026455 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 08:27:41.026891 systemd-logind[1453]: Session 6 logged out. Waiting for processes to exit. Feb 13 08:27:41.027390 systemd[1]: Started sshd@4-145.40.67.53:22-139.178.68.195:59584.service. Feb 13 08:27:41.027922 systemd-logind[1453]: Removed session 6. Feb 13 08:27:41.060063 sshd[1961]: Accepted publickey for core from 139.178.68.195 port 59584 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:41.061065 sshd[1961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:41.064459 systemd-logind[1453]: New session 7 of user core. Feb 13 08:27:41.065225 systemd[1]: Started session-7.scope. Feb 13 08:27:41.119936 sshd[1961]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:41.126615 systemd[1]: sshd@4-145.40.67.53:22-139.178.68.195:59584.service: Deactivated successfully. Feb 13 08:27:41.127674 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 08:27:41.128066 systemd-logind[1453]: Session 7 logged out. Waiting for processes to exit. Feb 13 08:27:41.128522 systemd[1]: Started sshd@5-145.40.67.53:22-139.178.68.195:59588.service. Feb 13 08:27:41.128970 systemd-logind[1453]: Removed session 7. Feb 13 08:27:41.160875 sshd[1967]: Accepted publickey for core from 139.178.68.195 port 59588 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:41.161802 sshd[1967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:41.165084 systemd-logind[1453]: New session 8 of user core. Feb 13 08:27:41.165770 systemd[1]: Started session-8.scope. Feb 13 08:27:41.221750 sshd[1967]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:41.223258 systemd[1]: sshd@5-145.40.67.53:22-139.178.68.195:59588.service: Deactivated successfully. Feb 13 08:27:41.223571 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 08:27:41.223969 systemd-logind[1453]: Session 8 logged out. Waiting for processes to exit. Feb 13 08:27:41.224441 systemd[1]: Started sshd@6-145.40.67.53:22-139.178.68.195:59602.service. Feb 13 08:27:41.224902 systemd-logind[1453]: Removed session 8. Feb 13 08:27:41.257507 sshd[1973]: Accepted publickey for core from 139.178.68.195 port 59602 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:41.258610 sshd[1973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:41.262390 systemd-logind[1453]: New session 9 of user core. Feb 13 08:27:41.263263 systemd[1]: Started session-9.scope. Feb 13 08:27:41.347378 sudo[1976]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 08:27:41.347992 sudo[1976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 08:27:41.372074 dbus-daemon[1425]: \xd0\u001d:a\xbdU: received setenforce notice (enforcing=1933007856) Feb 13 08:27:41.376686 sudo[1976]: pam_unix(sudo:session): session closed for user root Feb 13 08:27:41.378783 sshd[1973]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:41.380248 systemd[1]: sshd@6-145.40.67.53:22-139.178.68.195:59602.service: Deactivated successfully. Feb 13 08:27:41.380602 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 08:27:41.380982 systemd-logind[1453]: Session 9 logged out. Waiting for processes to exit. Feb 13 08:27:41.381471 systemd[1]: Started sshd@7-145.40.67.53:22-139.178.68.195:59618.service. Feb 13 08:27:41.381898 systemd-logind[1453]: Removed session 9. Feb 13 08:27:41.414946 sshd[1980]: Accepted publickey for core from 139.178.68.195 port 59618 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:41.418256 sshd[1980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:41.428334 systemd-logind[1453]: New session 10 of user core. Feb 13 08:27:41.430658 systemd[1]: Started session-10.scope. Feb 13 08:27:41.504495 sudo[1984]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 08:27:41.504601 sudo[1984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 08:27:41.506265 sudo[1984]: pam_unix(sudo:session): session closed for user root Feb 13 08:27:41.508648 sudo[1983]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 08:27:41.508761 sudo[1983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 08:27:41.514156 systemd[1]: Stopping audit-rules.service... Feb 13 08:27:41.513000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 08:27:41.515067 auditctl[1987]: No rules Feb 13 08:27:41.515241 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 08:27:41.515337 systemd[1]: Stopped audit-rules.service. Feb 13 08:27:41.516153 systemd[1]: Starting audit-rules.service... Feb 13 08:27:41.520497 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 13 08:27:41.520541 kernel: audit: type=1305 audit(1707812861.513:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 08:27:41.527339 augenrules[2004]: No rules Feb 13 08:27:41.527750 systemd[1]: Finished audit-rules.service. Feb 13 08:27:41.528348 sudo[1983]: pam_unix(sudo:session): session closed for user root Feb 13 08:27:41.529286 sshd[1980]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:41.530915 systemd[1]: sshd@7-145.40.67.53:22-139.178.68.195:59618.service: Deactivated successfully. Feb 13 08:27:41.531354 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 08:27:41.531814 systemd-logind[1453]: Session 10 logged out. Waiting for processes to exit. Feb 13 08:27:41.532401 systemd-logind[1453]: Removed session 10. Feb 13 08:27:41.513000 audit[1987]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff20890960 a2=420 a3=0 items=0 ppid=1 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:41.567094 kernel: audit: type=1300 audit(1707812861.513:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff20890960 a2=420 a3=0 items=0 ppid=1 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:41.567124 kernel: audit: type=1327 audit(1707812861.513:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 08:27:41.513000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 08:27:41.568916 systemd[1]: Started sshd@8-145.40.67.53:22-139.178.68.195:59634.service. Feb 13 08:27:41.576667 kernel: audit: type=1131 audit(1707812861.513:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.599158 kernel: audit: type=1130 audit(1707812861.527:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.621631 kernel: audit: type=1106 audit(1707812861.527:167): pid=1983 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.527000 audit[1983]: USER_END pid=1983 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.647725 kernel: audit: type=1104 audit(1707812861.527:168): pid=1983 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.527000 audit[1983]: CRED_DISP pid=1983 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.671342 kernel: audit: type=1106 audit(1707812861.528:169): pid=1980 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.528000 audit[1980]: USER_END pid=1980 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.703638 kernel: audit: type=1104 audit(1707812861.528:170): pid=1980 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.528000 audit[1980]: CRED_DISP pid=1980 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.729693 kernel: audit: type=1131 audit(1707812861.529:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.67.53:22-139.178.68.195:59618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.67.53:22-139.178.68.195:59618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.737316 sshd[2010]: Accepted publickey for core from 139.178.68.195 port 59634 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:41.738782 sshd[2010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:41.741109 systemd-logind[1453]: New session 11 of user core. Feb 13 08:27:41.741487 systemd[1]: Started session-11.scope. Feb 13 08:27:41.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.67.53:22-139.178.68.195:59634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.736000 audit[2010]: USER_ACCT pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.738000 audit[2010]: CRED_ACQ pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.738000 audit[2010]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd28a377c0 a2=3 a3=0 items=0 ppid=1 pid=2010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:41.738000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 08:27:41.742000 audit[2010]: USER_START pid=2010 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.742000 audit[2012]: CRED_ACQ pid=2012 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.800078 sshd[2010]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:41.799000 audit[2010]: USER_END pid=2010 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.799000 audit[2010]: CRED_DISP pid=2010 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.801681 systemd[1]: sshd@8-145.40.67.53:22-139.178.68.195:59634.service: Deactivated successfully. Feb 13 08:27:41.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.67.53:22-139.178.68.195:59634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.802039 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 08:27:41.802360 systemd-logind[1453]: Session 11 logged out. Waiting for processes to exit. Feb 13 08:27:41.802963 systemd[1]: Started sshd@9-145.40.67.53:22-139.178.68.195:59640.service. Feb 13 08:27:41.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.67.53:22-139.178.68.195:59640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:41.803390 systemd-logind[1453]: Removed session 11. Feb 13 08:27:41.837000 audit[2018]: USER_ACCT pid=2018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.838294 sshd[2018]: Accepted publickey for core from 139.178.68.195 port 59640 ssh2: RSA SHA256:1PlZIJIBJggYI3VbAvHiWZPn3uvIsILcfs6l5/y3kqg Feb 13 08:27:41.837000 audit[2018]: CRED_ACQ pid=2018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.837000 audit[2018]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffebd35b50 a2=3 a3=0 items=0 ppid=1 pid=2018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 08:27:41.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 08:27:41.839883 sshd[2018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 08:27:41.846506 systemd-logind[1453]: New session 12 of user core. Feb 13 08:27:41.848366 systemd[1]: Started session-12.scope. Feb 13 08:27:41.862000 audit[2018]: USER_START pid=2018 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:41.865000 audit[2020]: CRED_ACQ pid=2020 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:42.278924 sshd[2018]: pam_unix(sshd:session): session closed for user core Feb 13 08:27:42.280000 audit[2018]: USER_END pid=2018 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:42.281000 audit[2018]: CRED_DISP pid=2018 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 08:27:42.284699 systemd[1]: sshd@9-145.40.67.53:22-139.178.68.195:59640.service: Deactivated successfully. Feb 13 08:27:42.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.67.53:22-139.178.68.195:59640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:27:42.286356 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 08:27:42.288069 systemd-logind[1453]: Session 12 logged out. Waiting for processes to exit. Feb 13 08:27:42.290334 systemd-logind[1453]: Removed session 12. Feb 13 08:27:59.078526 systemd-resolved[1411]: Clock change detected. Flushing caches. Feb 13 08:27:59.078886 systemd-timesyncd[1412]: Contacted time server [2604:2dc0:202:300::140d]:123 (2.flatcar.pool.ntp.org). Feb 13 08:27:59.079021 systemd-timesyncd[1412]: Initial clock synchronization to Tue 2024-02-13 08:27:59.078414 UTC. Feb 13 08:28:06.065492 update_engine[1455]: I0213 08:28:06.065354 1455 update_attempter.cc:509] Updating boot flags... Feb 13 08:28:11.810993 systemd[1]: Started sshd@10-145.40.67.53:22-49.235.165.113:34874.service. Feb 13 08:28:11.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.67.53:22-49.235.165.113:34874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:11.816582 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 13 08:28:11.816634 kernel: audit: type=1130 audit(1707812891.809:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.67.53:22-49.235.165.113:34874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:11.846084 sshd[2061]: kex_exchange_identification: client sent invalid protocol identifier "GET / HTTP/1.1" Feb 13 08:28:11.846084 sshd[2061]: banner exchange: Connection from 49.235.165.113 port 34874: invalid format Feb 13 08:28:11.846308 systemd[1]: sshd@10-145.40.67.53:22-49.235.165.113:34874.service: Deactivated successfully. Feb 13 08:28:11.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.67.53:22-49.235.165.113:34874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:11.934158 kernel: audit: type=1131 audit(1707812891.845:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.67.53:22-49.235.165.113:34874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:12.107905 systemd[1]: Started sshd@11-145.40.67.53:22-49.235.165.113:34936.service. Feb 13 08:28:12.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.67.53:22-49.235.165.113:34936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:12.187583 kernel: audit: type=1130 audit(1707812892.106:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.67.53:22-49.235.165.113:34936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:13.623035 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:13.622000 audit[2064]: USER_AUTH pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:13.705523 kernel: audit: type=1100 audit(1707812893.622:193): pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:15.750255 sshd[2064]: Failed password for root from 49.235.165.113 port 34936 ssh2 Feb 13 08:28:17.483427 sshd[2064]: Connection closed by authenticating user root 49.235.165.113 port 34936 [preauth] Feb 13 08:28:17.485953 systemd[1]: sshd@11-145.40.67.53:22-49.235.165.113:34936.service: Deactivated successfully. Feb 13 08:28:17.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.67.53:22-49.235.165.113:34936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:17.572534 kernel: audit: type=1131 audit(1707812897.485:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.67.53:22-49.235.165.113:34936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:17.643458 systemd[1]: Started sshd@12-145.40.67.53:22-49.235.165.113:35976.service. Feb 13 08:28:17.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.67.53:22-49.235.165.113:35976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:17.732580 kernel: audit: type=1130 audit(1707812897.642:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.67.53:22-49.235.165.113:35976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:19.336346 sshd[2068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:19.335000 audit[2068]: USER_AUTH pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:19.426428 kernel: audit: type=1100 audit(1707812899.335:196): pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:20.620442 sshd[2068]: Failed password for root from 49.235.165.113 port 35976 ssh2 Feb 13 08:28:21.724019 sshd[2068]: Connection closed by authenticating user root 49.235.165.113 port 35976 [preauth] Feb 13 08:28:21.726491 systemd[1]: sshd@12-145.40.67.53:22-49.235.165.113:35976.service: Deactivated successfully. Feb 13 08:28:21.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.67.53:22-49.235.165.113:35976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:21.818458 kernel: audit: type=1131 audit(1707812901.726:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.67.53:22-49.235.165.113:35976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:21.883468 systemd[1]: Started sshd@13-145.40.67.53:22-49.235.165.113:36984.service. Feb 13 08:28:21.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.67.53:22-49.235.165.113:36984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:21.973579 kernel: audit: type=1130 audit(1707812901.882:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.67.53:22-49.235.165.113:36984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:23.305345 sshd[2072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:23.304000 audit[2072]: USER_AUTH pid=2072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:23.397572 kernel: audit: type=1100 audit(1707812903.304:199): pid=2072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:25.472575 sshd[2072]: Failed password for root from 49.235.165.113 port 36984 ssh2 Feb 13 08:28:27.087474 sshd[2072]: Connection closed by authenticating user root 49.235.165.113 port 36984 [preauth] Feb 13 08:28:27.089973 systemd[1]: sshd@13-145.40.67.53:22-49.235.165.113:36984.service: Deactivated successfully. Feb 13 08:28:27.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.67.53:22-49.235.165.113:36984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:27.182586 kernel: audit: type=1131 audit(1707812907.089:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.67.53:22-49.235.165.113:36984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:27.236327 systemd[1]: Started sshd@14-145.40.67.53:22-49.235.165.113:38008.service. Feb 13 08:28:27.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.67.53:22-49.235.165.113:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:27.326500 kernel: audit: type=1130 audit(1707812907.235:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.67.53:22-49.235.165.113:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:28.541744 sshd[2076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:28.540000 audit[2076]: USER_AUTH pid=2076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:28.633423 kernel: audit: type=1100 audit(1707812908.540:202): pid=2076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:30.060773 sshd[2076]: Failed password for root from 49.235.165.113 port 38008 ssh2 Feb 13 08:28:30.526098 sshd[2076]: Connection closed by authenticating user root 49.235.165.113 port 38008 [preauth] Feb 13 08:28:30.528493 systemd[1]: sshd@14-145.40.67.53:22-49.235.165.113:38008.service: Deactivated successfully. Feb 13 08:28:30.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.67.53:22-49.235.165.113:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:30.620415 kernel: audit: type=1131 audit(1707812910.528:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.67.53:22-49.235.165.113:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:30.706256 systemd[1]: Started sshd@15-145.40.67.53:22-49.235.165.113:38804.service. Feb 13 08:28:30.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.67.53:22-49.235.165.113:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:30.796438 kernel: audit: type=1130 audit(1707812910.705:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.67.53:22-49.235.165.113:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:32.599705 sshd[2080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:32.598000 audit[2080]: ANOM_LOGIN_FAILURES pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:32.599948 sshd[2080]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 08:28:32.598000 audit[2080]: USER_AUTH pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:32.757056 kernel: audit: type=2100 audit(1707812912.598:205): pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:32.757089 kernel: audit: type=1100 audit(1707812912.598:206): pid=2080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:35.002621 sshd[2080]: Failed password for root from 49.235.165.113 port 38804 ssh2 Feb 13 08:28:36.301207 sshd[2080]: Connection closed by authenticating user root 49.235.165.113 port 38804 [preauth] Feb 13 08:28:36.303694 systemd[1]: sshd@15-145.40.67.53:22-49.235.165.113:38804.service: Deactivated successfully. Feb 13 08:28:36.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.67.53:22-49.235.165.113:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:36.397583 kernel: audit: type=1131 audit(1707812916.302:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.67.53:22-49.235.165.113:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:36.441871 systemd[1]: Started sshd@16-145.40.67.53:22-49.235.165.113:39900.service. Feb 13 08:28:36.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.67.53:22-49.235.165.113:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:36.533582 kernel: audit: type=1130 audit(1707812916.440:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.67.53:22-49.235.165.113:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:37.619815 sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:37.618000 audit[2086]: USER_AUTH pid=2086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:37.712405 kernel: audit: type=1100 audit(1707812917.618:209): pid=2086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:39.375562 sshd[2086]: Failed password for root from 49.235.165.113 port 39900 ssh2 Feb 13 08:28:41.252952 sshd[2086]: Connection closed by authenticating user root 49.235.165.113 port 39900 [preauth] Feb 13 08:28:41.255434 systemd[1]: sshd@16-145.40.67.53:22-49.235.165.113:39900.service: Deactivated successfully. Feb 13 08:28:41.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.67.53:22-49.235.165.113:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:41.349587 kernel: audit: type=1131 audit(1707812921.254:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.67.53:22-49.235.165.113:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:41.452246 systemd[1]: Started sshd@17-145.40.67.53:22-49.235.165.113:41016.service. Feb 13 08:28:41.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.67.53:22-49.235.165.113:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:41.545580 kernel: audit: type=1130 audit(1707812921.451:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.67.53:22-49.235.165.113:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:43.309243 sshd[2090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:43.308000 audit[2090]: USER_AUTH pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:43.401565 kernel: audit: type=1100 audit(1707812923.308:212): pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:45.220727 sshd[2090]: Failed password for root from 49.235.165.113 port 41016 ssh2 Feb 13 08:28:46.999034 sshd[2090]: Connection closed by authenticating user root 49.235.165.113 port 41016 [preauth] Feb 13 08:28:47.001513 systemd[1]: sshd@17-145.40.67.53:22-49.235.165.113:41016.service: Deactivated successfully. Feb 13 08:28:47.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.67.53:22-49.235.165.113:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:47.095589 kernel: audit: type=1131 audit(1707812927.000:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.67.53:22-49.235.165.113:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:47.153870 systemd[1]: Started sshd@18-145.40.67.53:22-49.235.165.113:42150.service. Feb 13 08:28:47.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.67.53:22-49.235.165.113:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:47.244447 kernel: audit: type=1130 audit(1707812927.152:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.67.53:22-49.235.165.113:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:48.493490 sshd[2095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:48.492000 audit[2095]: USER_AUTH pid=2095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:48.586577 kernel: audit: type=1100 audit(1707812928.492:215): pid=2095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:50.760642 sshd[2095]: Failed password for root from 49.235.165.113 port 42150 ssh2 Feb 13 08:28:52.588522 sshd[2095]: Connection closed by authenticating user root 49.235.165.113 port 42150 [preauth] Feb 13 08:28:52.591009 systemd[1]: sshd@18-145.40.67.53:22-49.235.165.113:42150.service: Deactivated successfully. Feb 13 08:28:52.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.67.53:22-49.235.165.113:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:52.684580 kernel: audit: type=1131 audit(1707812932.590:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.67.53:22-49.235.165.113:42150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:52.749958 systemd[1]: Started sshd@19-145.40.67.53:22-49.235.165.113:43296.service. Feb 13 08:28:52.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.67.53:22-49.235.165.113:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:52.841581 kernel: audit: type=1130 audit(1707812932.748:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.67.53:22-49.235.165.113:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:55.428218 sshd[2099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:28:55.427000 audit[2099]: USER_AUTH pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:55.521471 kernel: audit: type=1100 audit(1707812935.427:218): pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:28:57.655586 sshd[2099]: Failed password for root from 49.235.165.113 port 43296 ssh2 Feb 13 08:28:59.098642 sshd[2099]: Connection closed by authenticating user root 49.235.165.113 port 43296 [preauth] Feb 13 08:28:59.101086 systemd[1]: sshd@19-145.40.67.53:22-49.235.165.113:43296.service: Deactivated successfully. Feb 13 08:28:59.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.67.53:22-49.235.165.113:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:59.194577 kernel: audit: type=1131 audit(1707812939.100:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.67.53:22-49.235.165.113:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:59.787157 systemd[1]: Started sshd@20-145.40.67.53:22-49.235.165.113:44556.service. Feb 13 08:28:59.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.67.53:22-49.235.165.113:44556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:28:59.879448 kernel: audit: type=1130 audit(1707812939.785:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.67.53:22-49.235.165.113:44556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:01.835972 sshd[2103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:01.834000 audit[2103]: USER_AUTH pid=2103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:01.928433 kernel: audit: type=1100 audit(1707812941.834:221): pid=2103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:03.219583 sshd[2103]: Failed password for root from 49.235.165.113 port 44556 ssh2 Feb 13 08:29:03.931106 sshd[2103]: Connection closed by authenticating user root 49.235.165.113 port 44556 [preauth] Feb 13 08:29:03.933654 systemd[1]: sshd@20-145.40.67.53:22-49.235.165.113:44556.service: Deactivated successfully. Feb 13 08:29:03.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.67.53:22-49.235.165.113:44556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:04.027586 kernel: audit: type=1131 audit(1707812943.932:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.67.53:22-49.235.165.113:44556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:04.096998 systemd[1]: Started sshd@21-145.40.67.53:22-49.235.165.113:45412.service. Feb 13 08:29:04.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.67.53:22-49.235.165.113:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:04.188566 kernel: audit: type=1130 audit(1707812944.095:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.67.53:22-49.235.165.113:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:05.457444 sshd[2107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:05.456000 audit[2107]: USER_AUTH pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:05.550688 kernel: audit: type=1100 audit(1707812945.456:224): pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:07.388978 sshd[2107]: Failed password for root from 49.235.165.113 port 45412 ssh2 Feb 13 08:29:09.603839 sshd[2107]: Connection closed by authenticating user root 49.235.165.113 port 45412 [preauth] Feb 13 08:29:09.606350 systemd[1]: sshd@21-145.40.67.53:22-49.235.165.113:45412.service: Deactivated successfully. Feb 13 08:29:09.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.67.53:22-49.235.165.113:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:09.699574 kernel: audit: type=1131 audit(1707812949.605:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.67.53:22-49.235.165.113:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:09.772172 systemd[1]: Started sshd@22-145.40.67.53:22-49.235.165.113:46578.service. Feb 13 08:29:09.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.67.53:22-49.235.165.113:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:09.863462 kernel: audit: type=1130 audit(1707812949.770:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.67.53:22-49.235.165.113:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:11.199875 sshd[2111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:11.198000 audit[2111]: USER_AUTH pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:11.291417 kernel: audit: type=1100 audit(1707812951.198:227): pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:12.955699 sshd[2111]: Failed password for root from 49.235.165.113 port 46578 ssh2 Feb 13 08:29:16.328186 sshd[2111]: Connection closed by authenticating user root 49.235.165.113 port 46578 [preauth] Feb 13 08:29:16.330701 systemd[1]: sshd@22-145.40.67.53:22-49.235.165.113:46578.service: Deactivated successfully. Feb 13 08:29:16.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.67.53:22-49.235.165.113:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:16.423577 kernel: audit: type=1131 audit(1707812956.329:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.67.53:22-49.235.165.113:46578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:16.545354 systemd[1]: Started sshd@23-145.40.67.53:22-49.235.165.113:47998.service. Feb 13 08:29:16.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.67.53:22-49.235.165.113:47998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:16.637407 kernel: audit: type=1130 audit(1707812956.544:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.67.53:22-49.235.165.113:47998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:18.510975 sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:18.509000 audit[2115]: USER_AUTH pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:18.603446 kernel: audit: type=1100 audit(1707812958.509:230): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:20.894036 sshd[2115]: Failed password for root from 49.235.165.113 port 47998 ssh2 Feb 13 08:29:22.183396 sshd[2115]: Connection closed by authenticating user root 49.235.165.113 port 47998 [preauth] Feb 13 08:29:22.185864 systemd[1]: sshd@23-145.40.67.53:22-49.235.165.113:47998.service: Deactivated successfully. Feb 13 08:29:22.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.67.53:22-49.235.165.113:47998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:22.279579 kernel: audit: type=1131 audit(1707812962.184:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.67.53:22-49.235.165.113:47998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:22.404243 systemd[1]: Started sshd@24-145.40.67.53:22-49.235.165.113:49134.service. Feb 13 08:29:22.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.67.53:22-49.235.165.113:49134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:22.497700 kernel: audit: type=1130 audit(1707812962.403:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.67.53:22-49.235.165.113:49134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:24.032724 sshd[2119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:24.031000 audit[2119]: USER_AUTH pid=2119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:24.125562 kernel: audit: type=1100 audit(1707812964.031:233): pid=2119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:26.240162 sshd[2119]: Failed password for root from 49.235.165.113 port 49134 ssh2 Feb 13 08:29:27.768981 sshd[2119]: Connection closed by authenticating user root 49.235.165.113 port 49134 [preauth] Feb 13 08:29:27.771448 systemd[1]: sshd@24-145.40.67.53:22-49.235.165.113:49134.service: Deactivated successfully. Feb 13 08:29:27.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.67.53:22-49.235.165.113:49134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:27.865579 kernel: audit: type=1131 audit(1707812967.770:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.67.53:22-49.235.165.113:49134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:28.010462 systemd[1]: Started sshd@25-145.40.67.53:22-49.235.165.113:50336.service. Feb 13 08:29:28.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.67.53:22-49.235.165.113:50336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:28.102578 kernel: audit: type=1130 audit(1707812968.009:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.67.53:22-49.235.165.113:50336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:29.811559 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:29.810000 audit[2123]: USER_AUTH pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:29.903564 kernel: audit: type=1100 audit(1707812969.810:236): pid=2123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:31.371691 sshd[2123]: Failed password for root from 49.235.165.113 port 50336 ssh2 Feb 13 08:29:31.782109 sshd[2123]: Connection closed by authenticating user root 49.235.165.113 port 50336 [preauth] Feb 13 08:29:31.784486 systemd[1]: sshd@25-145.40.67.53:22-49.235.165.113:50336.service: Deactivated successfully. Feb 13 08:29:31.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.67.53:22-49.235.165.113:50336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:31.878583 kernel: audit: type=1131 audit(1707812971.783:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.67.53:22-49.235.165.113:50336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:32.050025 systemd[1]: Started sshd@26-145.40.67.53:22-49.235.165.113:51140.service. Feb 13 08:29:32.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.67.53:22-49.235.165.113:51140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:32.142578 kernel: audit: type=1130 audit(1707812972.049:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.67.53:22-49.235.165.113:51140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:33.471921 sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:33.470000 audit[2127]: USER_AUTH pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:33.564427 kernel: audit: type=1100 audit(1707812973.470:239): pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:35.583642 sshd[2127]: Failed password for root from 49.235.165.113 port 51140 ssh2 Feb 13 08:29:37.297422 sshd[2127]: Connection closed by authenticating user root 49.235.165.113 port 51140 [preauth] Feb 13 08:29:37.299870 systemd[1]: sshd@26-145.40.67.53:22-49.235.165.113:51140.service: Deactivated successfully. Feb 13 08:29:37.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.67.53:22-49.235.165.113:51140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:37.393578 kernel: audit: type=1131 audit(1707812977.298:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.67.53:22-49.235.165.113:51140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:37.502348 systemd[1]: Started sshd@27-145.40.67.53:22-49.235.165.113:52260.service. Feb 13 08:29:37.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.67.53:22-49.235.165.113:52260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:37.594576 kernel: audit: type=1130 audit(1707812977.501:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.67.53:22-49.235.165.113:52260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:40.219343 sshd[2132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:40.218000 audit[2132]: USER_AUTH pid=2132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:40.311562 kernel: audit: type=1100 audit(1707812980.218:242): pid=2132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:41.955197 sshd[2132]: Failed password for root from 49.235.165.113 port 52260 ssh2 Feb 13 08:29:43.895354 sshd[2132]: Connection closed by authenticating user root 49.235.165.113 port 52260 [preauth] Feb 13 08:29:43.897951 systemd[1]: sshd@27-145.40.67.53:22-49.235.165.113:52260.service: Deactivated successfully. Feb 13 08:29:43.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.67.53:22-49.235.165.113:52260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:43.991431 kernel: audit: type=1131 audit(1707812983.897:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.67.53:22-49.235.165.113:52260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:44.155297 systemd[1]: Started sshd@28-145.40.67.53:22-49.235.165.113:53622.service. Feb 13 08:29:44.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.67.53:22-49.235.165.113:53622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:44.248477 kernel: audit: type=1130 audit(1707812984.154:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.67.53:22-49.235.165.113:53622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:45.476402 sshd[2137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:45.475000 audit[2137]: USER_AUTH pid=2137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:45.568544 kernel: audit: type=1100 audit(1707812985.475:245): pid=2137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:47.567779 sshd[2137]: Failed password for root from 49.235.165.113 port 53622 ssh2 Feb 13 08:29:49.405549 sshd[2137]: Connection closed by authenticating user root 49.235.165.113 port 53622 [preauth] Feb 13 08:29:49.408028 systemd[1]: sshd@28-145.40.67.53:22-49.235.165.113:53622.service: Deactivated successfully. Feb 13 08:29:49.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.67.53:22-49.235.165.113:53622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:49.501472 kernel: audit: type=1131 audit(1707812989.407:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.67.53:22-49.235.165.113:53622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:49.544102 systemd[1]: Started sshd@29-145.40.67.53:22-49.235.165.113:54732.service. Feb 13 08:29:49.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.67.53:22-49.235.165.113:54732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:49.635572 kernel: audit: type=1130 audit(1707812989.542:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.67.53:22-49.235.165.113:54732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:51.266830 sshd[2141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:51.265000 audit[2141]: USER_AUTH pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:51.359568 kernel: audit: type=1100 audit(1707812991.265:248): pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:52.847064 sshd[2141]: Failed password for root from 49.235.165.113 port 54732 ssh2 Feb 13 08:29:53.752423 sshd[2141]: Connection closed by authenticating user root 49.235.165.113 port 54732 [preauth] Feb 13 08:29:53.754952 systemd[1]: sshd@29-145.40.67.53:22-49.235.165.113:54732.service: Deactivated successfully. Feb 13 08:29:53.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.67.53:22-49.235.165.113:54732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:53.848580 kernel: audit: type=1131 audit(1707812993.754:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.67.53:22-49.235.165.113:54732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:53.915969 systemd[1]: Started sshd@30-145.40.67.53:22-49.235.165.113:55584.service. Feb 13 08:29:53.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.67.53:22-49.235.165.113:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:54.008378 kernel: audit: type=1130 audit(1707812993.914:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.67.53:22-49.235.165.113:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:55.308828 sshd[2145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:55.307000 audit[2145]: USER_AUTH pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:55.401439 kernel: audit: type=1100 audit(1707812995.307:251): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:56.773347 sshd[2145]: Failed password for root from 49.235.165.113 port 55584 ssh2 Feb 13 08:29:57.406252 sshd[2145]: Connection closed by authenticating user root 49.235.165.113 port 55584 [preauth] Feb 13 08:29:57.408753 systemd[1]: sshd@30-145.40.67.53:22-49.235.165.113:55584.service: Deactivated successfully. Feb 13 08:29:57.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.67.53:22-49.235.165.113:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:57.501576 kernel: audit: type=1131 audit(1707812997.407:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.67.53:22-49.235.165.113:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:57.641269 systemd[1]: Started sshd@31-145.40.67.53:22-49.235.165.113:56274.service. Feb 13 08:29:57.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.67.53:22-49.235.165.113:56274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:57.734510 kernel: audit: type=1130 audit(1707812997.640:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.67.53:22-49.235.165.113:56274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:29:59.882408 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:29:59.881000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:29:59.975438 kernel: audit: type=1100 audit(1707812999.881:254): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:01.894220 sshd[2149]: Failed password for root from 49.235.165.113 port 56274 ssh2 Feb 13 08:30:03.602415 sshd[2149]: Connection closed by authenticating user root 49.235.165.113 port 56274 [preauth] Feb 13 08:30:03.604960 systemd[1]: sshd@31-145.40.67.53:22-49.235.165.113:56274.service: Deactivated successfully. Feb 13 08:30:03.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.67.53:22-49.235.165.113:56274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:03.697581 kernel: audit: type=1131 audit(1707813003.604:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.67.53:22-49.235.165.113:56274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:03.782366 systemd[1]: Started sshd@32-145.40.67.53:22-49.235.165.113:57538.service. Feb 13 08:30:03.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.67.53:22-49.235.165.113:57538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:03.874567 kernel: audit: type=1130 audit(1707813003.781:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.67.53:22-49.235.165.113:57538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:05.876933 sshd[2153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:05.875000 audit[2153]: USER_AUTH pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:05.969562 kernel: audit: type=1100 audit(1707813005.875:257): pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:07.712997 sshd[2153]: Failed password for root from 49.235.165.113 port 57538 ssh2 Feb 13 08:30:09.526689 sshd[2153]: Connection closed by authenticating user root 49.235.165.113 port 57538 [preauth] Feb 13 08:30:09.529174 systemd[1]: sshd@32-145.40.67.53:22-49.235.165.113:57538.service: Deactivated successfully. Feb 13 08:30:09.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.67.53:22-49.235.165.113:57538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:09.623582 kernel: audit: type=1131 audit(1707813009.528:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.67.53:22-49.235.165.113:57538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:09.711739 systemd[1]: Started sshd@33-145.40.67.53:22-49.235.165.113:58760.service. Feb 13 08:30:09.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.67.53:22-49.235.165.113:58760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:09.802376 kernel: audit: type=1130 audit(1707813009.710:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.67.53:22-49.235.165.113:58760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:12.022274 sshd[2157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:12.021000 audit[2157]: USER_AUTH pid=2157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:12.113412 kernel: audit: type=1100 audit(1707813012.021:260): pid=2157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:13.818423 sshd[2157]: Failed password for root from 49.235.165.113 port 58760 ssh2 Feb 13 08:30:15.744314 sshd[2157]: Connection closed by authenticating user root 49.235.165.113 port 58760 [preauth] Feb 13 08:30:15.746825 systemd[1]: sshd@33-145.40.67.53:22-49.235.165.113:58760.service: Deactivated successfully. Feb 13 08:30:15.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.67.53:22-49.235.165.113:58760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:15.840590 kernel: audit: type=1131 audit(1707813015.745:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.67.53:22-49.235.165.113:58760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:15.964801 systemd[1]: Started sshd@34-145.40.67.53:22-49.235.165.113:60082.service. Feb 13 08:30:15.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.67.53:22-49.235.165.113:60082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:16.057580 kernel: audit: type=1130 audit(1707813015.963:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.67.53:22-49.235.165.113:60082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:18.189039 sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:18.187000 audit[2161]: USER_AUTH pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:18.282705 kernel: audit: type=1100 audit(1707813018.187:263): pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:20.476524 sshd[2161]: Failed password for root from 49.235.165.113 port 60082 ssh2 Feb 13 08:30:22.128935 sshd[2161]: Connection closed by authenticating user root 49.235.165.113 port 60082 [preauth] Feb 13 08:30:22.131426 systemd[1]: sshd@34-145.40.67.53:22-49.235.165.113:60082.service: Deactivated successfully. Feb 13 08:30:22.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.67.53:22-49.235.165.113:60082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:22.225579 kernel: audit: type=1131 audit(1707813022.130:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.67.53:22-49.235.165.113:60082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:22.283849 systemd[1]: Started sshd@35-145.40.67.53:22-49.235.165.113:33126.service. Feb 13 08:30:22.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.67.53:22-49.235.165.113:33126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:22.375592 kernel: audit: type=1130 audit(1707813022.282:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.67.53:22-49.235.165.113:33126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:24.332451 sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:24.331000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:24.425541 kernel: audit: type=1100 audit(1707813024.331:266): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:26.108556 sshd[2165]: Failed password for root from 49.235.165.113 port 33126 ssh2 Feb 13 08:30:28.047368 sshd[2165]: Connection closed by authenticating user root 49.235.165.113 port 33126 [preauth] Feb 13 08:30:28.049825 systemd[1]: sshd@35-145.40.67.53:22-49.235.165.113:33126.service: Deactivated successfully. Feb 13 08:30:28.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.67.53:22-49.235.165.113:33126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:28.143579 kernel: audit: type=1131 audit(1707813028.048:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.67.53:22-49.235.165.113:33126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:28.247679 systemd[1]: Started sshd@36-145.40.67.53:22-49.235.165.113:34348.service. Feb 13 08:30:28.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.67.53:22-49.235.165.113:34348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:28.340561 kernel: audit: type=1130 audit(1707813028.246:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.67.53:22-49.235.165.113:34348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:30.012450 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:30.011000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:30.104570 kernel: audit: type=1100 audit(1707813030.011:269): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:31.948692 sshd[2169]: Failed password for root from 49.235.165.113 port 34348 ssh2 Feb 13 08:30:33.628551 sshd[2169]: Connection closed by authenticating user root 49.235.165.113 port 34348 [preauth] Feb 13 08:30:33.631050 systemd[1]: sshd@36-145.40.67.53:22-49.235.165.113:34348.service: Deactivated successfully. Feb 13 08:30:33.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.67.53:22-49.235.165.113:34348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:33.724443 kernel: audit: type=1131 audit(1707813033.630:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.67.53:22-49.235.165.113:34348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:33.880580 systemd[1]: Started sshd@37-145.40.67.53:22-49.235.165.113:35432.service. Feb 13 08:30:33.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.67.53:22-49.235.165.113:35432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:33.974468 kernel: audit: type=1130 audit(1707813033.879:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.67.53:22-49.235.165.113:35432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:35.803426 sshd[2173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:35.802000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:35.896551 kernel: audit: type=1100 audit(1707813035.802:272): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:37.423833 sshd[2173]: Failed password for root from 49.235.165.113 port 35432 ssh2 Feb 13 08:30:37.836549 sshd[2173]: Connection closed by authenticating user root 49.235.165.113 port 35432 [preauth] Feb 13 08:30:37.839048 systemd[1]: sshd@37-145.40.67.53:22-49.235.165.113:35432.service: Deactivated successfully. Feb 13 08:30:37.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.67.53:22-49.235.165.113:35432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:37.932434 kernel: audit: type=1131 audit(1707813037.838:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.67.53:22-49.235.165.113:35432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:38.095540 systemd[1]: Started sshd@38-145.40.67.53:22-49.235.165.113:36346.service. Feb 13 08:30:38.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.67.53:22-49.235.165.113:36346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:38.187423 kernel: audit: type=1130 audit(1707813038.094:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.67.53:22-49.235.165.113:36346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:39.560769 sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:39.559000 audit[2177]: USER_AUTH pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:39.653565 kernel: audit: type=1100 audit(1707813039.559:275): pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:41.731782 sshd[2177]: Failed password for root from 49.235.165.113 port 36346 ssh2 Feb 13 08:30:43.295052 sshd[2177]: Connection closed by authenticating user root 49.235.165.113 port 36346 [preauth] Feb 13 08:30:43.297511 systemd[1]: sshd@38-145.40.67.53:22-49.235.165.113:36346.service: Deactivated successfully. Feb 13 08:30:43.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.67.53:22-49.235.165.113:36346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:43.391583 kernel: audit: type=1131 audit(1707813043.296:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.67.53:22-49.235.165.113:36346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:43.442240 systemd[1]: Started sshd@39-145.40.67.53:22-49.235.165.113:37432.service. Feb 13 08:30:43.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.67.53:22-49.235.165.113:37432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:43.535575 kernel: audit: type=1130 audit(1707813043.440:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.67.53:22-49.235.165.113:37432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:44.682928 sshd[2181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:44.681000 audit[2181]: USER_AUTH pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:44.776568 kernel: audit: type=1100 audit(1707813044.681:278): pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:46.539074 sshd[2181]: Failed password for root from 49.235.165.113 port 37432 ssh2 Feb 13 08:30:48.258483 sshd[2181]: Connection closed by authenticating user root 49.235.165.113 port 37432 [preauth] Feb 13 08:30:48.260944 systemd[1]: sshd@39-145.40.67.53:22-49.235.165.113:37432.service: Deactivated successfully. Feb 13 08:30:48.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.67.53:22-49.235.165.113:37432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:48.354587 kernel: audit: type=1131 audit(1707813048.260:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.67.53:22-49.235.165.113:37432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:48.420081 systemd[1]: Started sshd@40-145.40.67.53:22-49.235.165.113:38474.service. Feb 13 08:30:48.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.67.53:22-49.235.165.113:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:48.512378 kernel: audit: type=1130 audit(1707813048.418:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.67.53:22-49.235.165.113:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:50.016685 sshd[2185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:50.015000 audit[2185]: USER_AUTH pid=2185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:50.108549 kernel: audit: type=1100 audit(1707813050.015:281): pid=2185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:51.697087 sshd[2185]: Failed password for root from 49.235.165.113 port 38474 ssh2 Feb 13 08:30:51.912726 sshd[2185]: Connection closed by authenticating user root 49.235.165.113 port 38474 [preauth] Feb 13 08:30:51.915238 systemd[1]: sshd@40-145.40.67.53:22-49.235.165.113:38474.service: Deactivated successfully. Feb 13 08:30:51.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.67.53:22-49.235.165.113:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:52.008575 kernel: audit: type=1131 audit(1707813051.914:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.67.53:22-49.235.165.113:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:52.070462 systemd[1]: Started sshd@41-145.40.67.53:22-49.235.165.113:39112.service. Feb 13 08:30:52.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.67.53:22-49.235.165.113:39112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:52.161575 kernel: audit: type=1130 audit(1707813052.069:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.67.53:22-49.235.165.113:39112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:53.436304 sshd[2189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:53.435000 audit[2189]: USER_AUTH pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:53.529566 kernel: audit: type=1100 audit(1707813053.435:284): pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:55.528157 sshd[2189]: Failed password for root from 49.235.165.113 port 39112 ssh2 Feb 13 08:30:57.533967 sshd[2189]: Connection closed by authenticating user root 49.235.165.113 port 39112 [preauth] Feb 13 08:30:57.536459 systemd[1]: sshd@41-145.40.67.53:22-49.235.165.113:39112.service: Deactivated successfully. Feb 13 08:30:57.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.67.53:22-49.235.165.113:39112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:57.630581 kernel: audit: type=1131 audit(1707813057.535:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.67.53:22-49.235.165.113:39112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:57.685792 systemd[1]: Started sshd@42-145.40.67.53:22-49.235.165.113:40180.service. Feb 13 08:30:57.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.67.53:22-49.235.165.113:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:57.777585 kernel: audit: type=1130 audit(1707813057.684:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.67.53:22-49.235.165.113:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:30:58.877080 sshd[2193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:30:58.875000 audit[2193]: USER_AUTH pid=2193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:30:58.969412 kernel: audit: type=1100 audit(1707813058.875:287): pid=2193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:00.989115 sshd[2193]: Failed password for root from 49.235.165.113 port 40180 ssh2 Feb 13 08:31:02.569301 sshd[2193]: Connection closed by authenticating user root 49.235.165.113 port 40180 [preauth] Feb 13 08:31:02.571813 systemd[1]: sshd@42-145.40.67.53:22-49.235.165.113:40180.service: Deactivated successfully. Feb 13 08:31:02.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.67.53:22-49.235.165.113:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:02.665581 kernel: audit: type=1131 audit(1707813062.570:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.67.53:22-49.235.165.113:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:02.738740 systemd[1]: Started sshd@43-145.40.67.53:22-49.235.165.113:41234.service. Feb 13 08:31:02.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.67.53:22-49.235.165.113:41234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:02.831577 kernel: audit: type=1130 audit(1707813062.737:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.67.53:22-49.235.165.113:41234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:04.011681 sshd[2197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:04.010000 audit[2197]: USER_AUTH pid=2197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:04.103569 kernel: audit: type=1100 audit(1707813064.010:290): pid=2197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:05.948015 sshd[2197]: Failed password for root from 49.235.165.113 port 41234 ssh2 Feb 13 08:31:07.804740 sshd[2197]: Connection closed by authenticating user root 49.235.165.113 port 41234 [preauth] Feb 13 08:31:07.807249 systemd[1]: sshd@43-145.40.67.53:22-49.235.165.113:41234.service: Deactivated successfully. Feb 13 08:31:07.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.67.53:22-49.235.165.113:41234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:07.900567 kernel: audit: type=1131 audit(1707813067.806:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.67.53:22-49.235.165.113:41234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:08.050580 systemd[1]: Started sshd@44-145.40.67.53:22-49.235.165.113:42280.service. Feb 13 08:31:08.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.67.53:22-49.235.165.113:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:08.142435 kernel: audit: type=1130 audit(1707813068.049:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.67.53:22-49.235.165.113:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:09.672017 sshd[2201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:09.670000 audit[2201]: USER_AUTH pid=2201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:09.764547 kernel: audit: type=1100 audit(1707813069.670:293): pid=2201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:11.292431 sshd[2201]: Failed password for root from 49.235.165.113 port 42280 ssh2 Feb 13 08:31:11.590947 sshd[2201]: Connection closed by authenticating user root 49.235.165.113 port 42280 [preauth] Feb 13 08:31:11.593474 systemd[1]: sshd@44-145.40.67.53:22-49.235.165.113:42280.service: Deactivated successfully. Feb 13 08:31:11.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.67.53:22-49.235.165.113:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:11.687584 kernel: audit: type=1131 audit(1707813071.592:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.67.53:22-49.235.165.113:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:11.833828 systemd[1]: Started sshd@45-145.40.67.53:22-49.235.165.113:43018.service. Feb 13 08:31:11.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.67.53:22-49.235.165.113:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:11.927585 kernel: audit: type=1130 audit(1707813071.832:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.67.53:22-49.235.165.113:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:13.532128 sshd[2205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:13.531000 audit[2205]: USER_AUTH pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:13.625700 kernel: audit: type=1100 audit(1707813073.531:296): pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:15.704308 sshd[2205]: Failed password for root from 49.235.165.113 port 43018 ssh2 Feb 13 08:31:17.138622 sshd[2205]: Connection closed by authenticating user root 49.235.165.113 port 43018 [preauth] Feb 13 08:31:17.141096 systemd[1]: sshd@45-145.40.67.53:22-49.235.165.113:43018.service: Deactivated successfully. Feb 13 08:31:17.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.67.53:22-49.235.165.113:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:17.235718 kernel: audit: type=1131 audit(1707813077.140:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.67.53:22-49.235.165.113:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:17.337850 systemd[1]: Started sshd@46-145.40.67.53:22-49.235.165.113:44032.service. Feb 13 08:31:17.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.67.53:22-49.235.165.113:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:17.431583 kernel: audit: type=1130 audit(1707813077.336:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.67.53:22-49.235.165.113:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:19.013716 sshd[2210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:19.012000 audit[2210]: USER_AUTH pid=2210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:19.106566 kernel: audit: type=1100 audit(1707813079.012:299): pid=2210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:21.341625 sshd[2210]: Failed password for root from 49.235.165.113 port 44032 ssh2 Feb 13 08:31:22.789499 sshd[2210]: Connection closed by authenticating user root 49.235.165.113 port 44032 [preauth] Feb 13 08:31:22.792071 systemd[1]: sshd@46-145.40.67.53:22-49.235.165.113:44032.service: Deactivated successfully. Feb 13 08:31:22.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.67.53:22-49.235.165.113:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:22.885575 kernel: audit: type=1131 audit(1707813082.791:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.67.53:22-49.235.165.113:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:22.915558 systemd[1]: Started sshd@47-145.40.67.53:22-49.235.165.113:45262.service. Feb 13 08:31:22.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.67.53:22-49.235.165.113:45262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:23.008721 kernel: audit: type=1130 audit(1707813082.914:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.67.53:22-49.235.165.113:45262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:25.131512 sshd[2214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:25.130000 audit[2214]: USER_AUTH pid=2214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:25.224569 kernel: audit: type=1100 audit(1707813085.130:302): pid=2214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:27.283663 sshd[2214]: Failed password for root from 49.235.165.113 port 45262 ssh2 Feb 13 08:31:28.924814 sshd[2214]: Connection closed by authenticating user root 49.235.165.113 port 45262 [preauth] Feb 13 08:31:28.927354 systemd[1]: sshd@47-145.40.67.53:22-49.235.165.113:45262.service: Deactivated successfully. Feb 13 08:31:28.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.67.53:22-49.235.165.113:45262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:29.021573 kernel: audit: type=1131 audit(1707813088.926:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.67.53:22-49.235.165.113:45262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:29.119718 systemd[1]: Started sshd@48-145.40.67.53:22-49.235.165.113:46544.service. Feb 13 08:31:29.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.67.53:22-49.235.165.113:46544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:29.211438 kernel: audit: type=1130 audit(1707813089.118:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.67.53:22-49.235.165.113:46544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:31.307550 sshd[2218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:31.306000 audit[2218]: USER_AUTH pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:31.400546 kernel: audit: type=1100 audit(1707813091.306:305): pid=2218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:33.615519 sshd[2218]: Failed password for root from 49.235.165.113 port 46544 ssh2 Feb 13 08:31:35.338699 sshd[2218]: Connection closed by authenticating user root 49.235.165.113 port 46544 [preauth] Feb 13 08:31:35.341216 systemd[1]: sshd@48-145.40.67.53:22-49.235.165.113:46544.service: Deactivated successfully. Feb 13 08:31:35.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.67.53:22-49.235.165.113:46544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:35.434578 kernel: audit: type=1131 audit(1707813095.340:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.67.53:22-49.235.165.113:46544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:35.504290 systemd[1]: Started sshd@49-145.40.67.53:22-49.235.165.113:47824.service. Feb 13 08:31:35.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.67.53:22-49.235.165.113:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:35.595579 kernel: audit: type=1130 audit(1707813095.503:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.67.53:22-49.235.165.113:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:37.603831 sshd[2223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:37.602000 audit[2223]: USER_AUTH pid=2223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:37.696377 kernel: audit: type=1100 audit(1707813097.602:308): pid=2223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:39.736039 sshd[2223]: Failed password for root from 49.235.165.113 port 47824 ssh2 Feb 13 08:31:41.477423 sshd[2223]: Connection closed by authenticating user root 49.235.165.113 port 47824 [preauth] Feb 13 08:31:41.479942 systemd[1]: sshd@49-145.40.67.53:22-49.235.165.113:47824.service: Deactivated successfully. Feb 13 08:31:41.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.67.53:22-49.235.165.113:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:41.573585 kernel: audit: type=1131 audit(1707813101.479:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.67.53:22-49.235.165.113:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:41.634630 systemd[1]: Started sshd@50-145.40.67.53:22-49.235.165.113:48994.service. Feb 13 08:31:41.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.67.53:22-49.235.165.113:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:41.727408 kernel: audit: type=1130 audit(1707813101.633:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.67.53:22-49.235.165.113:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:43.206597 sshd[2230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:43.205000 audit[2230]: USER_AUTH pid=2230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:43.299577 kernel: audit: type=1100 audit(1707813103.205:311): pid=2230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:45.162892 sshd[2230]: Failed password for root from 49.235.165.113 port 48994 ssh2 Feb 13 08:31:46.853361 sshd[2230]: Connection closed by authenticating user root 49.235.165.113 port 48994 [preauth] Feb 13 08:31:46.855895 systemd[1]: sshd@50-145.40.67.53:22-49.235.165.113:48994.service: Deactivated successfully. Feb 13 08:31:46.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.67.53:22-49.235.165.113:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:46.949594 kernel: audit: type=1131 audit(1707813106.855:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.67.53:22-49.235.165.113:48994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:47.010708 systemd[1]: Started sshd@51-145.40.67.53:22-49.235.165.113:50074.service. Feb 13 08:31:47.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.67.53:22-49.235.165.113:50074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:47.102436 kernel: audit: type=1130 audit(1707813107.009:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.67.53:22-49.235.165.113:50074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:48.291119 sshd[2234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:48.290000 audit[2234]: USER_AUTH pid=2234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:48.384595 kernel: audit: type=1100 audit(1707813108.290:314): pid=2234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:50.267639 sshd[2234]: Failed password for root from 49.235.165.113 port 50074 ssh2 Feb 13 08:31:52.162083 sshd[2234]: Connection closed by authenticating user root 49.235.165.113 port 50074 [preauth] Feb 13 08:31:52.164609 systemd[1]: sshd@51-145.40.67.53:22-49.235.165.113:50074.service: Deactivated successfully. Feb 13 08:31:52.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.67.53:22-49.235.165.113:50074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:52.257505 kernel: audit: type=1131 audit(1707813112.163:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.67.53:22-49.235.165.113:50074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:52.305202 systemd[1]: Started sshd@52-145.40.67.53:22-49.235.165.113:51224.service. Feb 13 08:31:52.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.67.53:22-49.235.165.113:51224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:52.397569 kernel: audit: type=1130 audit(1707813112.303:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.67.53:22-49.235.165.113:51224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:53.741742 sshd[2238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:53.740000 audit[2238]: USER_AUTH pid=2238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:53.834567 kernel: audit: type=1100 audit(1707813113.740:317): pid=2238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:56.069788 sshd[2238]: Failed password for root from 49.235.165.113 port 51224 ssh2 Feb 13 08:31:57.509637 sshd[2238]: Connection closed by authenticating user root 49.235.165.113 port 51224 [preauth] Feb 13 08:31:57.512090 systemd[1]: sshd@52-145.40.67.53:22-49.235.165.113:51224.service: Deactivated successfully. Feb 13 08:31:57.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.67.53:22-49.235.165.113:51224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:57.605582 kernel: audit: type=1131 audit(1707813117.511:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.67.53:22-49.235.165.113:51224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:57.706176 systemd[1]: Started sshd@53-145.40.67.53:22-49.235.165.113:52246.service. Feb 13 08:31:57.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.67.53:22-49.235.165.113:52246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:57.797582 kernel: audit: type=1130 audit(1707813117.705:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.67.53:22-49.235.165.113:52246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:31:59.102941 sshd[2242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:31:59.101000 audit[2242]: USER_AUTH pid=2242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:31:59.195378 kernel: audit: type=1100 audit(1707813119.101:320): pid=2242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:01.591010 sshd[2242]: Failed password for root from 49.235.165.113 port 52246 ssh2 Feb 13 08:32:02.759995 sshd[2242]: Connection closed by authenticating user root 49.235.165.113 port 52246 [preauth] Feb 13 08:32:02.762849 systemd[1]: sshd@53-145.40.67.53:22-49.235.165.113:52246.service: Deactivated successfully. Feb 13 08:32:02.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.67.53:22-49.235.165.113:52246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:02.856582 kernel: audit: type=1131 audit(1707813122.761:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.67.53:22-49.235.165.113:52246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:02.909179 systemd[1]: Started sshd@54-145.40.67.53:22-49.235.165.113:53224.service. Feb 13 08:32:02.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.67.53:22-49.235.165.113:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:03.001579 kernel: audit: type=1130 audit(1707813122.907:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.67.53:22-49.235.165.113:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:04.047736 sshd[2247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:04.046000 audit[2247]: USER_AUTH pid=2247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:04.140377 kernel: audit: type=1100 audit(1707813124.046:323): pid=2247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:06.220062 sshd[2247]: Failed password for root from 49.235.165.113 port 53224 ssh2 Feb 13 08:32:07.670597 sshd[2247]: Connection closed by authenticating user root 49.235.165.113 port 53224 [preauth] Feb 13 08:32:07.673100 systemd[1]: sshd@54-145.40.67.53:22-49.235.165.113:53224.service: Deactivated successfully. Feb 13 08:32:07.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.67.53:22-49.235.165.113:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:07.766579 kernel: audit: type=1131 audit(1707813127.672:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.67.53:22-49.235.165.113:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:07.827259 systemd[1]: Started sshd@55-145.40.67.53:22-49.235.165.113:54210.service. Feb 13 08:32:07.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.67.53:22-49.235.165.113:54210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:07.920578 kernel: audit: type=1130 audit(1707813127.825:325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.67.53:22-49.235.165.113:54210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:09.188569 sshd[2252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:09.187000 audit[2252]: USER_AUTH pid=2252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:09.281437 kernel: audit: type=1100 audit(1707813129.187:326): pid=2252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:11.380933 sshd[2252]: Failed password for root from 49.235.165.113 port 54210 ssh2 Feb 13 08:32:12.867470 sshd[2252]: Connection closed by authenticating user root 49.235.165.113 port 54210 [preauth] Feb 13 08:32:12.870015 systemd[1]: sshd@55-145.40.67.53:22-49.235.165.113:54210.service: Deactivated successfully. Feb 13 08:32:12.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.67.53:22-49.235.165.113:54210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:12.963377 kernel: audit: type=1131 audit(1707813132.869:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.67.53:22-49.235.165.113:54210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:13.074007 systemd[1]: Started sshd@56-145.40.67.53:22-49.235.165.113:55306.service. Feb 13 08:32:13.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.67.53:22-49.235.165.113:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:13.166580 kernel: audit: type=1130 audit(1707813133.072:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.67.53:22-49.235.165.113:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:14.801335 sshd[2256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:14.800000 audit[2256]: USER_AUTH pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:14.894482 kernel: audit: type=1100 audit(1707813134.800:329): pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:16.345603 sshd[2256]: Failed password for root from 49.235.165.113 port 55306 ssh2 Feb 13 08:32:16.769306 sshd[2256]: Connection closed by authenticating user root 49.235.165.113 port 55306 [preauth] Feb 13 08:32:16.771745 systemd[1]: sshd@56-145.40.67.53:22-49.235.165.113:55306.service: Deactivated successfully. Feb 13 08:32:16.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.67.53:22-49.235.165.113:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:16.864517 kernel: audit: type=1131 audit(1707813136.770:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.67.53:22-49.235.165.113:55306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:16.914864 systemd[1]: Started sshd@57-145.40.67.53:22-49.235.165.113:56020.service. Feb 13 08:32:16.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.67.53:22-49.235.165.113:56020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:17.006581 kernel: audit: type=1130 audit(1707813136.913:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.67.53:22-49.235.165.113:56020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:19.004835 sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:19.003000 audit[2260]: USER_AUTH pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:19.097568 kernel: audit: type=1100 audit(1707813139.003:332): pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:21.237274 sshd[2260]: Failed password for root from 49.235.165.113 port 56020 ssh2 Feb 13 08:32:22.598645 sshd[2260]: Connection closed by authenticating user root 49.235.165.113 port 56020 [preauth] Feb 13 08:32:22.601134 systemd[1]: sshd@57-145.40.67.53:22-49.235.165.113:56020.service: Deactivated successfully. Feb 13 08:32:22.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.67.53:22-49.235.165.113:56020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:22.694582 kernel: audit: type=1131 audit(1707813142.600:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.67.53:22-49.235.165.113:56020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:22.750165 systemd[1]: Started sshd@58-145.40.67.53:22-49.235.165.113:57174.service. Feb 13 08:32:22.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.67.53:22-49.235.165.113:57174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:22.842377 kernel: audit: type=1130 audit(1707813142.748:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.67.53:22-49.235.165.113:57174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:24.297624 sshd[2266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:24.296000 audit[2266]: USER_AUTH pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:24.390573 kernel: audit: type=1100 audit(1707813144.296:335): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:26.549998 sshd[2266]: Failed password for root from 49.235.165.113 port 57174 ssh2 Feb 13 08:32:27.924188 sshd[2266]: Connection closed by authenticating user root 49.235.165.113 port 57174 [preauth] Feb 13 08:32:27.926999 systemd[1]: sshd@58-145.40.67.53:22-49.235.165.113:57174.service: Deactivated successfully. Feb 13 08:32:27.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.67.53:22-49.235.165.113:57174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:28.019564 kernel: audit: type=1131 audit(1707813147.926:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.67.53:22-49.235.165.113:57174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:28.170679 systemd[1]: Started sshd@59-145.40.67.53:22-49.235.165.113:58272.service. Feb 13 08:32:28.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.67.53:22-49.235.165.113:58272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:28.263428 kernel: audit: type=1130 audit(1707813148.169:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.67.53:22-49.235.165.113:58272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:29.463402 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:29.462000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:29.556553 kernel: audit: type=1100 audit(1707813149.462:338): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:31.735887 sshd[2270]: Failed password for root from 49.235.165.113 port 58272 ssh2 Feb 13 08:32:33.499841 sshd[2270]: Connection closed by authenticating user root 49.235.165.113 port 58272 [preauth] Feb 13 08:32:33.502325 systemd[1]: sshd@59-145.40.67.53:22-49.235.165.113:58272.service: Deactivated successfully. Feb 13 08:32:33.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.67.53:22-49.235.165.113:58272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:33.595575 kernel: audit: type=1131 audit(1707813153.501:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.67.53:22-49.235.165.113:58272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:33.662966 systemd[1]: Started sshd@60-145.40.67.53:22-49.235.165.113:59358.service. Feb 13 08:32:33.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.67.53:22-49.235.165.113:59358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:33.755583 kernel: audit: type=1130 audit(1707813153.661:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.67.53:22-49.235.165.113:59358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:34.795984 sshd[2274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:34.794000 audit[2274]: USER_AUTH pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:34.888380 kernel: audit: type=1100 audit(1707813154.794:341): pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:36.752580 sshd[2274]: Failed password for root from 49.235.165.113 port 59358 ssh2 Feb 13 08:32:38.673867 sshd[2274]: Connection closed by authenticating user root 49.235.165.113 port 59358 [preauth] Feb 13 08:32:38.676396 systemd[1]: sshd@60-145.40.67.53:22-49.235.165.113:59358.service: Deactivated successfully. Feb 13 08:32:38.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.67.53:22-49.235.165.113:59358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:38.769401 kernel: audit: type=1131 audit(1707813158.675:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.67.53:22-49.235.165.113:59358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:38.875606 systemd[1]: Started sshd@61-145.40.67.53:22-49.235.165.113:60448.service. Feb 13 08:32:38.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.67.53:22-49.235.165.113:60448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:38.968378 kernel: audit: type=1130 audit(1707813158.874:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.67.53:22-49.235.165.113:60448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:40.335607 sshd[2278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:40.334000 audit[2278]: USER_AUTH pid=2278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:40.428571 kernel: audit: type=1100 audit(1707813160.334:344): pid=2278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:42.451775 sshd[2278]: Failed password for root from 49.235.165.113 port 60448 ssh2 Feb 13 08:32:44.100739 sshd[2278]: Connection closed by authenticating user root 49.235.165.113 port 60448 [preauth] Feb 13 08:32:44.103303 systemd[1]: sshd@61-145.40.67.53:22-49.235.165.113:60448.service: Deactivated successfully. Feb 13 08:32:44.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.67.53:22-49.235.165.113:60448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:44.196583 kernel: audit: type=1131 audit(1707813164.102:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.67.53:22-49.235.165.113:60448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:44.232732 systemd[1]: Started sshd@62-145.40.67.53:22-49.235.165.113:33340.service. Feb 13 08:32:44.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.67.53:22-49.235.165.113:33340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:44.323383 kernel: audit: type=1130 audit(1707813164.231:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.67.53:22-49.235.165.113:33340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:45.967430 sshd[2285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:45.966000 audit[2285]: USER_AUTH pid=2285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:46.060573 kernel: audit: type=1100 audit(1707813165.966:347): pid=2285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:47.768229 sshd[2285]: Failed password for root from 49.235.165.113 port 33340 ssh2 Feb 13 08:32:49.614823 sshd[2285]: Connection closed by authenticating user root 49.235.165.113 port 33340 [preauth] Feb 13 08:32:49.617307 systemd[1]: sshd@62-145.40.67.53:22-49.235.165.113:33340.service: Deactivated successfully. Feb 13 08:32:49.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.67.53:22-49.235.165.113:33340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:49.710578 kernel: audit: type=1131 audit(1707813169.616:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.67.53:22-49.235.165.113:33340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:49.784646 systemd[1]: Started sshd@63-145.40.67.53:22-49.235.165.113:34428.service. Feb 13 08:32:49.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.67.53:22-49.235.165.113:34428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:49.875587 kernel: audit: type=1130 audit(1707813169.783:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.67.53:22-49.235.165.113:34428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:51.194559 sshd[2289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:51.193000 audit[2289]: USER_AUTH pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:51.287431 kernel: audit: type=1100 audit(1707813171.193:350): pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:53.487139 sshd[2289]: Failed password for root from 49.235.165.113 port 34428 ssh2 Feb 13 08:32:54.860503 sshd[2289]: Connection closed by authenticating user root 49.235.165.113 port 34428 [preauth] Feb 13 08:32:54.863043 systemd[1]: sshd@63-145.40.67.53:22-49.235.165.113:34428.service: Deactivated successfully. Feb 13 08:32:54.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.67.53:22-49.235.165.113:34428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:54.956377 kernel: audit: type=1131 audit(1707813174.862:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.67.53:22-49.235.165.113:34428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:55.023709 systemd[1]: Started sshd@64-145.40.67.53:22-49.235.165.113:35424.service. Feb 13 08:32:55.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.67.53:22-49.235.165.113:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:55.114451 kernel: audit: type=1130 audit(1707813175.022:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.67.53:22-49.235.165.113:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:56.502353 sshd[2293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:32:56.501000 audit[2293]: USER_AUTH pid=2293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:56.595579 kernel: audit: type=1100 audit(1707813176.501:353): pid=2293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:32:58.147649 sshd[2293]: Failed password for root from 49.235.165.113 port 35424 ssh2 Feb 13 08:32:58.451906 sshd[2293]: Connection closed by authenticating user root 49.235.165.113 port 35424 [preauth] Feb 13 08:32:58.454306 systemd[1]: sshd@64-145.40.67.53:22-49.235.165.113:35424.service: Deactivated successfully. Feb 13 08:32:58.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.67.53:22-49.235.165.113:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:58.547377 kernel: audit: type=1131 audit(1707813178.453:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.67.53:22-49.235.165.113:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:58.639107 systemd[1]: Started sshd@65-145.40.67.53:22-49.235.165.113:36036.service. Feb 13 08:32:58.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.67.53:22-49.235.165.113:36036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:32:58.731377 kernel: audit: type=1130 audit(1707813178.637:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.67.53:22-49.235.165.113:36036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:00.503857 sshd[2297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:00.502000 audit[2297]: USER_AUTH pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:00.596378 kernel: audit: type=1100 audit(1707813180.502:356): pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:02.695769 sshd[2297]: Failed password for root from 49.235.165.113 port 36036 ssh2 Feb 13 08:33:04.258071 sshd[2297]: Connection closed by authenticating user root 49.235.165.113 port 36036 [preauth] Feb 13 08:33:04.260580 systemd[1]: sshd@65-145.40.67.53:22-49.235.165.113:36036.service: Deactivated successfully. Feb 13 08:33:04.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.67.53:22-49.235.165.113:36036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:04.354463 kernel: audit: type=1131 audit(1707813184.259:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.67.53:22-49.235.165.113:36036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:04.392453 systemd[1]: Started sshd@66-145.40.67.53:22-49.235.165.113:37198.service. Feb 13 08:33:04.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.67.53:22-49.235.165.113:37198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:04.483570 kernel: audit: type=1130 audit(1707813184.391:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.67.53:22-49.235.165.113:37198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:05.701690 sshd[2301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:05.700000 audit[2301]: USER_AUTH pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:05.793427 kernel: audit: type=1100 audit(1707813185.700:359): pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:08.249586 sshd[2301]: Failed password for root from 49.235.165.113 port 37198 ssh2 Feb 13 08:33:09.559354 systemd[1]: Started sshd@67-145.40.67.53:22-49.235.165.113:38214.service. Feb 13 08:33:09.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.67.53:22-49.235.165.113:38214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:09.652380 kernel: audit: type=1130 audit(1707813189.558:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.67.53:22-49.235.165.113:38214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:09.762747 sshd[2301]: Connection closed by authenticating user root 49.235.165.113 port 37198 [preauth] Feb 13 08:33:09.764214 systemd[1]: sshd@66-145.40.67.53:22-49.235.165.113:37198.service: Deactivated successfully. Feb 13 08:33:09.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.67.53:22-49.235.165.113:37198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:09.862378 kernel: audit: type=1131 audit(1707813189.763:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.67.53:22-49.235.165.113:37198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:10.898902 sshd[2304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:10.897000 audit[2304]: USER_AUTH pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:10.992570 kernel: audit: type=1100 audit(1707813190.897:362): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:13.131289 sshd[2304]: Failed password for root from 49.235.165.113 port 38214 ssh2 Feb 13 08:33:14.488370 sshd[2304]: Connection closed by authenticating user root 49.235.165.113 port 38214 [preauth] Feb 13 08:33:14.490904 systemd[1]: sshd@67-145.40.67.53:22-49.235.165.113:38214.service: Deactivated successfully. Feb 13 08:33:14.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.67.53:22-49.235.165.113:38214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:14.584467 kernel: audit: type=1131 audit(1707813194.489:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.67.53:22-49.235.165.113:38214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:14.658030 systemd[1]: Started sshd@68-145.40.67.53:22-49.235.165.113:39232.service. Feb 13 08:33:14.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.67.53:22-49.235.165.113:39232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:14.750377 kernel: audit: type=1130 audit(1707813194.656:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.67.53:22-49.235.165.113:39232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:15.903345 sshd[2311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:15.902000 audit[2311]: USER_AUTH pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:15.996574 kernel: audit: type=1100 audit(1707813195.902:365): pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:17.823784 sshd[2311]: Failed password for root from 49.235.165.113 port 39232 ssh2 Feb 13 08:33:19.512695 sshd[2311]: Connection closed by authenticating user root 49.235.165.113 port 39232 [preauth] Feb 13 08:33:19.515161 systemd[1]: sshd@68-145.40.67.53:22-49.235.165.113:39232.service: Deactivated successfully. Feb 13 08:33:19.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.67.53:22-49.235.165.113:39232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:19.608444 kernel: audit: type=1131 audit(1707813199.514:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.67.53:22-49.235.165.113:39232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:19.650849 systemd[1]: Started sshd@69-145.40.67.53:22-49.235.165.113:40298.service. Feb 13 08:33:19.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.67.53:22-49.235.165.113:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:19.743377 kernel: audit: type=1130 audit(1707813199.649:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.67.53:22-49.235.165.113:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:21.356143 sshd[2315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:21.355000 audit[2315]: USER_AUTH pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:21.449388 kernel: audit: type=1100 audit(1707813201.355:368): pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:23.433084 sshd[2315]: Failed password for root from 49.235.165.113 port 40298 ssh2 Feb 13 08:33:25.046754 sshd[2315]: Connection closed by authenticating user root 49.235.165.113 port 40298 [preauth] Feb 13 08:33:25.049192 systemd[1]: sshd@69-145.40.67.53:22-49.235.165.113:40298.service: Deactivated successfully. Feb 13 08:33:25.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.67.53:22-49.235.165.113:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:25.142570 kernel: audit: type=1131 audit(1707813205.048:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.67.53:22-49.235.165.113:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:25.281443 systemd[1]: Started sshd@70-145.40.67.53:22-49.235.165.113:41330.service. Feb 13 08:33:25.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.67.53:22-49.235.165.113:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:25.374377 kernel: audit: type=1130 audit(1707813205.280:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.67.53:22-49.235.165.113:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:26.982429 sshd[2320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:26.981000 audit[2320]: USER_AUTH pid=2320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:27.075570 kernel: audit: type=1100 audit(1707813206.981:371): pid=2320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:29.079340 sshd[2320]: Failed password for root from 49.235.165.113 port 41330 ssh2 Feb 13 08:33:30.635450 sshd[2320]: Connection closed by authenticating user root 49.235.165.113 port 41330 [preauth] Feb 13 08:33:30.638019 systemd[1]: sshd@70-145.40.67.53:22-49.235.165.113:41330.service: Deactivated successfully. Feb 13 08:33:30.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.67.53:22-49.235.165.113:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:30.731586 kernel: audit: type=1131 audit(1707813210.637:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.67.53:22-49.235.165.113:41330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:30.829860 systemd[1]: Started sshd@71-145.40.67.53:22-49.235.165.113:42490.service. Feb 13 08:33:30.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.67.53:22-49.235.165.113:42490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:30.922571 kernel: audit: type=1130 audit(1707813210.828:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.67.53:22-49.235.165.113:42490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:32.753544 sshd[2324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:32.752000 audit[2324]: USER_AUTH pid=2324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:32.846568 kernel: audit: type=1100 audit(1707813212.752:374): pid=2324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:34.338914 sshd[2324]: Failed password for root from 49.235.165.113 port 42490 ssh2 Feb 13 08:33:34.695197 sshd[2324]: Connection closed by authenticating user root 49.235.165.113 port 42490 [preauth] Feb 13 08:33:34.697722 systemd[1]: sshd@71-145.40.67.53:22-49.235.165.113:42490.service: Deactivated successfully. Feb 13 08:33:34.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.67.53:22-49.235.165.113:42490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:34.791561 kernel: audit: type=1131 audit(1707813214.696:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.67.53:22-49.235.165.113:42490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:34.922256 systemd[1]: Started sshd@72-145.40.67.53:22-49.235.165.113:43280.service. Feb 13 08:33:34.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.67.53:22-49.235.165.113:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:35.015585 kernel: audit: type=1130 audit(1707813214.921:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.67.53:22-49.235.165.113:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:36.359324 sshd[2328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:36.358000 audit[2328]: USER_AUTH pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:36.452563 kernel: audit: type=1100 audit(1707813216.358:377): pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:39.163594 sshd[2328]: Failed password for root from 49.235.165.113 port 43280 ssh2 Feb 13 08:33:39.987648 sshd[2328]: Connection closed by authenticating user root 49.235.165.113 port 43280 [preauth] Feb 13 08:33:39.990313 systemd[1]: sshd@72-145.40.67.53:22-49.235.165.113:43280.service: Deactivated successfully. Feb 13 08:33:39.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.67.53:22-49.235.165.113:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:40.084583 kernel: audit: type=1131 audit(1707813219.989:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.67.53:22-49.235.165.113:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:40.130533 systemd[1]: Started sshd@73-145.40.67.53:22-49.235.165.113:44248.service. Feb 13 08:33:40.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.67.53:22-49.235.165.113:44248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:40.222696 kernel: audit: type=1130 audit(1707813220.129:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.67.53:22-49.235.165.113:44248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:41.823865 sshd[2332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:41.822000 audit[2332]: USER_AUTH pid=2332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:41.916585 kernel: audit: type=1100 audit(1707813221.822:380): pid=2332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:44.312394 sshd[2332]: Failed password for root from 49.235.165.113 port 44248 ssh2 Feb 13 08:33:45.581999 sshd[2332]: Connection closed by authenticating user root 49.235.165.113 port 44248 [preauth] Feb 13 08:33:45.584495 systemd[1]: sshd@73-145.40.67.53:22-49.235.165.113:44248.service: Deactivated successfully. Feb 13 08:33:45.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.67.53:22-49.235.165.113:44248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:45.678580 kernel: audit: type=1131 audit(1707813225.583:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.67.53:22-49.235.165.113:44248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:45.758313 systemd[1]: Started sshd@74-145.40.67.53:22-49.235.165.113:45388.service. Feb 13 08:33:45.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.67.53:22-49.235.165.113:45388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:45.851581 kernel: audit: type=1130 audit(1707813225.757:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.67.53:22-49.235.165.113:45388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:47.630207 sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:47.629000 audit[2337]: USER_AUTH pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:47.722420 kernel: audit: type=1100 audit(1707813227.629:383): pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:49.943022 sshd[2337]: Failed password for root from 49.235.165.113 port 45388 ssh2 Feb 13 08:33:51.270477 sshd[2337]: Connection closed by authenticating user root 49.235.165.113 port 45388 [preauth] Feb 13 08:33:51.273005 systemd[1]: sshd@74-145.40.67.53:22-49.235.165.113:45388.service: Deactivated successfully. Feb 13 08:33:51.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.67.53:22-49.235.165.113:45388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:51.366453 kernel: audit: type=1131 audit(1707813231.272:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.67.53:22-49.235.165.113:45388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:51.446289 systemd[1]: Started sshd@75-145.40.67.53:22-49.235.165.113:46502.service. Feb 13 08:33:51.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.67.53:22-49.235.165.113:46502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:51.539582 kernel: audit: type=1130 audit(1707813231.445:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.67.53:22-49.235.165.113:46502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:52.498827 sshd[2341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:52.497000 audit[2341]: USER_AUTH pid=2341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:52.591405 kernel: audit: type=1100 audit(1707813232.497:386): pid=2341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:54.831658 sshd[2341]: Failed password for root from 49.235.165.113 port 46502 ssh2 Feb 13 08:33:56.346897 sshd[2341]: Connection closed by authenticating user root 49.235.165.113 port 46502 [preauth] Feb 13 08:33:56.349395 systemd[1]: sshd@75-145.40.67.53:22-49.235.165.113:46502.service: Deactivated successfully. Feb 13 08:33:56.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.67.53:22-49.235.165.113:46502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:56.442376 kernel: audit: type=1131 audit(1707813236.348:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.67.53:22-49.235.165.113:46502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:56.575827 systemd[1]: Started sshd@76-145.40.67.53:22-49.235.165.113:47554.service. Feb 13 08:33:56.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.67.53:22-49.235.165.113:47554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:56.668420 kernel: audit: type=1130 audit(1707813236.574:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.67.53:22-49.235.165.113:47554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:33:58.372566 sshd[2345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:33:58.371000 audit[2345]: USER_AUTH pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:58.465569 kernel: audit: type=1100 audit(1707813238.371:389): pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:33:59.862295 sshd[2345]: Failed password for root from 49.235.165.113 port 47554 ssh2 Feb 13 08:34:00.309315 sshd[2345]: Connection closed by authenticating user root 49.235.165.113 port 47554 [preauth] Feb 13 08:34:00.311860 systemd[1]: sshd@76-145.40.67.53:22-49.235.165.113:47554.service: Deactivated successfully. Feb 13 08:34:00.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.67.53:22-49.235.165.113:47554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:00.405580 kernel: audit: type=1131 audit(1707813240.310:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.67.53:22-49.235.165.113:47554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:00.497576 systemd[1]: Started sshd@77-145.40.67.53:22-49.235.165.113:48376.service. Feb 13 08:34:00.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.67.53:22-49.235.165.113:48376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:00.590561 kernel: audit: type=1130 audit(1707813240.496:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.67.53:22-49.235.165.113:48376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:02.359001 sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:02.357000 audit[2349]: USER_AUTH pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:02.452577 kernel: audit: type=1100 audit(1707813242.357:392): pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:04.064477 sshd[2349]: Failed password for root from 49.235.165.113 port 48376 ssh2 Feb 13 08:34:04.343531 sshd[2349]: Connection closed by authenticating user root 49.235.165.113 port 48376 [preauth] Feb 13 08:34:04.346020 systemd[1]: sshd@77-145.40.67.53:22-49.235.165.113:48376.service: Deactivated successfully. Feb 13 08:34:04.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.67.53:22-49.235.165.113:48376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:04.439432 kernel: audit: type=1131 audit(1707813244.345:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.67.53:22-49.235.165.113:48376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:04.487043 systemd[1]: Started sshd@78-145.40.67.53:22-49.235.165.113:49006.service. Feb 13 08:34:04.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.67.53:22-49.235.165.113:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:04.578581 kernel: audit: type=1130 audit(1707813244.485:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.67.53:22-49.235.165.113:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:05.868752 sshd[2355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:05.867000 audit[2355]: USER_AUTH pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:05.962467 kernel: audit: type=1100 audit(1707813245.867:395): pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:07.985841 sshd[2355]: Failed password for root from 49.235.165.113 port 49006 ssh2 Feb 13 08:34:09.600400 sshd[2355]: Connection closed by authenticating user root 49.235.165.113 port 49006 [preauth] Feb 13 08:34:09.602892 systemd[1]: sshd@78-145.40.67.53:22-49.235.165.113:49006.service: Deactivated successfully. Feb 13 08:34:09.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.67.53:22-49.235.165.113:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:09.696584 kernel: audit: type=1131 audit(1707813249.602:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.67.53:22-49.235.165.113:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:09.818653 systemd[1]: Started sshd@79-145.40.67.53:22-49.235.165.113:50098.service. Feb 13 08:34:09.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.67.53:22-49.235.165.113:50098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:09.910437 kernel: audit: type=1130 audit(1707813249.817:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.67.53:22-49.235.165.113:50098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:11.274287 sshd[2359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:11.273000 audit[2359]: USER_AUTH pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:11.367709 kernel: audit: type=1100 audit(1707813251.273:398): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:13.883006 sshd[2359]: Failed password for root from 49.235.165.113 port 50098 ssh2 Feb 13 08:34:15.123248 sshd[2359]: Connection closed by authenticating user root 49.235.165.113 port 50098 [preauth] Feb 13 08:34:15.125747 systemd[1]: sshd@79-145.40.67.53:22-49.235.165.113:50098.service: Deactivated successfully. Feb 13 08:34:15.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.67.53:22-49.235.165.113:50098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:15.219586 kernel: audit: type=1131 audit(1707813255.124:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.67.53:22-49.235.165.113:50098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:15.274476 systemd[1]: Started sshd@80-145.40.67.53:22-49.235.165.113:51220.service. Feb 13 08:34:15.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.67.53:22-49.235.165.113:51220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:15.365562 kernel: audit: type=1130 audit(1707813255.273:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.67.53:22-49.235.165.113:51220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:16.334645 sshd[2363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:16.333000 audit[2363]: USER_AUTH pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:16.427562 kernel: audit: type=1100 audit(1707813256.333:401): pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:18.627392 sshd[2363]: Failed password for root from 49.235.165.113 port 51220 ssh2 Feb 13 08:34:20.055299 sshd[2363]: Connection closed by authenticating user root 49.235.165.113 port 51220 [preauth] Feb 13 08:34:20.057811 systemd[1]: sshd@80-145.40.67.53:22-49.235.165.113:51220.service: Deactivated successfully. Feb 13 08:34:20.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.67.53:22-49.235.165.113:51220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:20.151562 kernel: audit: type=1131 audit(1707813260.056:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.67.53:22-49.235.165.113:51220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:20.405237 systemd[1]: Started sshd@81-145.40.67.53:22-49.235.165.113:52266.service. Feb 13 08:34:20.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.67.53:22-49.235.165.113:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:20.497583 kernel: audit: type=1130 audit(1707813260.404:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.67.53:22-49.235.165.113:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:21.900979 sshd[2367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:21.899000 audit[2367]: USER_AUTH pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:21.993562 kernel: audit: type=1100 audit(1707813261.899:404): pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:23.215054 sshd[2367]: Failed password for root from 49.235.165.113 port 52266 ssh2 Feb 13 08:34:23.948196 sshd[2367]: Connection closed by authenticating user root 49.235.165.113 port 52266 [preauth] Feb 13 08:34:23.950742 systemd[1]: sshd@81-145.40.67.53:22-49.235.165.113:52266.service: Deactivated successfully. Feb 13 08:34:23.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.67.53:22-49.235.165.113:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:24.044460 kernel: audit: type=1131 audit(1707813263.949:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.67.53:22-49.235.165.113:52266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:24.104808 systemd[1]: Started sshd@82-145.40.67.53:22-49.235.165.113:53098.service. Feb 13 08:34:24.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.67.53:22-49.235.165.113:53098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:24.196579 kernel: audit: type=1130 audit(1707813264.103:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.67.53:22-49.235.165.113:53098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:25.512766 sshd[2371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:25.511000 audit[2371]: USER_AUTH pid=2371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:25.604563 kernel: audit: type=1100 audit(1707813265.511:407): pid=2371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:28.041448 sshd[2371]: Failed password for root from 49.235.165.113 port 53098 ssh2 Feb 13 08:34:29.156122 sshd[2371]: Connection closed by authenticating user root 49.235.165.113 port 53098 [preauth] Feb 13 08:34:29.158667 systemd[1]: sshd@82-145.40.67.53:22-49.235.165.113:53098.service: Deactivated successfully. Feb 13 08:34:29.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.67.53:22-49.235.165.113:53098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:29.252584 kernel: audit: type=1131 audit(1707813269.157:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.67.53:22-49.235.165.113:53098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:29.329152 systemd[1]: Started sshd@83-145.40.67.53:22-49.235.165.113:54122.service. Feb 13 08:34:29.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.67.53:22-49.235.165.113:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:29.421416 kernel: audit: type=1130 audit(1707813269.327:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.67.53:22-49.235.165.113:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:31.221874 sshd[2375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.165.113 user=root Feb 13 08:34:31.220000 audit[2375]: USER_AUTH pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:31.313569 kernel: audit: type=1100 audit(1707813271.220:410): pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.235.165.113 addr=49.235.165.113 terminal=ssh res=failed' Feb 13 08:34:33.243341 sshd[2375]: Failed password for root from 49.235.165.113 port 54122 ssh2 Feb 13 08:34:34.981310 sshd[2375]: Connection closed by authenticating user root 49.235.165.113 port 54122 [preauth] Feb 13 08:34:34.983814 systemd[1]: sshd@83-145.40.67.53:22-49.235.165.113:54122.service: Deactivated successfully. Feb 13 08:34:34.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.67.53:22-49.235.165.113:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:35.077573 kernel: audit: type=1131 audit(1707813274.982:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.67.53:22-49.235.165.113:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:35.153676 systemd[1]: Started sshd@84-145.40.67.53:22-49.235.165.113:55360.service. Feb 13 08:34:35.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.67.53:22-49.235.165.113:55360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 08:34:35.246571 kernel: audit: type=1130 audit(1707813275.152:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.67.53:22-49.235.165.113:55360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'