Apr 12 20:33:10.547911 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Apr 12 20:33:10.547923 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 20:33:10.547931 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:33:10.547935 kernel: BIOS-provided physical RAM map: Apr 12 20:33:10.547939 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 20:33:10.547942 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 20:33:10.547947 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 20:33:10.547951 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 20:33:10.547955 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 20:33:10.547959 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000061f6dfff] usable Apr 12 20:33:10.547963 kernel: BIOS-e820: [mem 0x0000000061f6e000-0x0000000061f6efff] ACPI NVS Apr 12 20:33:10.547967 kernel: BIOS-e820: [mem 0x0000000061f6f000-0x0000000061f6ffff] reserved Apr 12 20:33:10.547971 kernel: BIOS-e820: [mem 0x0000000061f70000-0x000000006c0c4fff] usable Apr 12 20:33:10.547975 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Apr 12 20:33:10.547980 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Apr 12 20:33:10.547985 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Apr 12 20:33:10.547989 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Apr 12 20:33:10.547993 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Apr 12 20:33:10.547997 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Apr 12 20:33:10.548001 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 20:33:10.548005 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 20:33:10.548010 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 20:33:10.548014 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 20:33:10.548018 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 20:33:10.548022 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Apr 12 20:33:10.548027 kernel: NX (Execute Disable) protection: active Apr 12 20:33:10.548031 kernel: SMBIOS 3.2.1 present. Apr 12 20:33:10.548035 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Apr 12 20:33:10.548040 kernel: tsc: Detected 3400.000 MHz processor Apr 12 20:33:10.548044 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 20:33:10.548048 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 20:33:10.548053 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 20:33:10.548057 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Apr 12 20:33:10.548062 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 20:33:10.548066 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Apr 12 20:33:10.548070 kernel: Using GB pages for direct mapping Apr 12 20:33:10.548076 kernel: ACPI: Early table checksum verification disabled Apr 12 20:33:10.548080 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 20:33:10.548084 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 20:33:10.548089 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Apr 12 20:33:10.548095 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 20:33:10.548100 kernel: ACPI: FACS 0x000000006D762F80 000040 Apr 12 20:33:10.548105 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Apr 12 20:33:10.548110 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Apr 12 20:33:10.548115 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 20:33:10.548119 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 20:33:10.548124 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 20:33:10.548129 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 20:33:10.548133 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 20:33:10.548139 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 20:33:10.548144 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:33:10.548148 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 20:33:10.548153 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 20:33:10.548158 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:33:10.548162 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:33:10.548167 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 20:33:10.548172 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 20:33:10.548176 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:33:10.548182 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:33:10.548187 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 20:33:10.548191 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Apr 12 20:33:10.548196 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 20:33:10.548201 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 20:33:10.548205 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 20:33:10.548210 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xf0a 01072009 AMI 00010013) Apr 12 20:33:10.548215 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 20:33:10.548221 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 20:33:10.548225 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 20:33:10.548230 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 20:33:10.548235 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 20:33:10.548239 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Apr 12 20:33:10.548244 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Apr 12 20:33:10.548249 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Apr 12 20:33:10.548253 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Apr 12 20:33:10.548258 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Apr 12 20:33:10.548263 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Apr 12 20:33:10.548268 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Apr 12 20:33:10.548273 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Apr 12 20:33:10.548278 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Apr 12 20:33:10.548282 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Apr 12 20:33:10.548287 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Apr 12 20:33:10.548292 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Apr 12 20:33:10.548296 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Apr 12 20:33:10.548301 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Apr 12 20:33:10.548306 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Apr 12 20:33:10.548311 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Apr 12 20:33:10.548316 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Apr 12 20:33:10.548323 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Apr 12 20:33:10.548328 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Apr 12 20:33:10.548332 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Apr 12 20:33:10.548337 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Apr 12 20:33:10.548342 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Apr 12 20:33:10.548346 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Apr 12 20:33:10.548352 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Apr 12 20:33:10.548357 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Apr 12 20:33:10.548361 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Apr 12 20:33:10.548380 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Apr 12 20:33:10.548384 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Apr 12 20:33:10.548389 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Apr 12 20:33:10.548394 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Apr 12 20:33:10.548398 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Apr 12 20:33:10.548403 kernel: No NUMA configuration found Apr 12 20:33:10.548408 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Apr 12 20:33:10.548413 kernel: NODE_DATA(0) allocated [mem 0x8837f8000-0x8837fdfff] Apr 12 20:33:10.548417 kernel: Zone ranges: Apr 12 20:33:10.548422 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 20:33:10.548427 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 20:33:10.548431 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Apr 12 20:33:10.548436 kernel: Movable zone start for each node Apr 12 20:33:10.548440 kernel: Early memory node ranges Apr 12 20:33:10.548445 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 20:33:10.548450 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 20:33:10.548455 kernel: node 0: [mem 0x0000000040400000-0x0000000061f6dfff] Apr 12 20:33:10.548459 kernel: node 0: [mem 0x0000000061f70000-0x000000006c0c4fff] Apr 12 20:33:10.548464 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Apr 12 20:33:10.548469 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Apr 12 20:33:10.548473 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Apr 12 20:33:10.548478 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Apr 12 20:33:10.548486 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 20:33:10.548491 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 20:33:10.548496 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 20:33:10.548501 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 20:33:10.548507 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Apr 12 20:33:10.548512 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Apr 12 20:33:10.548517 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Apr 12 20:33:10.548522 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 20:33:10.548527 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 20:33:10.548532 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 20:33:10.548537 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 20:33:10.548542 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 20:33:10.548547 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 20:33:10.548552 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 20:33:10.548557 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 20:33:10.548562 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 20:33:10.548567 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 20:33:10.548571 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 20:33:10.548576 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 20:33:10.548582 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 20:33:10.548587 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 20:33:10.548592 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 20:33:10.548596 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 20:33:10.548601 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 20:33:10.548606 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 20:33:10.548611 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 20:33:10.548616 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 20:33:10.548621 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 20:33:10.548627 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 20:33:10.548632 kernel: TSC deadline timer available Apr 12 20:33:10.548637 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 20:33:10.548642 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Apr 12 20:33:10.548646 kernel: Booting paravirtualized kernel on bare hardware Apr 12 20:33:10.548651 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 20:33:10.548656 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 20:33:10.548661 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 20:33:10.548666 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 20:33:10.548672 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 20:33:10.548676 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Apr 12 20:33:10.548681 kernel: Policy zone: Normal Apr 12 20:33:10.548687 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:33:10.548692 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 20:33:10.548697 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 20:33:10.548702 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 20:33:10.548707 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 20:33:10.548713 kernel: Memory: 32553604K/33281940K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 728076K reserved, 0K cma-reserved) Apr 12 20:33:10.548718 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 20:33:10.548723 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 20:33:10.548728 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 20:33:10.548732 kernel: rcu: Hierarchical RCU implementation. Apr 12 20:33:10.548738 kernel: rcu: RCU event tracing is enabled. Apr 12 20:33:10.548742 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 20:33:10.548747 kernel: Rude variant of Tasks RCU enabled. Apr 12 20:33:10.548752 kernel: Tracing variant of Tasks RCU enabled. Apr 12 20:33:10.548758 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 20:33:10.548763 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 20:33:10.548768 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 20:33:10.548773 kernel: random: crng init done Apr 12 20:33:10.548778 kernel: Console: colour dummy device 80x25 Apr 12 20:33:10.548783 kernel: printk: console [tty0] enabled Apr 12 20:33:10.548788 kernel: printk: console [ttyS1] enabled Apr 12 20:33:10.548792 kernel: ACPI: Core revision 20210730 Apr 12 20:33:10.548797 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Apr 12 20:33:10.548803 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 20:33:10.548808 kernel: DMAR: Host address width 39 Apr 12 20:33:10.548813 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Apr 12 20:33:10.548818 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Apr 12 20:33:10.548823 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 20:33:10.548828 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 20:33:10.548833 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Apr 12 20:33:10.548838 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Apr 12 20:33:10.548843 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Apr 12 20:33:10.548848 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 20:33:10.548853 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 20:33:10.548858 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 20:33:10.548863 kernel: x2apic enabled Apr 12 20:33:10.548868 kernel: Switched APIC routing to cluster x2apic. Apr 12 20:33:10.548873 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 20:33:10.548878 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 20:33:10.548883 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 20:33:10.548888 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 20:33:10.548894 kernel: process: using mwait in idle threads Apr 12 20:33:10.548898 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 20:33:10.548903 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 20:33:10.548908 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 20:33:10.548913 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 20:33:10.548918 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 20:33:10.548923 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 20:33:10.548928 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 20:33:10.548933 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 20:33:10.548939 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 20:33:10.548944 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 20:33:10.548949 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 20:33:10.548954 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 20:33:10.548959 kernel: TAA: Mitigation: TSX disabled Apr 12 20:33:10.548964 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 20:33:10.548969 kernel: SRBDS: Mitigation: Microcode Apr 12 20:33:10.548973 kernel: GDS: Vulnerable: No microcode Apr 12 20:33:10.548978 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 20:33:10.548984 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 20:33:10.548989 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 20:33:10.548994 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 20:33:10.548999 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 20:33:10.549004 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 20:33:10.549009 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 20:33:10.549014 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 20:33:10.549019 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 20:33:10.549024 kernel: Freeing SMP alternatives memory: 32K Apr 12 20:33:10.549029 kernel: pid_max: default: 32768 minimum: 301 Apr 12 20:33:10.549034 kernel: LSM: Security Framework initializing Apr 12 20:33:10.549039 kernel: SELinux: Initializing. Apr 12 20:33:10.549044 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:33:10.549049 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:33:10.549054 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 20:33:10.549059 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 20:33:10.549064 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 20:33:10.549069 kernel: ... version: 4 Apr 12 20:33:10.549074 kernel: ... bit width: 48 Apr 12 20:33:10.549080 kernel: ... generic registers: 4 Apr 12 20:33:10.549085 kernel: ... value mask: 0000ffffffffffff Apr 12 20:33:10.549089 kernel: ... max period: 00007fffffffffff Apr 12 20:33:10.549094 kernel: ... fixed-purpose events: 3 Apr 12 20:33:10.549099 kernel: ... event mask: 000000070000000f Apr 12 20:33:10.549104 kernel: signal: max sigframe size: 2032 Apr 12 20:33:10.549109 kernel: rcu: Hierarchical SRCU implementation. Apr 12 20:33:10.549114 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 20:33:10.549120 kernel: smp: Bringing up secondary CPUs ... Apr 12 20:33:10.549124 kernel: x86: Booting SMP configuration: Apr 12 20:33:10.549129 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 20:33:10.549134 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 20:33:10.549139 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 20:33:10.549144 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 20:33:10.549149 kernel: smpboot: Max logical packages: 1 Apr 12 20:33:10.549154 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 20:33:10.549160 kernel: devtmpfs: initialized Apr 12 20:33:10.549165 kernel: x86/mm: Memory block size: 128MB Apr 12 20:33:10.549170 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x61f6e000-0x61f6efff] (4096 bytes) Apr 12 20:33:10.549175 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Apr 12 20:33:10.549180 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 20:33:10.549185 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 20:33:10.549189 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 20:33:10.549194 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 20:33:10.549199 kernel: audit: initializing netlink subsys (disabled) Apr 12 20:33:10.549205 kernel: audit: type=2000 audit(1712953985.113:1): state=initialized audit_enabled=0 res=1 Apr 12 20:33:10.549210 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 20:33:10.549215 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 20:33:10.549220 kernel: cpuidle: using governor menu Apr 12 20:33:10.549224 kernel: ACPI: bus type PCI registered Apr 12 20:33:10.549229 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 20:33:10.549234 kernel: dca service started, version 1.12.1 Apr 12 20:33:10.549239 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 20:33:10.549244 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 20:33:10.549250 kernel: PCI: Using configuration type 1 for base access Apr 12 20:33:10.549255 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 20:33:10.549259 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 20:33:10.549264 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 20:33:10.549269 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 20:33:10.549274 kernel: ACPI: Added _OSI(Module Device) Apr 12 20:33:10.549279 kernel: ACPI: Added _OSI(Processor Device) Apr 12 20:33:10.549284 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 20:33:10.549289 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 20:33:10.549294 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 20:33:10.549299 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 20:33:10.549304 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 20:33:10.549309 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 20:33:10.549314 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:33:10.549321 kernel: ACPI: SSDT 0xFFFF8EB300223800 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 20:33:10.549341 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 20:33:10.549346 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:33:10.549351 kernel: ACPI: SSDT 0xFFFF8EB301CF4800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 20:33:10.549357 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:33:10.549378 kernel: ACPI: SSDT 0xFFFF8EB301C59800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 20:33:10.549383 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:33:10.549388 kernel: ACPI: SSDT 0xFFFF8EB301D51000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 20:33:10.549393 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:33:10.549398 kernel: ACPI: SSDT 0xFFFF8EB300151000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 20:33:10.549403 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:33:10.549407 kernel: ACPI: SSDT 0xFFFF8EB301CF3C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 20:33:10.549412 kernel: ACPI: Interpreter enabled Apr 12 20:33:10.549417 kernel: ACPI: PM: (supports S0 S5) Apr 12 20:33:10.549423 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 20:33:10.549428 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 20:33:10.549433 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 20:33:10.549438 kernel: HEST: Table parsing has been initialized. Apr 12 20:33:10.549443 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 20:33:10.549447 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 20:33:10.549452 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 20:33:10.549457 kernel: ACPI: PM: Power Resource [USBC] Apr 12 20:33:10.549462 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 20:33:10.549468 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 20:33:10.549473 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 20:33:10.549478 kernel: ACPI: PM: Power Resource [WRST] Apr 12 20:33:10.549483 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Apr 12 20:33:10.549488 kernel: ACPI: PM: Power Resource [FN00] Apr 12 20:33:10.549493 kernel: ACPI: PM: Power Resource [FN01] Apr 12 20:33:10.549497 kernel: ACPI: PM: Power Resource [FN02] Apr 12 20:33:10.549502 kernel: ACPI: PM: Power Resource [FN03] Apr 12 20:33:10.549507 kernel: ACPI: PM: Power Resource [FN04] Apr 12 20:33:10.549513 kernel: ACPI: PM: Power Resource [PIN] Apr 12 20:33:10.549518 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 20:33:10.549581 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:33:10.549627 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 20:33:10.549669 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 20:33:10.549676 kernel: PCI host bridge to bus 0000:00 Apr 12 20:33:10.549719 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 20:33:10.549760 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 20:33:10.549798 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 20:33:10.549835 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Apr 12 20:33:10.549872 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 20:33:10.549910 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 20:33:10.549961 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 20:33:10.550014 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 20:33:10.550060 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.550107 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Apr 12 20:33:10.550150 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.550196 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Apr 12 20:33:10.550241 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Apr 12 20:33:10.550283 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Apr 12 20:33:10.550346 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Apr 12 20:33:10.550396 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 20:33:10.550439 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Apr 12 20:33:10.550486 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 20:33:10.550530 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Apr 12 20:33:10.550578 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 20:33:10.550622 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Apr 12 20:33:10.550665 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 20:33:10.550714 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 20:33:10.550757 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Apr 12 20:33:10.550800 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Apr 12 20:33:10.550846 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 20:33:10.550891 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:33:10.550936 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 20:33:10.550979 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:33:10.551026 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 20:33:10.551076 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Apr 12 20:33:10.551121 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 20:33:10.551167 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 20:33:10.551213 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Apr 12 20:33:10.551255 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 20:33:10.551302 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 20:33:10.551348 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Apr 12 20:33:10.551391 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 20:33:10.551437 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 20:33:10.551482 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Apr 12 20:33:10.551524 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Apr 12 20:33:10.551567 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Apr 12 20:33:10.551609 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Apr 12 20:33:10.551652 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Apr 12 20:33:10.551695 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Apr 12 20:33:10.551739 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 20:33:10.551790 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 20:33:10.551834 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.551881 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 20:33:10.551925 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.551974 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 20:33:10.552018 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.552065 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 20:33:10.552108 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.552157 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Apr 12 20:33:10.552200 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.552250 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 20:33:10.552292 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:33:10.552344 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 20:33:10.552391 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 20:33:10.552436 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Apr 12 20:33:10.552478 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 20:33:10.552526 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 20:33:10.552570 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 20:33:10.552613 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:33:10.552663 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 20:33:10.552709 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 20:33:10.552754 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Apr 12 20:33:10.552798 kernel: pci 0000:02:00.0: PME# supported from D3cold Apr 12 20:33:10.552844 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:33:10.552889 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:33:10.552938 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 20:33:10.552984 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 20:33:10.553029 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Apr 12 20:33:10.553074 kernel: pci 0000:02:00.1: PME# supported from D3cold Apr 12 20:33:10.553118 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:33:10.553164 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:33:10.553207 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 20:33:10.553252 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Apr 12 20:33:10.553295 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:33:10.553341 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 20:33:10.553390 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 20:33:10.553436 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:33:10.553480 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Apr 12 20:33:10.553527 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 20:33:10.553588 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Apr 12 20:33:10.553631 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.553674 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 20:33:10.553716 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:33:10.553760 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Apr 12 20:33:10.553808 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect Apr 12 20:33:10.553855 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:33:10.553899 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Apr 12 20:33:10.553942 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 20:33:10.553985 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Apr 12 20:33:10.554032 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:33:10.554129 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 20:33:10.554171 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:33:10.554214 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Apr 12 20:33:10.554258 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 20:33:10.554307 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 20:33:10.554390 kernel: pci 0000:07:00.0: enabling Extended Tags Apr 12 20:33:10.554436 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 20:33:10.554480 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:33:10.554524 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 20:33:10.554566 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 20:33:10.554611 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:33:10.554657 kernel: pci_bus 0000:08: extended config space not accessible Apr 12 20:33:10.554708 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 20:33:10.554755 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Apr 12 20:33:10.554802 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Apr 12 20:33:10.554848 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 20:33:10.554895 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 20:33:10.554942 kernel: pci 0000:08:00.0: supports D1 D2 Apr 12 20:33:10.554989 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:33:10.555034 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 20:33:10.555077 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:33:10.555122 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:33:10.555130 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 20:33:10.555136 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 20:33:10.555141 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 20:33:10.555147 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 20:33:10.555153 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 20:33:10.555158 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 20:33:10.555163 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 20:33:10.555168 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 20:33:10.555174 kernel: iommu: Default domain type: Translated Apr 12 20:33:10.555179 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 20:33:10.555224 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Apr 12 20:33:10.555271 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 20:33:10.555321 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Apr 12 20:33:10.555351 kernel: vgaarb: loaded Apr 12 20:33:10.555357 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 20:33:10.555363 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 20:33:10.555388 kernel: PTP clock support registered Apr 12 20:33:10.555393 kernel: PCI: Using ACPI for IRQ routing Apr 12 20:33:10.555398 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 20:33:10.555403 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 20:33:10.555409 kernel: e820: reserve RAM buffer [mem 0x61f6e000-0x63ffffff] Apr 12 20:33:10.555415 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Apr 12 20:33:10.555420 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Apr 12 20:33:10.555425 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Apr 12 20:33:10.555430 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Apr 12 20:33:10.555436 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Apr 12 20:33:10.555441 kernel: clocksource: Switched to clocksource tsc-early Apr 12 20:33:10.555447 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 20:33:10.555452 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 20:33:10.555457 kernel: pnp: PnP ACPI init Apr 12 20:33:10.555505 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 20:33:10.555549 kernel: pnp 00:02: [dma 0 disabled] Apr 12 20:33:10.555593 kernel: pnp 00:03: [dma 0 disabled] Apr 12 20:33:10.555635 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 20:33:10.555675 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 20:33:10.555716 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 20:33:10.555760 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 20:33:10.555799 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 20:33:10.555838 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 20:33:10.555876 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 20:33:10.555914 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 20:33:10.555953 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 20:33:10.555991 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 20:33:10.556032 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 20:33:10.556073 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 20:33:10.556112 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 20:33:10.556151 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 20:33:10.556188 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 20:33:10.556227 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 20:33:10.556265 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 20:33:10.556305 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 20:33:10.556391 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 20:33:10.556399 kernel: pnp: PnP ACPI: found 10 devices Apr 12 20:33:10.556405 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 20:33:10.556410 kernel: NET: Registered PF_INET protocol family Apr 12 20:33:10.556415 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:33:10.556421 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 20:33:10.556427 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 20:33:10.556432 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:33:10.556438 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 20:33:10.556444 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 20:33:10.556449 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:33:10.556454 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:33:10.556460 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 20:33:10.556465 kernel: NET: Registered PF_XDP protocol family Apr 12 20:33:10.556508 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Apr 12 20:33:10.556554 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Apr 12 20:33:10.556595 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Apr 12 20:33:10.556640 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:33:10.556685 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:33:10.556732 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:33:10.556777 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:33:10.556822 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:33:10.556865 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 20:33:10.556909 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Apr 12 20:33:10.556952 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:33:10.556995 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 20:33:10.557039 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 20:33:10.557083 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:33:10.557128 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Apr 12 20:33:10.557172 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 20:33:10.557216 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:33:10.557259 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Apr 12 20:33:10.557302 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 20:33:10.557372 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 20:33:10.557417 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:33:10.557462 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:33:10.557505 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 20:33:10.557552 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 20:33:10.557596 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:33:10.557636 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 20:33:10.557675 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 20:33:10.557713 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 20:33:10.557752 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 20:33:10.557789 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Apr 12 20:33:10.557827 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 20:33:10.557876 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Apr 12 20:33:10.557918 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:33:10.557962 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Apr 12 20:33:10.558002 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Apr 12 20:33:10.558046 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Apr 12 20:33:10.558086 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Apr 12 20:33:10.558131 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 20:33:10.558171 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Apr 12 20:33:10.558213 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Apr 12 20:33:10.558255 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Apr 12 20:33:10.558262 kernel: PCI: CLS 64 bytes, default 64 Apr 12 20:33:10.558268 kernel: DMAR: No ATSR found Apr 12 20:33:10.558274 kernel: DMAR: No SATC found Apr 12 20:33:10.558280 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Apr 12 20:33:10.558286 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Apr 12 20:33:10.558291 kernel: DMAR: IOMMU feature nwfs inconsistent Apr 12 20:33:10.558296 kernel: DMAR: IOMMU feature pasid inconsistent Apr 12 20:33:10.558302 kernel: DMAR: IOMMU feature eafs inconsistent Apr 12 20:33:10.558307 kernel: DMAR: IOMMU feature prs inconsistent Apr 12 20:33:10.558313 kernel: DMAR: IOMMU feature nest inconsistent Apr 12 20:33:10.558320 kernel: DMAR: IOMMU feature mts inconsistent Apr 12 20:33:10.558325 kernel: DMAR: IOMMU feature sc_support inconsistent Apr 12 20:33:10.558331 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Apr 12 20:33:10.558337 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 20:33:10.558343 kernel: DMAR: dmar1: Using Queued invalidation Apr 12 20:33:10.558388 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 20:33:10.558432 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 20:33:10.558475 kernel: pci 0000:00:01.1: Adding to iommu group 1 Apr 12 20:33:10.558519 kernel: pci 0000:00:02.0: Adding to iommu group 2 Apr 12 20:33:10.558580 kernel: pci 0000:00:08.0: Adding to iommu group 3 Apr 12 20:33:10.558623 kernel: pci 0000:00:12.0: Adding to iommu group 4 Apr 12 20:33:10.558667 kernel: pci 0000:00:14.0: Adding to iommu group 5 Apr 12 20:33:10.558710 kernel: pci 0000:00:14.2: Adding to iommu group 5 Apr 12 20:33:10.558752 kernel: pci 0000:00:15.0: Adding to iommu group 6 Apr 12 20:33:10.558794 kernel: pci 0000:00:15.1: Adding to iommu group 6 Apr 12 20:33:10.558836 kernel: pci 0000:00:16.0: Adding to iommu group 7 Apr 12 20:33:10.558878 kernel: pci 0000:00:16.1: Adding to iommu group 7 Apr 12 20:33:10.558921 kernel: pci 0000:00:16.4: Adding to iommu group 7 Apr 12 20:33:10.558963 kernel: pci 0000:00:17.0: Adding to iommu group 8 Apr 12 20:33:10.559008 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Apr 12 20:33:10.559051 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Apr 12 20:33:10.559094 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Apr 12 20:33:10.559137 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Apr 12 20:33:10.559179 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Apr 12 20:33:10.559221 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Apr 12 20:33:10.559263 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Apr 12 20:33:10.559307 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Apr 12 20:33:10.559395 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Apr 12 20:33:10.559439 kernel: pci 0000:02:00.0: Adding to iommu group 1 Apr 12 20:33:10.559483 kernel: pci 0000:02:00.1: Adding to iommu group 1 Apr 12 20:33:10.559529 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 20:33:10.559573 kernel: pci 0000:05:00.0: Adding to iommu group 17 Apr 12 20:33:10.559617 kernel: pci 0000:07:00.0: Adding to iommu group 18 Apr 12 20:33:10.559663 kernel: pci 0000:08:00.0: Adding to iommu group 18 Apr 12 20:33:10.559671 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 20:33:10.559677 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 20:33:10.559683 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Apr 12 20:33:10.559689 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Apr 12 20:33:10.559694 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 20:33:10.559699 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 20:33:10.559705 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 20:33:10.559710 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Apr 12 20:33:10.559757 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 20:33:10.559765 kernel: Initialise system trusted keyrings Apr 12 20:33:10.559771 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 20:33:10.559777 kernel: Key type asymmetric registered Apr 12 20:33:10.559782 kernel: Asymmetric key parser 'x509' registered Apr 12 20:33:10.559787 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 20:33:10.559792 kernel: io scheduler mq-deadline registered Apr 12 20:33:10.559798 kernel: io scheduler kyber registered Apr 12 20:33:10.559803 kernel: io scheduler bfq registered Apr 12 20:33:10.559846 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Apr 12 20:33:10.559892 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Apr 12 20:33:10.559936 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Apr 12 20:33:10.559979 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Apr 12 20:33:10.560023 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Apr 12 20:33:10.560066 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Apr 12 20:33:10.560109 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Apr 12 20:33:10.560157 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 20:33:10.560166 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 20:33:10.560171 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 20:33:10.560177 kernel: pstore: Registered erst as persistent store backend Apr 12 20:33:10.560182 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 20:33:10.560187 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 20:33:10.560193 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 20:33:10.560198 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 20:33:10.560241 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 20:33:10.560249 kernel: i8042: PNP: No PS/2 controller found. Apr 12 20:33:10.560289 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 20:33:10.560353 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 20:33:10.560407 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T20:33:09 UTC (1712953989) Apr 12 20:33:10.560446 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 20:33:10.560454 kernel: fail to initialize ptp_kvm Apr 12 20:33:10.560459 kernel: intel_pstate: Intel P-state driver initializing Apr 12 20:33:10.560464 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 20:33:10.560470 kernel: intel_pstate: HWP enabled Apr 12 20:33:10.560476 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 20:33:10.560481 kernel: vesafb: scrolling: redraw Apr 12 20:33:10.560487 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 20:33:10.560492 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x0000000082026e15, using 768k, total 768k Apr 12 20:33:10.560498 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 20:33:10.560503 kernel: fb0: VESA VGA frame buffer device Apr 12 20:33:10.560508 kernel: NET: Registered PF_INET6 protocol family Apr 12 20:33:10.560514 kernel: Segment Routing with IPv6 Apr 12 20:33:10.560519 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 20:33:10.560525 kernel: NET: Registered PF_PACKET protocol family Apr 12 20:33:10.560530 kernel: Key type dns_resolver registered Apr 12 20:33:10.560535 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 20:33:10.560540 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 20:33:10.560546 kernel: IPI shorthand broadcast: enabled Apr 12 20:33:10.560551 kernel: sched_clock: Marking stable (1848747037, 1353817805)->(4647727955, -1445163113) Apr 12 20:33:10.560557 kernel: registered taskstats version 1 Apr 12 20:33:10.560562 kernel: Loading compiled-in X.509 certificates Apr 12 20:33:10.560567 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 20:33:10.560573 kernel: Key type .fscrypt registered Apr 12 20:33:10.560578 kernel: Key type fscrypt-provisioning registered Apr 12 20:33:10.560583 kernel: pstore: Using crash dump compression: deflate Apr 12 20:33:10.560589 kernel: ima: Allocated hash algorithm: sha1 Apr 12 20:33:10.560594 kernel: ima: No architecture policies found Apr 12 20:33:10.560599 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 20:33:10.560604 kernel: Write protecting the kernel read-only data: 28672k Apr 12 20:33:10.560610 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 20:33:10.560615 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 20:33:10.560621 kernel: Run /init as init process Apr 12 20:33:10.560626 kernel: with arguments: Apr 12 20:33:10.560632 kernel: /init Apr 12 20:33:10.560637 kernel: with environment: Apr 12 20:33:10.560642 kernel: HOME=/ Apr 12 20:33:10.560647 kernel: TERM=linux Apr 12 20:33:10.560652 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 20:33:10.560659 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:33:10.560666 systemd[1]: Detected architecture x86-64. Apr 12 20:33:10.560672 systemd[1]: Running in initrd. Apr 12 20:33:10.560677 systemd[1]: No hostname configured, using default hostname. Apr 12 20:33:10.560682 systemd[1]: Hostname set to . Apr 12 20:33:10.560687 systemd[1]: Initializing machine ID from random generator. Apr 12 20:33:10.560693 systemd[1]: Queued start job for default target initrd.target. Apr 12 20:33:10.560699 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:33:10.560704 systemd[1]: Reached target cryptsetup.target. Apr 12 20:33:10.560710 systemd[1]: Reached target paths.target. Apr 12 20:33:10.560715 systemd[1]: Reached target slices.target. Apr 12 20:33:10.560720 systemd[1]: Reached target swap.target. Apr 12 20:33:10.560726 systemd[1]: Reached target timers.target. Apr 12 20:33:10.560731 systemd[1]: Listening on iscsid.socket. Apr 12 20:33:10.560737 systemd[1]: Listening on iscsiuio.socket. Apr 12 20:33:10.560742 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 20:33:10.560748 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 20:33:10.560754 systemd[1]: Listening on systemd-journald.socket. Apr 12 20:33:10.560759 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:33:10.560765 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Apr 12 20:33:10.560770 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:33:10.560776 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Apr 12 20:33:10.560781 kernel: clocksource: Switched to clocksource tsc Apr 12 20:33:10.560786 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:33:10.560792 systemd[1]: Reached target sockets.target. Apr 12 20:33:10.560798 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:33:10.560804 systemd[1]: Finished network-cleanup.service. Apr 12 20:33:10.560809 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 20:33:10.560815 systemd[1]: Starting systemd-journald.service... Apr 12 20:33:10.560820 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:33:10.560828 systemd-journald[268]: Journal started Apr 12 20:33:10.560853 systemd-journald[268]: Runtime Journal (/run/log/journal/33f96121379c48b791be4b89de27344b) is 8.0M, max 636.8M, 628.8M free. Apr 12 20:33:10.562855 systemd-modules-load[269]: Inserted module 'overlay' Apr 12 20:33:10.569000 audit: BPF prog-id=6 op=LOAD Apr 12 20:33:10.587323 kernel: audit: type=1334 audit(1712953990.569:2): prog-id=6 op=LOAD Apr 12 20:33:10.587354 systemd[1]: Starting systemd-resolved.service... Apr 12 20:33:10.638354 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 20:33:10.638371 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 20:33:10.671356 kernel: Bridge firewalling registered Apr 12 20:33:10.671372 systemd[1]: Started systemd-journald.service. Apr 12 20:33:10.685896 systemd-modules-load[269]: Inserted module 'br_netfilter' Apr 12 20:33:10.735020 kernel: audit: type=1130 audit(1712953990.693:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.688422 systemd-resolved[271]: Positive Trust Anchors: Apr 12 20:33:10.791790 kernel: SCSI subsystem initialized Apr 12 20:33:10.791801 kernel: audit: type=1130 audit(1712953990.749:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.688427 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:33:10.914430 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 20:33:10.914442 kernel: audit: type=1130 audit(1712953990.817:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.914450 kernel: device-mapper: uevent: version 1.0.3 Apr 12 20:33:10.914457 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 20:33:10.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.688447 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:33:10.986548 kernel: audit: type=1130 audit(1712953990.922:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.689974 systemd-resolved[271]: Defaulting to hostname 'linux'. Apr 12 20:33:10.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.693540 systemd[1]: Started systemd-resolved.service. Apr 12 20:33:11.096796 kernel: audit: type=1130 audit(1712953990.995:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.096807 kernel: audit: type=1130 audit(1712953991.050:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:10.749452 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:33:10.817478 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 20:33:10.916469 systemd-modules-load[269]: Inserted module 'dm_multipath' Apr 12 20:33:10.922620 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:33:10.995808 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 20:33:11.050593 systemd[1]: Reached target nss-lookup.target. Apr 12 20:33:11.105911 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 20:33:11.125822 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:33:11.126118 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:33:11.129008 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:33:11.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.129786 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:33:11.179528 kernel: audit: type=1130 audit(1712953991.128:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.191663 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 20:33:11.257420 kernel: audit: type=1130 audit(1712953991.191:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.249891 systemd[1]: Starting dracut-cmdline.service... Apr 12 20:33:11.271415 dracut-cmdline[294]: dracut-dracut-053 Apr 12 20:33:11.271415 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 20:33:11.271415 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:33:11.340399 kernel: Loading iSCSI transport class v2.0-870. Apr 12 20:33:11.340413 kernel: iscsi: registered transport (tcp) Apr 12 20:33:11.398358 kernel: iscsi: registered transport (qla4xxx) Apr 12 20:33:11.398376 kernel: QLogic iSCSI HBA Driver Apr 12 20:33:11.414451 systemd[1]: Finished dracut-cmdline.service. Apr 12 20:33:11.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:11.423104 systemd[1]: Starting dracut-pre-udev.service... Apr 12 20:33:11.479389 kernel: raid6: avx2x4 gen() 45791 MB/s Apr 12 20:33:11.515389 kernel: raid6: avx2x4 xor() 21521 MB/s Apr 12 20:33:11.550393 kernel: raid6: avx2x2 gen() 52545 MB/s Apr 12 20:33:11.585393 kernel: raid6: avx2x2 xor() 32074 MB/s Apr 12 20:33:11.620358 kernel: raid6: avx2x1 gen() 45146 MB/s Apr 12 20:33:11.655396 kernel: raid6: avx2x1 xor() 27843 MB/s Apr 12 20:33:11.690361 kernel: raid6: sse2x4 gen() 21294 MB/s Apr 12 20:33:11.724390 kernel: raid6: sse2x4 xor() 11953 MB/s Apr 12 20:33:11.758388 kernel: raid6: sse2x2 gen() 21613 MB/s Apr 12 20:33:11.792362 kernel: raid6: sse2x2 xor() 13357 MB/s Apr 12 20:33:11.826389 kernel: raid6: sse2x1 gen() 18253 MB/s Apr 12 20:33:11.878088 kernel: raid6: sse2x1 xor() 8904 MB/s Apr 12 20:33:11.878104 kernel: raid6: using algorithm avx2x2 gen() 52545 MB/s Apr 12 20:33:11.878112 kernel: raid6: .... xor() 32074 MB/s, rmw enabled Apr 12 20:33:11.896273 kernel: raid6: using avx2x2 recovery algorithm Apr 12 20:33:11.942376 kernel: xor: automatically using best checksumming function avx Apr 12 20:33:12.020353 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 20:33:12.025543 systemd[1]: Finished dracut-pre-udev.service. Apr 12 20:33:12.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:12.034000 audit: BPF prog-id=7 op=LOAD Apr 12 20:33:12.034000 audit: BPF prog-id=8 op=LOAD Apr 12 20:33:12.035404 systemd[1]: Starting systemd-udevd.service... Apr 12 20:33:12.043410 systemd-udevd[477]: Using default interface naming scheme 'v252'. Apr 12 20:33:12.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:12.048615 systemd[1]: Started systemd-udevd.service. Apr 12 20:33:12.089446 dracut-pre-trigger[489]: rd.md=0: removing MD RAID activation Apr 12 20:33:12.065053 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 20:33:12.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:12.093997 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 20:33:12.108518 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:33:12.161889 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:33:12.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:12.188355 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 20:33:12.228516 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 20:33:12.228561 kernel: AES CTR mode by8 optimization enabled Apr 12 20:33:12.229331 kernel: ACPI: bus type USB registered Apr 12 20:33:12.229363 kernel: libata version 3.00 loaded. Apr 12 20:33:12.280813 kernel: usbcore: registered new interface driver usbfs Apr 12 20:33:12.280843 kernel: usbcore: registered new interface driver hub Apr 12 20:33:12.280861 kernel: usbcore: registered new device driver usb Apr 12 20:33:12.298326 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 20:33:12.332101 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 20:33:12.336329 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 20:33:12.336422 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:33:12.337323 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Apr 12 20:33:12.337385 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Apr 12 20:33:12.337436 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 20:33:12.358323 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 20:33:12.358397 kernel: scsi host0: ahci Apr 12 20:33:12.358464 kernel: scsi host1: ahci Apr 12 20:33:12.358524 kernel: scsi host2: ahci Apr 12 20:33:12.358578 kernel: scsi host3: ahci Apr 12 20:33:12.358630 kernel: scsi host4: ahci Apr 12 20:33:12.358698 kernel: scsi host5: ahci Apr 12 20:33:12.358753 kernel: scsi host6: ahci Apr 12 20:33:12.358806 kernel: scsi host7: ahci Apr 12 20:33:12.358859 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 134 Apr 12 20:33:12.358867 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 134 Apr 12 20:33:12.358874 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 134 Apr 12 20:33:12.358881 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 134 Apr 12 20:33:12.358888 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 134 Apr 12 20:33:12.358895 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 134 Apr 12 20:33:12.358901 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 134 Apr 12 20:33:12.358909 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 134 Apr 12 20:33:12.373368 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:33:12.373441 kernel: pps pps0: new PPS source ptp0 Apr 12 20:33:12.373500 kernel: igb 0000:04:00.0: added PHC on eth0 Apr 12 20:33:12.373558 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:33:12.373611 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:08:1a Apr 12 20:33:12.373662 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Apr 12 20:33:12.373715 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:33:12.408390 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 20:33:12.426375 kernel: pps pps1: new PPS source ptp1 Apr 12 20:33:12.426447 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:33:12.451686 kernel: igb 0000:05:00.0: added PHC on eth1 Apr 12 20:33:12.451760 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 20:33:12.475889 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:33:12.475963 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 20:33:12.476037 kernel: hub 1-0:1.0: USB hub found Apr 12 20:33:12.487320 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:08:1b Apr 12 20:33:12.498384 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Apr 12 20:33:12.498456 kernel: hub 1-0:1.0: 16 ports detected Apr 12 20:33:12.509393 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:33:12.668337 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:33:12.668385 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:33:12.683323 kernel: hub 2-0:1.0: USB hub found Apr 12 20:33:12.683413 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:33:12.685328 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:33:12.710360 kernel: hub 2-0:1.0: 10 ports detected Apr 12 20:33:12.710448 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 20:33:12.926325 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 20:33:12.926352 kernel: ata8: SATA link down (SStatus 0 SControl 300) Apr 12 20:33:12.995385 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 20:33:13.011374 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 20:33:13.025323 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 20:33:13.038386 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 20:33:13.052386 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 20:33:13.065357 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:33:13.071351 kernel: hub 1-14:1.0: USB hub found Apr 12 20:33:13.071441 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:33:13.083323 kernel: ata1.00: Features: NCQ-prio Apr 12 20:33:13.083336 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Apr 12 20:33:13.083443 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:33:13.110281 kernel: hub 1-14:1.0: 4 ports detected Apr 12 20:33:13.110393 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 20:33:13.221193 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:33:13.221210 kernel: ata2.00: Features: NCQ-prio Apr 12 20:33:13.221218 kernel: ata1.00: configured for UDMA/133 Apr 12 20:33:13.236358 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 20:33:13.254378 kernel: ata2.00: configured for UDMA/133 Apr 12 20:33:13.269351 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 20:33:13.306324 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Apr 12 20:33:13.328866 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:13.328883 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:33:13.357357 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:33:13.357469 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:33:13.357563 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Apr 12 20:33:13.366330 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 20:33:13.366424 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:33:13.371348 kernel: port_module: 9 callbacks suppressed Apr 12 20:33:13.371365 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Apr 12 20:33:13.383773 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 20:33:13.399207 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 20:33:13.414397 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 20:33:13.415402 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 20:33:13.449583 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 20:33:13.449664 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 20:33:13.467384 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:33:13.483207 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:33:13.584833 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:13.599965 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:33:13.616373 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 20:33:13.616389 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:33:13.630105 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 20:33:13.645385 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 20:33:13.645402 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:33:13.680027 kernel: GPT:9289727 != 937703087 Apr 12 20:33:13.709131 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 20:33:13.709147 kernel: GPT:9289727 != 937703087 Apr 12 20:33:13.722394 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 20:33:13.737207 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:33:13.752384 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:13.781324 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 20:33:13.807513 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 20:33:13.867232 kernel: usbcore: registered new interface driver usbhid Apr 12 20:33:13.867272 kernel: usbhid: USB HID core driver Apr 12 20:33:13.867289 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (553) Apr 12 20:33:13.867303 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 20:33:13.837147 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 20:33:13.913374 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:33:13.913450 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Apr 12 20:33:13.886448 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 20:33:14.054378 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 20:33:14.054529 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 20:33:14.054538 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 20:33:14.054603 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Apr 12 20:33:14.047060 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 20:33:14.069605 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:33:14.092094 systemd[1]: Starting disk-uuid.service... Apr 12 20:33:14.124433 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:14.124448 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:33:14.124510 disk-uuid[695]: Primary Header is updated. Apr 12 20:33:14.124510 disk-uuid[695]: Secondary Entries is updated. Apr 12 20:33:14.124510 disk-uuid[695]: Secondary Header is updated. Apr 12 20:33:14.182401 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:14.182411 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:33:14.182419 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:14.209359 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:33:15.189170 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:33:15.208976 disk-uuid[696]: The operation has completed successfully. Apr 12 20:33:15.217550 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:33:15.245905 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 20:33:15.342580 kernel: audit: type=1130 audit(1712953995.252:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.342611 kernel: audit: type=1131 audit(1712953995.252:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.245947 systemd[1]: Finished disk-uuid.service. Apr 12 20:33:15.372355 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 20:33:15.258058 systemd[1]: Starting verity-setup.service... Apr 12 20:33:15.406022 systemd[1]: Found device dev-mapper-usr.device. Apr 12 20:33:15.415345 systemd[1]: Mounting sysusr-usr.mount... Apr 12 20:33:15.422601 systemd[1]: Finished verity-setup.service. Apr 12 20:33:15.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.491327 kernel: audit: type=1130 audit(1712953995.445:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.519324 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 20:33:15.519363 systemd[1]: Mounted sysusr-usr.mount. Apr 12 20:33:15.527610 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 20:33:15.528015 systemd[1]: Starting ignition-setup.service... Apr 12 20:33:15.616484 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:33:15.616499 kernel: BTRFS info (device sda6): using free space tree Apr 12 20:33:15.616507 kernel: BTRFS info (device sda6): has skinny extents Apr 12 20:33:15.616515 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 20:33:15.565524 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 20:33:15.624795 systemd[1]: Finished ignition-setup.service. Apr 12 20:33:15.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.641680 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 20:33:15.747049 kernel: audit: type=1130 audit(1712953995.641:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.747067 kernel: audit: type=1130 audit(1712953995.697:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.697992 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 20:33:15.779313 kernel: audit: type=1334 audit(1712953995.756:24): prog-id=9 op=LOAD Apr 12 20:33:15.756000 audit: BPF prog-id=9 op=LOAD Apr 12 20:33:15.757197 systemd[1]: Starting systemd-networkd.service... Apr 12 20:33:15.793622 systemd-networkd[882]: lo: Link UP Apr 12 20:33:15.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.819844 ignition[871]: Ignition 2.14.0 Apr 12 20:33:15.869569 kernel: audit: type=1130 audit(1712953995.804:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.793624 systemd-networkd[882]: lo: Gained carrier Apr 12 20:33:15.819849 ignition[871]: Stage: fetch-offline Apr 12 20:33:15.793914 systemd-networkd[882]: Enumeration completed Apr 12 20:33:15.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.819874 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:33:16.027570 kernel: audit: type=1130 audit(1712953995.894:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:16.027584 kernel: audit: type=1130 audit(1712953995.953:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:16.027592 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 20:33:15.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.793987 systemd[1]: Started systemd-networkd.service. Apr 12 20:33:16.059606 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Apr 12 20:33:15.819887 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:33:15.794574 systemd-networkd[882]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:33:15.822681 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:33:15.804497 systemd[1]: Reached target network.target. Apr 12 20:33:16.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.822747 ignition[871]: parsed url from cmdline: "" Apr 12 20:33:16.102577 iscsid[902]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:33:16.102577 iscsid[902]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 20:33:16.102577 iscsid[902]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 20:33:16.102577 iscsid[902]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 20:33:16.102577 iscsid[902]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 20:33:16.102577 iscsid[902]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:33:16.102577 iscsid[902]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 20:33:16.262512 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 20:33:16.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.832417 unknown[871]: fetched base config from "system" Apr 12 20:33:16.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:15.822748 ignition[871]: no config URL provided Apr 12 20:33:15.832421 unknown[871]: fetched user config from "system" Apr 12 20:33:15.822751 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 20:33:15.864080 systemd[1]: Starting iscsiuio.service... Apr 12 20:33:15.822763 ignition[871]: parsing config with SHA512: af62cb5be496072c6c1b760c00d41ef31f146536287344f469fda7a6c051edc81079d150d521dee60897f3dd67db0db40f3ac054986b15b04eff634eb439e915 Apr 12 20:33:15.876682 systemd[1]: Started iscsiuio.service. Apr 12 20:33:15.832571 ignition[871]: fetch-offline: fetch-offline passed Apr 12 20:33:15.914178 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 20:33:15.832574 ignition[871]: POST message to Packet Timeline Apr 12 20:33:15.953586 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 20:33:15.832578 ignition[871]: POST Status error: resource requires networking Apr 12 20:33:15.954024 systemd[1]: Starting ignition-kargs.service... Apr 12 20:33:15.832607 ignition[871]: Ignition finished successfully Apr 12 20:33:16.029033 systemd-networkd[882]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:33:16.031796 ignition[891]: Ignition 2.14.0 Apr 12 20:33:16.041923 systemd[1]: Starting iscsid.service... Apr 12 20:33:16.031799 ignition[891]: Stage: kargs Apr 12 20:33:16.066641 systemd[1]: Started iscsid.service. Apr 12 20:33:16.031855 ignition[891]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:33:16.095810 systemd[1]: Starting dracut-initqueue.service... Apr 12 20:33:16.031864 ignition[891]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:33:16.110496 systemd[1]: Finished dracut-initqueue.service. Apr 12 20:33:16.033185 ignition[891]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:33:16.129582 systemd[1]: Reached target remote-fs-pre.target. Apr 12 20:33:16.034755 ignition[891]: kargs: kargs passed Apr 12 20:33:16.165502 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:33:16.034758 ignition[891]: POST message to Packet Timeline Apr 12 20:33:16.197911 systemd[1]: Reached target remote-fs.target. Apr 12 20:33:16.034769 ignition[891]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:33:16.214097 systemd[1]: Starting dracut-pre-mount.service... Apr 12 20:33:16.055173 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51163->[::1]:53: read: connection refused Apr 12 20:33:16.244855 systemd-networkd[882]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:33:16.255515 ignition[891]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 20:33:16.250586 systemd[1]: Finished dracut-pre-mount.service. Apr 12 20:33:16.255944 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46271->[::1]:53: read: connection refused Apr 12 20:33:16.273614 systemd-networkd[882]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:33:16.301807 systemd-networkd[882]: enp2s0f1np1: Link UP Apr 12 20:33:16.301975 systemd-networkd[882]: enp2s0f1np1: Gained carrier Apr 12 20:33:16.311640 systemd-networkd[882]: enp2s0f0np0: Link UP Apr 12 20:33:16.311839 systemd-networkd[882]: eno2: Link UP Apr 12 20:33:16.312022 systemd-networkd[882]: eno1: Link UP Apr 12 20:33:16.656133 ignition[891]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 20:33:16.657347 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46043->[::1]:53: read: connection refused Apr 12 20:33:17.081117 systemd-networkd[882]: enp2s0f0np0: Gained carrier Apr 12 20:33:17.089553 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Apr 12 20:33:17.116519 systemd-networkd[882]: enp2s0f0np0: DHCPv4 address 145.40.90.201/31, gateway 145.40.90.200 acquired from 145.40.83.140 Apr 12 20:33:17.313748 systemd-networkd[882]: enp2s0f1np1: Gained IPv6LL Apr 12 20:33:17.457692 ignition[891]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 20:33:17.459171 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:47506->[::1]:53: read: connection refused Apr 12 20:33:18.401807 systemd-networkd[882]: enp2s0f0np0: Gained IPv6LL Apr 12 20:33:19.060496 ignition[891]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 20:33:19.061702 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:35732->[::1]:53: read: connection refused Apr 12 20:33:22.264303 ignition[891]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 20:33:22.303783 ignition[891]: GET result: OK Apr 12 20:33:22.482409 ignition[891]: Ignition finished successfully Apr 12 20:33:22.484604 systemd[1]: Finished ignition-kargs.service. Apr 12 20:33:22.575900 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 20:33:22.575919 kernel: audit: type=1130 audit(1712954002.498:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:22.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:22.507491 ignition[918]: Ignition 2.14.0 Apr 12 20:33:22.500826 systemd[1]: Starting ignition-disks.service... Apr 12 20:33:22.507495 ignition[918]: Stage: disks Apr 12 20:33:22.507553 ignition[918]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:33:22.507562 ignition[918]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:33:22.509450 ignition[918]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:33:22.509853 ignition[918]: disks: disks passed Apr 12 20:33:22.509856 ignition[918]: POST message to Packet Timeline Apr 12 20:33:22.509867 ignition[918]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:33:22.532946 ignition[918]: GET result: OK Apr 12 20:33:22.706067 ignition[918]: Ignition finished successfully Apr 12 20:33:22.709054 systemd[1]: Finished ignition-disks.service. Apr 12 20:33:22.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:22.721932 systemd[1]: Reached target initrd-root-device.target. Apr 12 20:33:22.808496 kernel: audit: type=1130 audit(1712954002.721:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:22.794501 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:33:22.794614 systemd[1]: Reached target local-fs.target. Apr 12 20:33:22.808625 systemd[1]: Reached target sysinit.target. Apr 12 20:33:22.831493 systemd[1]: Reached target basic.target. Apr 12 20:33:22.845462 systemd[1]: Starting systemd-fsck-root.service... Apr 12 20:33:22.878310 systemd-fsck[934]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 20:33:22.891050 systemd[1]: Finished systemd-fsck-root.service. Apr 12 20:33:22.982095 kernel: audit: type=1130 audit(1712954002.900:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:22.982110 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 20:33:22.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:22.906164 systemd[1]: Mounting sysroot.mount... Apr 12 20:33:22.990029 systemd[1]: Mounted sysroot.mount. Apr 12 20:33:23.003657 systemd[1]: Reached target initrd-root-fs.target. Apr 12 20:33:23.011374 systemd[1]: Mounting sysroot-usr.mount... Apr 12 20:33:23.036131 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 20:33:23.044894 systemd[1]: Starting flatcar-static-network.service... Apr 12 20:33:23.060437 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 20:33:23.060545 systemd[1]: Reached target ignition-diskful.target. Apr 12 20:33:23.078619 systemd[1]: Mounted sysroot-usr.mount. Apr 12 20:33:23.103486 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:33:23.242985 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (947) Apr 12 20:33:23.243002 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:33:23.243011 kernel: BTRFS info (device sda6): using free space tree Apr 12 20:33:23.243018 kernel: BTRFS info (device sda6): has skinny extents Apr 12 20:33:23.243030 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 20:33:23.115055 systemd[1]: Starting initrd-setup-root.service... Apr 12 20:33:23.304453 kernel: audit: type=1130 audit(1712954003.251:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.304491 coreos-metadata[942]: Apr 12 20:33:23.180 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:33:23.304491 coreos-metadata[942]: Apr 12 20:33:23.257 INFO Fetch successful Apr 12 20:33:23.488007 kernel: audit: type=1130 audit(1712954003.312:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.488021 kernel: audit: type=1130 audit(1712954003.375:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.488029 kernel: audit: type=1131 audit(1712954003.375:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.488093 coreos-metadata[941]: Apr 12 20:33:23.180 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:33:23.488093 coreos-metadata[941]: Apr 12 20:33:23.205 INFO Fetch successful Apr 12 20:33:23.488093 coreos-metadata[941]: Apr 12 20:33:23.224 INFO wrote hostname ci-3510.3.3-a-e92d44cd51 to /sysroot/etc/hostname Apr 12 20:33:23.536411 initrd-setup-root[952]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 20:33:23.200471 systemd[1]: Finished initrd-setup-root.service. Apr 12 20:33:23.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.589548 initrd-setup-root[960]: cut: /sysroot/etc/group: No such file or directory Apr 12 20:33:23.629543 kernel: audit: type=1130 audit(1712954003.562:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.273051 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 20:33:23.638583 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 20:33:23.312660 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 20:33:23.658556 initrd-setup-root[976]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 20:33:23.312699 systemd[1]: Finished flatcar-static-network.service. Apr 12 20:33:23.676555 ignition[1019]: INFO : Ignition 2.14.0 Apr 12 20:33:23.676555 ignition[1019]: INFO : Stage: mount Apr 12 20:33:23.676555 ignition[1019]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:33:23.676555 ignition[1019]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:33:23.676555 ignition[1019]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:33:23.676555 ignition[1019]: INFO : mount: mount passed Apr 12 20:33:23.676555 ignition[1019]: INFO : POST message to Packet Timeline Apr 12 20:33:23.676555 ignition[1019]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:33:23.676555 ignition[1019]: INFO : GET result: OK Apr 12 20:33:23.375619 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:33:23.774618 ignition[1019]: INFO : Ignition finished successfully Apr 12 20:33:23.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.496986 systemd[1]: Starting ignition-mount.service... Apr 12 20:33:23.863456 kernel: audit: type=1130 audit(1712954003.782:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.524956 systemd[1]: Starting sysroot-boot.service... Apr 12 20:33:23.545230 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 20:33:23.982395 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1034) Apr 12 20:33:23.982407 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:33:23.982414 kernel: BTRFS info (device sda6): using free space tree Apr 12 20:33:23.982421 kernel: BTRFS info (device sda6): has skinny extents Apr 12 20:33:23.982429 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 20:33:23.545268 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 20:33:23.545909 systemd[1]: Finished sysroot-boot.service. Apr 12 20:33:23.768356 systemd[1]: Finished ignition-mount.service. Apr 12 20:33:23.784638 systemd[1]: Starting ignition-files.service... Apr 12 20:33:24.029432 ignition[1053]: INFO : Ignition 2.14.0 Apr 12 20:33:24.029432 ignition[1053]: INFO : Stage: files Apr 12 20:33:24.029432 ignition[1053]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:33:24.029432 ignition[1053]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:33:24.029432 ignition[1053]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:33:24.029432 ignition[1053]: DEBUG : files: compiled without relabeling support, skipping Apr 12 20:33:24.029432 ignition[1053]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 20:33:24.029432 ignition[1053]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:33:24.029432 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 20:33:24.252627 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1060) Apr 12 20:33:23.858282 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:33:24.261649 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3165686469" Apr 12 20:33:24.261649 ignition[1053]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3165686469": device or resource busy Apr 12 20:33:24.261649 ignition[1053]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3165686469", trying btrfs: device or resource busy Apr 12 20:33:24.261649 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3165686469" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3165686469" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem3165686469" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem3165686469" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(a): [started] processing unit "etcd-member.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Apr 12 20:33:24.261649 ignition[1053]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:33:24.670639 kernel: audit: type=1130 audit(1712954004.287:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:23.993898 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:33:24.687604 ignition[1053]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:33:24.687604 ignition[1053]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 20:33:24.687604 ignition[1053]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 20:33:24.687604 ignition[1053]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Apr 12 20:33:24.687604 ignition[1053]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Apr 12 20:33:24.687604 ignition[1053]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:33:24.687604 ignition[1053]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:33:24.687604 ignition[1053]: INFO : files: files passed Apr 12 20:33:24.687604 ignition[1053]: INFO : POST message to Packet Timeline Apr 12 20:33:24.687604 ignition[1053]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:33:24.687604 ignition[1053]: INFO : GET result: OK Apr 12 20:33:24.687604 ignition[1053]: INFO : Ignition finished successfully Apr 12 20:33:24.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.028119 unknown[1053]: wrote ssh authorized keys file for user: core Apr 12 20:33:24.264134 systemd[1]: Finished ignition-files.service. Apr 12 20:33:24.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.956765 initrd-setup-root-after-ignition[1085]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 20:33:24.294235 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 20:33:24.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.354572 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 20:33:25.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.354893 systemd[1]: Starting ignition-quench.service... Apr 12 20:33:24.400704 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 20:33:24.417916 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 20:33:24.418022 systemd[1]: Finished ignition-quench.service. Apr 12 20:33:24.448898 systemd[1]: Reached target ignition-complete.target. Apr 12 20:33:24.473483 systemd[1]: Starting initrd-parse-etc.service... Apr 12 20:33:25.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.516118 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 20:33:25.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.516196 systemd[1]: Finished initrd-parse-etc.service. Apr 12 20:33:25.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.528627 systemd[1]: Reached target initrd-fs.target. Apr 12 20:33:25.170440 ignition[1100]: INFO : Ignition 2.14.0 Apr 12 20:33:25.170440 ignition[1100]: INFO : Stage: umount Apr 12 20:33:25.170440 ignition[1100]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:33:25.170440 ignition[1100]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:33:25.170440 ignition[1100]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:33:25.170440 ignition[1100]: INFO : umount: umount passed Apr 12 20:33:25.170440 ignition[1100]: INFO : POST message to Packet Timeline Apr 12 20:33:25.170440 ignition[1100]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:33:25.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.548765 systemd[1]: Reached target initrd.target. Apr 12 20:33:25.312595 ignition[1100]: INFO : GET result: OK Apr 12 20:33:24.567879 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 20:33:24.570119 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 20:33:25.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.580920 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 20:33:25.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.377576 ignition[1100]: INFO : Ignition finished successfully Apr 12 20:33:25.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.612297 systemd[1]: Starting initrd-cleanup.service... Apr 12 20:33:25.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.399000 audit: BPF prog-id=6 op=UNLOAD Apr 12 20:33:24.642704 systemd[1]: Stopped target nss-lookup.target. Apr 12 20:33:24.657015 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 20:33:25.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.680081 systemd[1]: Stopped target timers.target. Apr 12 20:33:25.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.695020 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 20:33:25.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.695399 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 20:33:25.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.718296 systemd[1]: Stopped target initrd.target. Apr 12 20:33:24.738016 systemd[1]: Stopped target basic.target. Apr 12 20:33:25.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.757999 systemd[1]: Stopped target ignition-complete.target. Apr 12 20:33:25.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.779010 systemd[1]: Stopped target ignition-diskful.target. Apr 12 20:33:25.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.800981 systemd[1]: Stopped target initrd-root-device.target. Apr 12 20:33:24.826005 systemd[1]: Stopped target remote-fs.target. Apr 12 20:33:25.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.850992 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 20:33:24.867016 systemd[1]: Stopped target sysinit.target. Apr 12 20:33:24.884028 systemd[1]: Stopped target local-fs.target. Apr 12 20:33:25.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.901986 systemd[1]: Stopped target local-fs-pre.target. Apr 12 20:33:25.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.918007 systemd[1]: Stopped target swap.target. Apr 12 20:33:25.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.932859 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 20:33:24.933211 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 20:33:25.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.950238 systemd[1]: Stopped target cryptsetup.target. Apr 12 20:33:25.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.964906 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 20:33:25.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.965261 systemd[1]: Stopped dracut-initqueue.service. Apr 12 20:33:25.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:24.988178 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 20:33:24.988574 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 20:33:25.007218 systemd[1]: Stopped target paths.target. Apr 12 20:33:25.030830 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 20:33:25.034530 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 20:33:25.047014 systemd[1]: Stopped target slices.target. Apr 12 20:33:25.061874 systemd[1]: Stopped target sockets.target. Apr 12 20:33:25.080028 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 20:33:25.080285 systemd[1]: Closed iscsid.socket. Apr 12 20:33:25.095000 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 20:33:25.095393 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 20:33:25.114026 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 20:33:25.114401 systemd[1]: Stopped ignition-files.service. Apr 12 20:33:25.132045 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 20:33:25.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:25.132427 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 20:33:25.152150 systemd[1]: Stopping ignition-mount.service... Apr 12 20:33:25.163539 systemd[1]: Stopping iscsiuio.service... Apr 12 20:33:25.179061 systemd[1]: Stopping sysroot-boot.service... Apr 12 20:33:25.919601 iscsid[902]: iscsid shutting down. Apr 12 20:33:25.197485 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 20:33:25.197707 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 20:33:25.208827 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 20:33:25.208967 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 20:33:25.251145 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 20:33:25.253278 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 20:33:25.253535 systemd[1]: Stopped iscsiuio.service. Apr 12 20:33:25.254821 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 20:33:25.255103 systemd[1]: Stopped sysroot-boot.service. Apr 12 20:33:25.274853 systemd[1]: Stopped target network.target. Apr 12 20:33:25.281815 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 20:33:25.281911 systemd[1]: Closed iscsiuio.socket. Apr 12 20:33:25.305826 systemd[1]: Stopping systemd-networkd.service... Apr 12 20:33:25.318493 systemd-networkd[882]: enp2s0f1np1: DHCPv6 lease lost Apr 12 20:33:25.319735 systemd[1]: Stopping systemd-resolved.service... Apr 12 20:33:25.331524 systemd-networkd[882]: enp2s0f0np0: DHCPv6 lease lost Apr 12 20:33:25.335231 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 20:33:25.335465 systemd[1]: Stopped systemd-resolved.service. Apr 12 20:33:25.919000 audit: BPF prog-id=9 op=UNLOAD Apr 12 20:33:25.355168 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 20:33:25.355500 systemd[1]: Stopped systemd-networkd.service. Apr 12 20:33:25.370687 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 20:33:25.370735 systemd[1]: Finished initrd-cleanup.service. Apr 12 20:33:25.377782 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 20:33:25.377822 systemd[1]: Stopped ignition-mount.service. Apr 12 20:33:25.400181 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 20:33:25.400206 systemd[1]: Closed systemd-networkd.socket. Apr 12 20:33:25.414482 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 20:33:25.414548 systemd[1]: Stopped ignition-disks.service. Apr 12 20:33:25.429680 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 20:33:25.429769 systemd[1]: Stopped ignition-kargs.service. Apr 12 20:33:25.445798 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 20:33:25.445934 systemd[1]: Stopped ignition-setup.service. Apr 12 20:33:25.461834 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 20:33:25.461980 systemd[1]: Stopped initrd-setup-root.service. Apr 12 20:33:25.920332 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Apr 12 20:33:25.479606 systemd[1]: Stopping network-cleanup.service... Apr 12 20:33:25.491537 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 20:33:25.491771 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 20:33:25.506753 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 20:33:25.506871 systemd[1]: Stopped systemd-sysctl.service. Apr 12 20:33:25.521972 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 20:33:25.522103 systemd[1]: Stopped systemd-modules-load.service. Apr 12 20:33:25.539068 systemd[1]: Stopping systemd-udevd.service... Apr 12 20:33:25.557797 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 20:33:25.559316 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 20:33:25.559664 systemd[1]: Stopped systemd-udevd.service. Apr 12 20:33:25.573060 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 20:33:25.573166 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 20:33:25.586672 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 20:33:25.586761 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 20:33:25.603611 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 20:33:25.603731 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 20:33:25.619678 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 20:33:25.619795 systemd[1]: Stopped dracut-cmdline.service. Apr 12 20:33:25.634714 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 20:33:25.634852 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 20:33:25.651378 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 20:33:25.664502 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 20:33:25.664646 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 20:33:25.680933 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 20:33:25.681050 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 20:33:25.695613 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 20:33:25.695732 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 20:33:25.712932 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 20:33:25.714275 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 20:33:25.714507 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 20:33:25.833847 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 20:33:25.834070 systemd[1]: Stopped network-cleanup.service. Apr 12 20:33:25.847832 systemd[1]: Reached target initrd-switch-root.target. Apr 12 20:33:25.867289 systemd[1]: Starting initrd-switch-root.service... Apr 12 20:33:25.878233 systemd[1]: Switching root. Apr 12 20:33:25.921016 systemd-journald[268]: Journal stopped Apr 12 20:33:29.633336 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 20:33:29.633349 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 20:33:29.633358 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 20:33:29.633363 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 20:33:29.633368 kernel: SELinux: policy capability open_perms=1 Apr 12 20:33:29.633374 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 20:33:29.633380 kernel: SELinux: policy capability always_check_network=0 Apr 12 20:33:29.633386 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 20:33:29.633391 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 20:33:29.633398 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 20:33:29.633404 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 20:33:29.633410 systemd[1]: Successfully loaded SELinux policy in 286.366ms. Apr 12 20:33:29.633417 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.146ms. Apr 12 20:33:29.633424 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:33:29.633432 systemd[1]: Detected architecture x86-64. Apr 12 20:33:29.633438 systemd[1]: Detected first boot. Apr 12 20:33:29.633444 systemd[1]: Hostname set to . Apr 12 20:33:29.633451 systemd[1]: Initializing machine ID from random generator. Apr 12 20:33:29.633457 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 20:33:29.633463 systemd[1]: Populated /etc with preset unit settings. Apr 12 20:33:29.633469 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:33:29.633477 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:33:29.633484 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:33:29.633490 kernel: kauditd_printk_skb: 58 callbacks suppressed Apr 12 20:33:29.633496 kernel: audit: type=1334 audit(1712954008.153:92): prog-id=12 op=LOAD Apr 12 20:33:29.633502 kernel: audit: type=1334 audit(1712954008.153:93): prog-id=3 op=UNLOAD Apr 12 20:33:29.633508 kernel: audit: type=1334 audit(1712954008.194:94): prog-id=13 op=LOAD Apr 12 20:33:29.633514 kernel: audit: type=1334 audit(1712954008.236:95): prog-id=14 op=LOAD Apr 12 20:33:29.633520 kernel: audit: type=1334 audit(1712954008.236:96): prog-id=4 op=UNLOAD Apr 12 20:33:29.633526 kernel: audit: type=1334 audit(1712954008.236:97): prog-id=5 op=UNLOAD Apr 12 20:33:29.633532 kernel: audit: type=1334 audit(1712954008.297:98): prog-id=15 op=LOAD Apr 12 20:33:29.633537 kernel: audit: type=1334 audit(1712954008.297:99): prog-id=12 op=UNLOAD Apr 12 20:33:29.633543 kernel: audit: type=1334 audit(1712954008.335:100): prog-id=16 op=LOAD Apr 12 20:33:29.633549 kernel: audit: type=1334 audit(1712954008.353:101): prog-id=17 op=LOAD Apr 12 20:33:29.633555 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 20:33:29.633561 systemd[1]: Stopped iscsid.service. Apr 12 20:33:29.633568 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 20:33:29.633575 systemd[1]: Stopped initrd-switch-root.service. Apr 12 20:33:29.633581 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 20:33:29.633587 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 20:33:29.633595 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 20:33:29.633602 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 20:33:29.633609 systemd[1]: Created slice system-getty.slice. Apr 12 20:33:29.633615 systemd[1]: Created slice system-modprobe.slice. Apr 12 20:33:29.633623 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 20:33:29.633630 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 20:33:29.633636 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 20:33:29.633643 systemd[1]: Created slice user.slice. Apr 12 20:33:29.633649 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:33:29.633656 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 20:33:29.633663 systemd[1]: Set up automount boot.automount. Apr 12 20:33:29.633672 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 20:33:29.633684 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 20:33:29.633693 systemd[1]: Stopped target initrd-fs.target. Apr 12 20:33:29.633699 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 20:33:29.633706 systemd[1]: Reached target integritysetup.target. Apr 12 20:33:29.633712 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:33:29.633719 systemd[1]: Reached target remote-fs.target. Apr 12 20:33:29.633725 systemd[1]: Reached target slices.target. Apr 12 20:33:29.633731 systemd[1]: Reached target swap.target. Apr 12 20:33:29.633739 systemd[1]: Reached target torcx.target. Apr 12 20:33:29.633750 systemd[1]: Reached target veritysetup.target. Apr 12 20:33:29.633760 systemd[1]: Listening on systemd-coredump.socket. Apr 12 20:33:29.633769 systemd[1]: Listening on systemd-initctl.socket. Apr 12 20:33:29.633780 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:33:29.633793 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:33:29.633804 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:33:29.633815 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 20:33:29.633824 systemd[1]: Mounting dev-hugepages.mount... Apr 12 20:33:29.633831 systemd[1]: Mounting dev-mqueue.mount... Apr 12 20:33:29.633838 systemd[1]: Mounting media.mount... Apr 12 20:33:29.633845 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:33:29.633851 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 20:33:29.633858 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 20:33:29.633866 systemd[1]: Mounting tmp.mount... Apr 12 20:33:29.633872 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 20:33:29.633879 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 20:33:29.633886 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:33:29.633893 systemd[1]: Starting modprobe@configfs.service... Apr 12 20:33:29.633903 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 20:33:29.633913 systemd[1]: Starting modprobe@drm.service... Apr 12 20:33:29.633919 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 20:33:29.633926 systemd[1]: Starting modprobe@fuse.service... Apr 12 20:33:29.633934 kernel: fuse: init (API version 7.34) Apr 12 20:33:29.633940 systemd[1]: Starting modprobe@loop.service... Apr 12 20:33:29.633946 kernel: loop: module loaded Apr 12 20:33:29.633953 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 20:33:29.633960 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 20:33:29.633966 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 20:33:29.633973 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 20:33:29.633980 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 20:33:29.633986 systemd[1]: Stopped systemd-journald.service. Apr 12 20:33:29.633994 systemd[1]: Starting systemd-journald.service... Apr 12 20:33:29.634000 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:33:29.634009 systemd-journald[1250]: Journal started Apr 12 20:33:29.634035 systemd-journald[1250]: Runtime Journal (/run/log/journal/37d15db0e47c4b649af436d9d9db2ec2) is 8.0M, max 636.8M, 628.8M free. Apr 12 20:33:26.275000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 20:33:26.530000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:33:26.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:33:26.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:33:26.533000 audit: BPF prog-id=10 op=LOAD Apr 12 20:33:26.533000 audit: BPF prog-id=10 op=UNLOAD Apr 12 20:33:26.533000 audit: BPF prog-id=11 op=LOAD Apr 12 20:33:26.533000 audit: BPF prog-id=11 op=UNLOAD Apr 12 20:33:26.603000 audit[1140]: AVC avc: denied { associate } for pid=1140 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 20:33:26.603000 audit[1140]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1123 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:26.603000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:33:26.628000 audit[1140]: AVC avc: denied { associate } for pid=1140 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 20:33:26.628000 audit[1140]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1123 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:26.628000 audit: CWD cwd="/" Apr 12 20:33:26.628000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:26.628000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:26.628000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:33:28.153000 audit: BPF prog-id=12 op=LOAD Apr 12 20:33:28.153000 audit: BPF prog-id=3 op=UNLOAD Apr 12 20:33:28.194000 audit: BPF prog-id=13 op=LOAD Apr 12 20:33:28.236000 audit: BPF prog-id=14 op=LOAD Apr 12 20:33:28.236000 audit: BPF prog-id=4 op=UNLOAD Apr 12 20:33:28.236000 audit: BPF prog-id=5 op=UNLOAD Apr 12 20:33:28.297000 audit: BPF prog-id=15 op=LOAD Apr 12 20:33:28.297000 audit: BPF prog-id=12 op=UNLOAD Apr 12 20:33:28.335000 audit: BPF prog-id=16 op=LOAD Apr 12 20:33:28.353000 audit: BPF prog-id=17 op=LOAD Apr 12 20:33:28.353000 audit: BPF prog-id=13 op=UNLOAD Apr 12 20:33:28.353000 audit: BPF prog-id=14 op=UNLOAD Apr 12 20:33:28.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:28.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:28.412000 audit: BPF prog-id=15 op=UNLOAD Apr 12 20:33:28.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:28.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.607000 audit: BPF prog-id=18 op=LOAD Apr 12 20:33:29.607000 audit: BPF prog-id=19 op=LOAD Apr 12 20:33:29.607000 audit: BPF prog-id=20 op=LOAD Apr 12 20:33:29.607000 audit: BPF prog-id=16 op=UNLOAD Apr 12 20:33:29.607000 audit: BPF prog-id=17 op=UNLOAD Apr 12 20:33:29.631000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:33:29.631000 audit[1250]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd5cac78e0 a2=4000 a3=7ffd5cac797c items=0 ppid=1 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:29.631000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 20:33:26.601255 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:33:28.151794 systemd[1]: Queued start job for default target multi-user.target. Apr 12 20:33:26.601713 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:33:28.354596 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 20:33:26.601730 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:33:26.601755 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 20:33:26.601764 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 20:33:26.601788 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 20:33:26.601798 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 20:33:26.601959 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 20:33:26.601991 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:33:26.602001 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:33:26.603457 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 20:33:26.603487 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 20:33:26.603510 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 20:33:26.603523 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 20:33:26.603538 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 20:33:26.603549 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 20:33:27.816840 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:33:27.816981 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:33:27.817041 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:33:27.817136 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:33:27.817166 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 20:33:27.817199 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-04-12T20:33:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 20:33:29.664531 systemd[1]: Starting systemd-network-generator.service... Apr 12 20:33:29.686368 systemd[1]: Starting systemd-remount-fs.service... Apr 12 20:33:29.707353 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:33:29.740780 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 20:33:29.740801 systemd[1]: Stopped verity-setup.service. Apr 12 20:33:29.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.775365 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:33:29.789367 systemd[1]: Started systemd-journald.service. Apr 12 20:33:29.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.797860 systemd[1]: Mounted dev-hugepages.mount. Apr 12 20:33:29.804581 systemd[1]: Mounted dev-mqueue.mount. Apr 12 20:33:29.811581 systemd[1]: Mounted media.mount. Apr 12 20:33:29.818582 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 20:33:29.827573 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 20:33:29.836540 systemd[1]: Mounted tmp.mount. Apr 12 20:33:29.843636 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 20:33:29.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.851653 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:33:29.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.859731 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 20:33:29.859841 systemd[1]: Finished modprobe@configfs.service. Apr 12 20:33:29.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.868779 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 20:33:29.868913 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 20:33:29.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.877801 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 20:33:29.877960 systemd[1]: Finished modprobe@drm.service. Apr 12 20:33:29.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.887023 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 20:33:29.887269 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 20:33:29.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.896170 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 20:33:29.896513 systemd[1]: Finished modprobe@fuse.service. Apr 12 20:33:29.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.905157 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 20:33:29.905645 systemd[1]: Finished modprobe@loop.service. Apr 12 20:33:29.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.915186 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:33:29.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.924146 systemd[1]: Finished systemd-network-generator.service. Apr 12 20:33:29.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.933146 systemd[1]: Finished systemd-remount-fs.service. Apr 12 20:33:29.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.942141 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:33:29.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:29.951946 systemd[1]: Reached target network-pre.target. Apr 12 20:33:29.963143 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 20:33:29.972057 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 20:33:29.979523 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 20:33:29.980538 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 20:33:29.987986 systemd[1]: Starting systemd-journal-flush.service... Apr 12 20:33:29.992102 systemd-journald[1250]: Time spent on flushing to /var/log/journal/37d15db0e47c4b649af436d9d9db2ec2 is 15.231ms for 1593 entries. Apr 12 20:33:29.992102 systemd-journald[1250]: System Journal (/var/log/journal/37d15db0e47c4b649af436d9d9db2ec2) is 8.0M, max 195.6M, 187.6M free. Apr 12 20:33:30.035069 systemd-journald[1250]: Received client request to flush runtime journal. Apr 12 20:33:30.004467 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 20:33:30.004946 systemd[1]: Starting systemd-random-seed.service... Apr 12 20:33:30.017436 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 20:33:30.017934 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:33:30.024988 systemd[1]: Starting systemd-sysusers.service... Apr 12 20:33:30.032006 systemd[1]: Starting systemd-udev-settle.service... Apr 12 20:33:30.039464 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 20:33:30.047491 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 20:33:30.055558 systemd[1]: Finished systemd-journal-flush.service. Apr 12 20:33:30.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.063511 systemd[1]: Finished systemd-random-seed.service. Apr 12 20:33:30.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.071526 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:33:30.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.079525 systemd[1]: Finished systemd-sysusers.service. Apr 12 20:33:30.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.088516 systemd[1]: Reached target first-boot-complete.target. Apr 12 20:33:30.097070 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:33:30.106311 udevadm[1266]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 20:33:30.116256 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:33:30.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.288694 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 20:33:30.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.297000 audit: BPF prog-id=21 op=LOAD Apr 12 20:33:30.297000 audit: BPF prog-id=22 op=LOAD Apr 12 20:33:30.298000 audit: BPF prog-id=7 op=UNLOAD Apr 12 20:33:30.298000 audit: BPF prog-id=8 op=UNLOAD Apr 12 20:33:30.298686 systemd[1]: Starting systemd-udevd.service... Apr 12 20:33:30.310068 systemd-udevd[1269]: Using default interface naming scheme 'v252'. Apr 12 20:33:30.328598 systemd[1]: Started systemd-udevd.service. Apr 12 20:33:30.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.338646 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 20:33:30.339000 audit: BPF prog-id=23 op=LOAD Apr 12 20:33:30.339967 systemd[1]: Starting systemd-networkd.service... Apr 12 20:33:30.372761 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 20:33:30.372820 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 20:33:30.372836 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1279) Apr 12 20:33:30.372848 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 20:33:30.392000 audit: BPF prog-id=24 op=LOAD Apr 12 20:33:30.409000 audit: BPF prog-id=25 op=LOAD Apr 12 20:33:30.409000 audit: BPF prog-id=26 op=LOAD Apr 12 20:33:30.410187 systemd[1]: Starting systemd-userdbd.service... Apr 12 20:33:30.426328 kernel: IPMI message handler: version 39.2 Apr 12 20:33:30.426384 kernel: ACPI: button: Power Button [PWRF] Apr 12 20:33:30.429989 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:33:30.385000 audit[1270]: AVC avc: denied { confidentiality } for pid=1270 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:33:30.440331 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 20:33:30.385000 audit[1270]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5654b86fe6e0 a1=4d8bc a2=7fa40b9e0bc5 a3=5 items=42 ppid=1269 pid=1270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:30.385000 audit: CWD cwd="/" Apr 12 20:33:30.385000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=1 name=(null) inode=8521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=2 name=(null) inode=8521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=3 name=(null) inode=8522 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=4 name=(null) inode=8521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=5 name=(null) inode=8523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=6 name=(null) inode=8521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=7 name=(null) inode=8524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=8 name=(null) inode=8524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=9 name=(null) inode=8525 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=10 name=(null) inode=8524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=11 name=(null) inode=8526 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=12 name=(null) inode=8524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=13 name=(null) inode=8527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=14 name=(null) inode=8524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=15 name=(null) inode=8528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=16 name=(null) inode=8524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=17 name=(null) inode=8529 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=18 name=(null) inode=8521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=19 name=(null) inode=8530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=20 name=(null) inode=8530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=21 name=(null) inode=8531 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=22 name=(null) inode=8530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=23 name=(null) inode=8532 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=24 name=(null) inode=8530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=25 name=(null) inode=8533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=26 name=(null) inode=8530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=27 name=(null) inode=8534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=28 name=(null) inode=8530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=29 name=(null) inode=8535 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=30 name=(null) inode=8521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=31 name=(null) inode=8536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=32 name=(null) inode=8536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=33 name=(null) inode=8537 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=34 name=(null) inode=8536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=35 name=(null) inode=8538 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=36 name=(null) inode=8536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=37 name=(null) inode=8539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=38 name=(null) inode=8536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=39 name=(null) inode=8540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=40 name=(null) inode=8536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PATH item=41 name=(null) inode=8541 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:33:30.385000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 20:33:30.487706 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 20:33:30.487992 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 20:33:30.505396 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 20:33:30.521670 systemd[1]: Started systemd-userdbd.service. Apr 12 20:33:30.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.533336 kernel: ipmi device interface Apr 12 20:33:30.533368 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 20:33:30.533491 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 20:33:30.579337 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 20:33:30.610326 kernel: ipmi_si: IPMI System Interface driver Apr 12 20:33:30.610381 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 20:33:30.643062 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 20:33:30.643092 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 20:33:30.674972 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 20:33:30.675097 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 20:33:30.743139 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 20:33:30.743327 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 20:33:30.743353 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 20:33:30.744090 systemd-networkd[1304]: bond0: netdev ready Apr 12 20:33:30.746681 systemd-networkd[1304]: lo: Link UP Apr 12 20:33:30.746685 systemd-networkd[1304]: lo: Gained carrier Apr 12 20:33:30.747163 systemd-networkd[1304]: Enumeration completed Apr 12 20:33:30.747241 systemd[1]: Started systemd-networkd.service. Apr 12 20:33:30.747471 systemd-networkd[1304]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 20:33:30.749311 systemd-networkd[1304]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:af.network. Apr 12 20:33:30.764326 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Apr 12 20:33:30.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:30.781092 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 20:33:30.819326 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 20:33:30.852861 kernel: intel_rapl_common: Found RAPL domain package Apr 12 20:33:30.852887 kernel: intel_rapl_common: Found RAPL domain core Apr 12 20:33:30.852899 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Apr 12 20:33:30.853027 kernel: intel_rapl_common: Found RAPL domain uncore Apr 12 20:33:30.853055 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 20:33:30.991371 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 20:33:31.009371 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 20:33:31.012499 systemd[1]: Finished systemd-udev-settle.service. Apr 12 20:33:31.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.021017 systemd[1]: Starting lvm2-activation-early.service... Apr 12 20:33:31.037747 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:33:31.066697 systemd[1]: Finished lvm2-activation-early.service. Apr 12 20:33:31.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.074453 systemd[1]: Reached target cryptsetup.target. Apr 12 20:33:31.082985 systemd[1]: Starting lvm2-activation.service... Apr 12 20:33:31.085096 lvm[1373]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:33:31.117759 systemd[1]: Finished lvm2-activation.service. Apr 12 20:33:31.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.125448 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:33:31.133406 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 20:33:31.133422 systemd[1]: Reached target local-fs.target. Apr 12 20:33:31.141402 systemd[1]: Reached target machines.target. Apr 12 20:33:31.149998 systemd[1]: Starting ldconfig.service... Apr 12 20:33:31.157055 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 20:33:31.157095 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:33:31.157755 systemd[1]: Starting systemd-boot-update.service... Apr 12 20:33:31.164836 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 20:33:31.175072 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 20:33:31.175218 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:33:31.175245 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:33:31.175921 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 20:33:31.176137 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1375 (bootctl) Apr 12 20:33:31.176766 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 20:33:31.182197 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:33:31.183739 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:33:31.184923 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:33:31.191458 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 20:33:31.191797 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 20:33:31.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.195801 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 20:33:31.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.254685 systemd-fsck[1383]: fsck.fat 4.2 (2021-01-31) Apr 12 20:33:31.254685 systemd-fsck[1383]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 20:33:31.255432 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 20:33:31.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.268519 systemd[1]: Mounting boot.mount... Apr 12 20:33:31.280026 systemd[1]: Mounted boot.mount. Apr 12 20:33:31.299225 systemd[1]: Finished systemd-boot-update.service. Apr 12 20:33:31.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.330031 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 20:33:31.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:31.339231 systemd[1]: Starting audit-rules.service... Apr 12 20:33:31.351908 systemd[1]: Starting clean-ca-certificates.service... Apr 12 20:33:31.358000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 20:33:31.358000 audit[1402]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe7011d640 a2=420 a3=0 items=0 ppid=1386 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:31.358000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 20:33:31.359007 augenrules[1402]: No rules Apr 12 20:33:31.359362 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 20:33:31.376012 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 20:33:31.382359 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Apr 12 20:33:31.382389 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:33:31.419808 systemd-networkd[1304]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:ae.network. Apr 12 20:33:31.419992 systemd[1]: Starting systemd-resolved.service... Apr 12 20:33:31.420324 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 20:33:31.427331 systemd[1]: Starting systemd-timesyncd.service... Apr 12 20:33:31.434922 systemd[1]: Starting systemd-update-utmp.service... Apr 12 20:33:31.441684 systemd[1]: Finished audit-rules.service. Apr 12 20:33:31.444586 ldconfig[1374]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 20:33:31.448566 systemd[1]: Finished ldconfig.service. Apr 12 20:33:31.455541 systemd[1]: Finished clean-ca-certificates.service. Apr 12 20:33:31.463523 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 20:33:31.475486 systemd[1]: Starting systemd-update-done.service... Apr 12 20:33:31.482393 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 20:33:31.482641 systemd[1]: Finished systemd-update-utmp.service. Apr 12 20:33:31.498511 systemd[1]: Finished systemd-update-done.service. Apr 12 20:33:31.510324 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:33:31.519589 systemd[1]: Started systemd-timesyncd.service. Apr 12 20:33:31.521193 systemd-resolved[1408]: Positive Trust Anchors: Apr 12 20:33:31.521197 systemd-resolved[1408]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:33:31.521215 systemd-resolved[1408]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:33:31.525465 systemd-resolved[1408]: Using system hostname 'ci-3510.3.3-a-e92d44cd51'. Apr 12 20:33:31.527569 systemd[1]: Reached target time-set.target. Apr 12 20:33:31.648436 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 20:33:31.684428 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Apr 12 20:33:31.726971 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:33:31.727008 kernel: bond0: active interface up! Apr 12 20:33:31.748379 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 20:33:31.749354 systemd-networkd[1304]: bond0: Link UP Apr 12 20:33:31.749575 systemd-networkd[1304]: enp2s0f1np1: Link UP Apr 12 20:33:31.749739 systemd-networkd[1304]: enp2s0f1np1: Gained carrier Apr 12 20:33:31.750147 systemd[1]: Started systemd-resolved.service. Apr 12 20:33:31.750704 systemd-networkd[1304]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:65:fd:ae.network. Apr 12 20:33:31.758401 systemd[1]: Reached target network.target. Apr 12 20:33:31.766351 systemd[1]: Reached target nss-lookup.target. Apr 12 20:33:31.775398 systemd[1]: Reached target sysinit.target. Apr 12 20:33:31.784398 systemd[1]: Started motdgen.path. Apr 12 20:33:31.792370 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 20:33:31.802466 systemd[1]: Started logrotate.timer. Apr 12 20:33:31.809405 systemd[1]: Started mdadm.timer. Apr 12 20:33:31.816405 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 20:33:31.825358 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 20:33:31.825379 systemd[1]: Reached target paths.target. Apr 12 20:33:31.832389 systemd[1]: Reached target timers.target. Apr 12 20:33:31.839524 systemd[1]: Listening on dbus.socket. Apr 12 20:33:31.844878 systemd-networkd[1304]: bond0: Gained carrier Apr 12 20:33:31.844989 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:31.845022 systemd-networkd[1304]: enp2s0f0np0: Link UP Apr 12 20:33:31.845232 systemd-networkd[1304]: enp2s0f0np0: Gained carrier Apr 12 20:33:31.847020 systemd[1]: Starting docker.socket... Apr 12 20:33:31.866026 systemd[1]: Listening on sshd.socket. Apr 12 20:33:31.872377 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:33:31.872401 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Apr 12 20:33:31.872519 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:31.872672 systemd-networkd[1304]: enp2s0f1np1: Link DOWN Apr 12 20:33:31.872675 systemd-networkd[1304]: enp2s0f1np1: Lost carrier Apr 12 20:33:31.895587 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:31.895827 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:31.897469 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:33:31.897870 systemd[1]: Listening on docker.socket. Apr 12 20:33:31.904469 systemd[1]: Reached target sockets.target. Apr 12 20:33:31.912422 systemd[1]: Reached target basic.target. Apr 12 20:33:31.919419 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:33:31.919436 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:33:31.919914 systemd[1]: Starting containerd.service... Apr 12 20:33:31.926844 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 20:33:31.935922 systemd[1]: Starting coreos-metadata.service... Apr 12 20:33:31.942862 systemd[1]: Starting dbus.service... Apr 12 20:33:31.949869 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 20:33:31.953878 jq[1424]: false Apr 12 20:33:31.956030 coreos-metadata[1417]: Apr 12 20:33:31.956 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:33:31.956881 systemd[1]: Starting extend-filesystems.service... Apr 12 20:33:31.959115 dbus-daemon[1423]: [system] SELinux support is enabled Apr 12 20:33:31.963373 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 20:33:31.963588 coreos-metadata[1420]: Apr 12 20:33:31.963 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:33:31.963949 systemd[1]: Starting motdgen.service... Apr 12 20:33:31.964129 extend-filesystems[1426]: Found sda Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda1 Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda2 Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda3 Apr 12 20:33:31.984462 extend-filesystems[1426]: Found usr Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda4 Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda6 Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda7 Apr 12 20:33:31.984462 extend-filesystems[1426]: Found sda9 Apr 12 20:33:31.984462 extend-filesystems[1426]: Checking size of /dev/sda9 Apr 12 20:33:31.984462 extend-filesystems[1426]: Resized partition /dev/sda9 Apr 12 20:33:32.170414 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Apr 12 20:33:32.170518 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 20:33:32.170619 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Apr 12 20:33:32.170632 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Apr 12 20:33:32.170642 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:33:31.970960 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 20:33:32.170730 extend-filesystems[1441]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 20:33:32.001129 systemd[1]: Starting sshd-keygen.service... Apr 12 20:33:32.009671 systemd[1]: Starting systemd-logind.service... Apr 12 20:33:32.031616 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:33:32.185706 update_engine[1453]: I0412 20:33:32.116597 1453 main.cc:92] Flatcar Update Engine starting Apr 12 20:33:32.185706 update_engine[1453]: I0412 20:33:32.120440 1453 update_check_scheduler.cc:74] Next update check in 2m35s Apr 12 20:33:32.032167 systemd[1]: Starting tcsd.service... Apr 12 20:33:32.185874 jq[1454]: true Apr 12 20:33:32.043707 systemd-logind[1451]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 20:33:32.043717 systemd-logind[1451]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 20:33:32.043727 systemd-logind[1451]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 20:33:32.043819 systemd-logind[1451]: New seat seat0. Apr 12 20:33:32.065072 systemd-networkd[1304]: enp2s0f1np1: Link UP Apr 12 20:33:32.065075 systemd-networkd[1304]: enp2s0f1np1: Gained carrier Apr 12 20:33:32.068662 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 20:33:32.069025 systemd[1]: Starting update-engine.service... Apr 12 20:33:32.072518 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:32.072558 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:32.072672 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:32.072824 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:32.116745 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 20:33:32.135773 systemd[1]: Started dbus.service. Apr 12 20:33:32.156242 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 20:33:32.156338 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 20:33:32.156484 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 20:33:32.156557 systemd[1]: Finished motdgen.service. Apr 12 20:33:32.177503 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 20:33:32.177581 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 20:33:32.196140 jq[1456]: true Apr 12 20:33:32.196582 dbus-daemon[1423]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 20:33:32.200964 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 20:33:32.201056 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 20:33:32.202776 systemd[1]: Started update-engine.service. Apr 12 20:33:32.205561 env[1457]: time="2024-04-12T20:33:32.205539626Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 20:33:32.213520 systemd[1]: Started systemd-logind.service. Apr 12 20:33:32.213773 env[1457]: time="2024-04-12T20:33:32.213759837Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 20:33:32.215885 env[1457]: time="2024-04-12T20:33:32.215875566Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216487 env[1457]: time="2024-04-12T20:33:32.216472149Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216524 env[1457]: time="2024-04-12T20:33:32.216487151Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216602 env[1457]: time="2024-04-12T20:33:32.216590990Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216632 env[1457]: time="2024-04-12T20:33:32.216601374Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216632 env[1457]: time="2024-04-12T20:33:32.216608498Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 20:33:32.216632 env[1457]: time="2024-04-12T20:33:32.216614436Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216704 env[1457]: time="2024-04-12T20:33:32.216654671Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216783 env[1457]: time="2024-04-12T20:33:32.216774863Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216846 env[1457]: time="2024-04-12T20:33:32.216836537Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:33:32.216874 env[1457]: time="2024-04-12T20:33:32.216845866Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 20:33:32.216899 env[1457]: time="2024-04-12T20:33:32.216871340Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 20:33:32.216899 env[1457]: time="2024-04-12T20:33:32.216879593Z" level=info msg="metadata content store policy set" policy=shared Apr 12 20:33:32.223595 systemd[1]: Started locksmithd.service. Apr 12 20:33:32.230442 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 20:33:32.230520 systemd[1]: Reached target system-config.target. Apr 12 20:33:32.238417 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 20:33:32.238489 systemd[1]: Reached target user-config.target. Apr 12 20:33:32.269132 bash[1483]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:33:32.269246 env[1457]: time="2024-04-12T20:33:32.269153143Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 20:33:32.269246 env[1457]: time="2024-04-12T20:33:32.269175106Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 20:33:32.269246 env[1457]: time="2024-04-12T20:33:32.269194047Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 20:33:32.269246 env[1457]: time="2024-04-12T20:33:32.269219294Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269246 env[1457]: time="2024-04-12T20:33:32.269232533Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269246 env[1457]: time="2024-04-12T20:33:32.269244482Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269255346Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269267110Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269278801Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269291608Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269302340Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269313082Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 20:33:32.269399 env[1457]: time="2024-04-12T20:33:32.269387227Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 20:33:32.269522 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 20:33:32.269615 env[1457]: time="2024-04-12T20:33:32.269438251Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 20:33:32.269881 env[1457]: time="2024-04-12T20:33:32.269794789Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 20:33:32.269909 env[1457]: time="2024-04-12T20:33:32.269890795Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.269937 env[1457]: time="2024-04-12T20:33:32.269905961Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 20:33:32.269966 env[1457]: time="2024-04-12T20:33:32.269946694Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.269966 env[1457]: time="2024-04-12T20:33:32.269960919Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270013 env[1457]: time="2024-04-12T20:33:32.269972372Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270013 env[1457]: time="2024-04-12T20:33:32.269983117Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270013 env[1457]: time="2024-04-12T20:33:32.270002249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270081 env[1457]: time="2024-04-12T20:33:32.270014491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270081 env[1457]: time="2024-04-12T20:33:32.270025492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270081 env[1457]: time="2024-04-12T20:33:32.270035782Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270081 env[1457]: time="2024-04-12T20:33:32.270047528Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 20:33:32.270200 env[1457]: time="2024-04-12T20:33:32.270146366Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270200 env[1457]: time="2024-04-12T20:33:32.270160492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270200 env[1457]: time="2024-04-12T20:33:32.270172023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270200 env[1457]: time="2024-04-12T20:33:32.270182861Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 20:33:32.270297 env[1457]: time="2024-04-12T20:33:32.270198480Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 20:33:32.270297 env[1457]: time="2024-04-12T20:33:32.270210469Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 20:33:32.270297 env[1457]: time="2024-04-12T20:33:32.270224834Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 20:33:32.270297 env[1457]: time="2024-04-12T20:33:32.270250392Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 20:33:32.270419 env[1457]: time="2024-04-12T20:33:32.270390926Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270424273Z" level=info msg="Connect containerd service" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270443521Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270732263Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270822216Z" level=info msg="Start subscribing containerd event" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270845471Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270878583Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270878636Z" level=info msg="Start recovering state" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270905068Z" level=info msg="containerd successfully booted in 0.065699s" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270922416Z" level=info msg="Start event monitor" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270932330Z" level=info msg="Start snapshots syncer" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270940849Z" level=info msg="Start cni network conf syncer for default" Apr 12 20:33:32.272584 env[1457]: time="2024-04-12T20:33:32.270945511Z" level=info msg="Start streaming server" Apr 12 20:33:32.279612 systemd[1]: Started containerd.service. Apr 12 20:33:32.287703 locksmithd[1490]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 20:33:32.316447 sshd_keygen[1450]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 20:33:32.328025 systemd[1]: Finished sshd-keygen.service. Apr 12 20:33:32.336292 systemd[1]: Starting issuegen.service... Apr 12 20:33:32.344549 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 20:33:32.344625 systemd[1]: Finished issuegen.service. Apr 12 20:33:32.353045 systemd[1]: Starting systemd-user-sessions.service... Apr 12 20:33:32.362542 systemd[1]: Finished systemd-user-sessions.service. Apr 12 20:33:32.372037 systemd[1]: Started getty@tty1.service. Apr 12 20:33:32.379961 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 20:33:32.389464 systemd[1]: Reached target getty.target. Apr 12 20:33:32.865437 systemd-networkd[1304]: bond0: Gained IPv6LL Apr 12 20:33:32.865651 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:33.219387 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Apr 12 20:33:33.250334 extend-filesystems[1441]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 20:33:33.250334 extend-filesystems[1441]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 20:33:33.250334 extend-filesystems[1441]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Apr 12 20:33:33.290415 extend-filesystems[1426]: Resized filesystem in /dev/sda9 Apr 12 20:33:33.290415 extend-filesystems[1426]: Found sdb Apr 12 20:33:33.250846 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 20:33:33.250951 systemd[1]: Finished extend-filesystems.service. Apr 12 20:33:33.569685 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:33.569863 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:33.570967 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 20:33:33.580610 systemd[1]: Reached target network-online.target. Apr 12 20:33:34.389374 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 20:33:37.401727 login[1516]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:33:37.409100 login[1515]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:33:37.409439 systemd[1]: Created slice user-500.slice. Apr 12 20:33:37.409970 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 20:33:37.410980 systemd-logind[1451]: New session 1 of user core. Apr 12 20:33:37.412924 systemd-logind[1451]: New session 2 of user core. Apr 12 20:33:37.415233 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 20:33:37.415980 systemd[1]: Starting user@500.service... Apr 12 20:33:37.417847 (systemd)[1521]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:37.484248 systemd[1521]: Queued start job for default target default.target. Apr 12 20:33:37.484492 systemd[1521]: Reached target paths.target. Apr 12 20:33:37.484504 systemd[1521]: Reached target sockets.target. Apr 12 20:33:37.484511 systemd[1521]: Reached target timers.target. Apr 12 20:33:37.484518 systemd[1521]: Reached target basic.target. Apr 12 20:33:37.484537 systemd[1521]: Reached target default.target. Apr 12 20:33:37.484552 systemd[1521]: Startup finished in 63ms. Apr 12 20:33:37.484598 systemd[1]: Started user@500.service. Apr 12 20:33:37.485143 systemd[1]: Started session-1.scope. Apr 12 20:33:37.485504 systemd[1]: Started session-2.scope. Apr 12 20:33:38.114550 coreos-metadata[1417]: Apr 12 20:33:38.114 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:33:38.115360 coreos-metadata[1420]: Apr 12 20:33:38.114 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:33:39.114717 coreos-metadata[1420]: Apr 12 20:33:39.114 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:33:39.114975 coreos-metadata[1417]: Apr 12 20:33:39.114 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:33:39.671432 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Apr 12 20:33:39.671596 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Apr 12 20:33:40.186908 coreos-metadata[1420]: Apr 12 20:33:40.186 INFO Fetch successful Apr 12 20:33:40.188675 coreos-metadata[1417]: Apr 12 20:33:40.188 INFO Fetch successful Apr 12 20:33:40.213702 systemd[1]: Finished coreos-metadata.service. Apr 12 20:33:40.214653 systemd[1]: Starting etcd-member.service... Apr 12 20:33:40.215310 unknown[1417]: wrote ssh authorized keys file for user: core Apr 12 20:33:40.215488 systemd[1]: Started packet-phone-home.service. Apr 12 20:33:40.223155 curl[1544]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 20:33:40.223329 curl[1544]: Dload Upload Total Spent Left Speed Apr 12 20:33:40.229020 update-ssh-keys[1547]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:33:40.229449 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 20:33:40.232262 systemd[1]: Starting docker.service... Apr 12 20:33:40.249284 env[1561]: time="2024-04-12T20:33:40.249256774Z" level=info msg="Starting up" Apr 12 20:33:40.249822 env[1561]: time="2024-04-12T20:33:40.249811447Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:33:40.249822 env[1561]: time="2024-04-12T20:33:40.249820163Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:33:40.249882 env[1561]: time="2024-04-12T20:33:40.249830597Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:33:40.249882 env[1561]: time="2024-04-12T20:33:40.249836497Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:33:40.250737 env[1561]: time="2024-04-12T20:33:40.250697927Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:33:40.250737 env[1561]: time="2024-04-12T20:33:40.250706557Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:33:40.250737 env[1561]: time="2024-04-12T20:33:40.250715194Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:33:40.250737 env[1561]: time="2024-04-12T20:33:40.250720486Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:33:40.264203 env[1561]: time="2024-04-12T20:33:40.264157065Z" level=info msg="Loading containers: start." Apr 12 20:33:40.421382 kernel: Initializing XFRM netlink socket Apr 12 20:33:40.454430 env[1561]: time="2024-04-12T20:33:40.454363046Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 20:33:40.455085 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:40.455134 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:40.458197 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:40.458333 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:40.499228 systemd-networkd[1304]: docker0: Link UP Apr 12 20:33:40.499386 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:33:40.503749 env[1561]: time="2024-04-12T20:33:40.503734162Z" level=info msg="Loading containers: done." Apr 12 20:33:40.509605 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck10985468-merged.mount: Deactivated successfully. Apr 12 20:33:40.509748 env[1561]: time="2024-04-12T20:33:40.509706628Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 20:33:40.509850 env[1561]: time="2024-04-12T20:33:40.509808690Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 20:33:40.509895 env[1561]: time="2024-04-12T20:33:40.509866896Z" level=info msg="Daemon has completed initialization" Apr 12 20:33:40.517663 systemd[1]: Started docker.service. Apr 12 20:33:40.522331 env[1561]: time="2024-04-12T20:33:40.522266119Z" level=info msg="API listen on /run/docker.sock" Apr 12 20:33:40.523046 etcd-wrapper[1549]: Error response from daemon: No such container: etcd-member Apr 12 20:33:40.544619 etcd-wrapper[1685]: Error: No such container: etcd-member Apr 12 20:33:40.567477 curl[1544]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 20:33:40.568643 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 20:33:40.597072 etcd-wrapper[1707]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Apr 12 20:33:40.611102 systemd[1]: Created slice system-sshd.slice. Apr 12 20:33:40.611695 systemd[1]: Started sshd@0-145.40.90.201:22-147.75.109.163:33736.service. Apr 12 20:33:40.664589 sshd[1719]: Accepted publickey for core from 147.75.109.163 port 33736 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:40.665605 sshd[1719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:40.668935 systemd-logind[1451]: New session 3 of user core. Apr 12 20:33:40.669629 systemd[1]: Started session-3.scope. Apr 12 20:33:40.725577 systemd[1]: Started sshd@1-145.40.90.201:22-147.75.109.163:33748.service. Apr 12 20:33:40.777100 sshd[1724]: Accepted publickey for core from 147.75.109.163 port 33748 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:40.777859 sshd[1724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:40.780117 systemd-logind[1451]: New session 4 of user core. Apr 12 20:33:40.780630 systemd[1]: Started session-4.scope. Apr 12 20:33:40.830389 sshd[1724]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:40.832195 systemd[1]: sshd@1-145.40.90.201:22-147.75.109.163:33748.service: Deactivated successfully. Apr 12 20:33:40.832608 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 20:33:40.833037 systemd-logind[1451]: Session 4 logged out. Waiting for processes to exit. Apr 12 20:33:40.833693 systemd[1]: Started sshd@2-145.40.90.201:22-147.75.109.163:33764.service. Apr 12 20:33:40.834153 systemd-logind[1451]: Removed session 4. Apr 12 20:33:40.874670 sshd[1730]: Accepted publickey for core from 147.75.109.163 port 33764 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:40.875593 sshd[1730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:40.878767 systemd-logind[1451]: New session 5 of user core. Apr 12 20:33:40.879405 systemd[1]: Started session-5.scope. Apr 12 20:33:40.944172 sshd[1730]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:40.950021 systemd[1]: sshd@2-145.40.90.201:22-147.75.109.163:33764.service: Deactivated successfully. Apr 12 20:33:40.951781 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 20:33:40.953494 systemd-logind[1451]: Session 5 logged out. Waiting for processes to exit. Apr 12 20:33:40.955832 systemd-logind[1451]: Removed session 5. Apr 12 20:33:41.948629 etcd-wrapper[1707]: v3.5.0: Pulling from coreos/etcd Apr 12 20:33:42.271265 etcd-wrapper[1707]: 1813d21adc01: Pulling fs layer Apr 12 20:33:42.271265 etcd-wrapper[1707]: 6e96907ab677: Pulling fs layer Apr 12 20:33:42.271703 etcd-wrapper[1707]: 444ed0ea8673: Pulling fs layer Apr 12 20:33:42.271703 etcd-wrapper[1707]: 0fd2df5633f0: Pulling fs layer Apr 12 20:33:42.271703 etcd-wrapper[1707]: 8cc22b9456bb: Pulling fs layer Apr 12 20:33:42.271703 etcd-wrapper[1707]: 7ac70aecd290: Pulling fs layer Apr 12 20:33:42.271703 etcd-wrapper[1707]: 4b376c64dfe4: Pulling fs layer Apr 12 20:33:42.271703 etcd-wrapper[1707]: 0fd2df5633f0: Waiting Apr 12 20:33:42.271703 etcd-wrapper[1707]: 8cc22b9456bb: Waiting Apr 12 20:33:42.271703 etcd-wrapper[1707]: 7ac70aecd290: Waiting Apr 12 20:33:42.648511 etcd-wrapper[1707]: 444ed0ea8673: Verifying Checksum Apr 12 20:33:42.648511 etcd-wrapper[1707]: 444ed0ea8673: Download complete Apr 12 20:33:42.656568 etcd-wrapper[1707]: 6e96907ab677: Verifying Checksum Apr 12 20:33:42.656568 etcd-wrapper[1707]: 6e96907ab677: Download complete Apr 12 20:33:42.763121 etcd-wrapper[1707]: 1813d21adc01: Download complete Apr 12 20:33:42.969951 etcd-wrapper[1707]: 0fd2df5633f0: Verifying Checksum Apr 12 20:33:42.969951 etcd-wrapper[1707]: 0fd2df5633f0: Download complete Apr 12 20:33:42.973529 etcd-wrapper[1707]: 8cc22b9456bb: Verifying Checksum Apr 12 20:33:42.973529 etcd-wrapper[1707]: 8cc22b9456bb: Download complete Apr 12 20:33:43.095122 etcd-wrapper[1707]: 7ac70aecd290: Verifying Checksum Apr 12 20:33:43.095122 etcd-wrapper[1707]: 7ac70aecd290: Download complete Apr 12 20:33:43.246538 etcd-wrapper[1707]: 1813d21adc01: Pull complete Apr 12 20:33:43.319828 etcd-wrapper[1707]: 4b376c64dfe4: Verifying Checksum Apr 12 20:33:43.319828 etcd-wrapper[1707]: 4b376c64dfe4: Download complete Apr 12 20:33:43.533788 systemd[1]: var-lib-docker-overlay2-0f0617d703da48ae92694cf2108f36dcd65e8c219511a020566615cb211ad073-merged.mount: Deactivated successfully. Apr 12 20:33:43.774943 etcd-wrapper[1707]: 6e96907ab677: Pull complete Apr 12 20:33:43.933723 systemd[1]: var-lib-docker-overlay2-61ee693091e504ca432ca765173e74fc01f1a1bce30e0794be2b2eacf107d6ff-merged.mount: Deactivated successfully. Apr 12 20:33:44.001857 etcd-wrapper[1707]: 444ed0ea8673: Pull complete Apr 12 20:33:44.253139 systemd[1]: var-lib-docker-overlay2-3446e4d52e1b2fe50dd12e7c7429022444bdb7aab9ae3586c6b3262ca26ac814-merged.mount: Deactivated successfully. Apr 12 20:33:44.266419 etcd-wrapper[1707]: 0fd2df5633f0: Pull complete Apr 12 20:33:44.293804 systemd[1]: var-lib-docker-overlay2-2b1bfbef5ceda7edc2f47292da5e3f0cc84bb0ff88b0bdb8ba208c8f4826eed2-merged.mount: Deactivated successfully. Apr 12 20:33:44.295939 etcd-wrapper[1707]: 8cc22b9456bb: Pull complete Apr 12 20:33:44.316064 systemd[1]: var-lib-docker-overlay2-15ccccda7ae1f5a8fea9e9add3c208ca2b40e1bc776c6de01c17f4afd815f42e-merged.mount: Deactivated successfully. Apr 12 20:33:44.334534 etcd-wrapper[1707]: 7ac70aecd290: Pull complete Apr 12 20:33:44.356379 etcd-wrapper[1707]: 4b376c64dfe4: Pull complete Apr 12 20:33:44.358875 etcd-wrapper[1707]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Apr 12 20:33:44.359664 etcd-wrapper[1707]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Apr 12 20:33:44.395759 env[1457]: time="2024-04-12T20:33:44.395727236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:33:44.395759 env[1457]: time="2024-04-12T20:33:44.395753234Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:33:44.395986 env[1457]: time="2024-04-12T20:33:44.395762668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:33:44.395986 env[1457]: time="2024-04-12T20:33:44.395832358Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/faa3e948d6d52cfbf29da023807f65f86d32b99c3d17668ccda5949a8526677d pid=1902 runtime=io.containerd.runc.v2 Apr 12 20:33:44.401072 systemd[1]: Started docker-faa3e948d6d52cfbf29da023807f65f86d32b99c3d17668ccda5949a8526677d.scope. Apr 12 20:33:44.430414 etcd-wrapper[1707]: {"level":"info","ts":1712954024.4302485,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Apr 12 20:33:44.430414 etcd-wrapper[1707]: {"level":"info","ts":1712954024.4302917,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"37d15db0e47c4b649af436d9d9db2ec2"} Apr 12 20:33:44.430414 etcd-wrapper[1707]: {"level":"warn","ts":1712954024.430308,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Apr 12 20:33:44.430414 etcd-wrapper[1707]: {"level":"warn","ts":1712954024.4303126,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Apr 12 20:33:44.430555 etcd-wrapper[1707]: {"level":"warn","ts":1712954024.4303162,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Apr 12 20:33:44.430555 etcd-wrapper[1707]: {"level":"warn","ts":1712954024.4303257,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Apr 12 20:33:44.430555 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.430Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.11:2379"]} Apr 12 20:33:44.430555 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.430Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Apr 12 20:33:44.430872 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.430Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Apr 12 20:33:44.431124 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.431Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"37d15db0e47c4b649af436d9d9db2ec2","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.11:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"37d15db0e47c4b649af436d9d9db2ec2=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Apr 12 20:33:44.431882 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.431Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"557.755µs"} Apr 12 20:33:44.432863 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.432Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Apr 12 20:33:44.432863 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.432Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Apr 12 20:33:44.432863 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.432Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Apr 12 20:33:44.432863 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.432Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Apr 12 20:33:44.432863 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.432Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Apr 12 20:33:44.432979 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.432Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Apr 12 20:33:44.433358 etcd-wrapper[1707]: {"level":"warn","ts":"2024-04-12T20:33:44.433Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Apr 12 20:33:44.434012 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.433Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Apr 12 20:33:44.434292 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.434Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Apr 12 20:33:44.434523 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.434Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Apr 12 20:33:44.434572 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.434Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Apr 12 20:33:44.434689 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.434Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Apr 12 20:33:44.434716 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.434Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Apr 12 20:33:44.435628 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.435Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.11:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Apr 12 20:33:44.435628 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.435Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Apr 12 20:33:44.435628 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:44.435Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Apr 12 20:33:45.133887 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.133Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.134Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.134Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.134Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.134Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.134Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:37d15db0e47c4b649af436d9d9db2ec2 ClientURLs:[http://10.67.80.11:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.135Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Apr 12 20:33:45.135812 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.135Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Apr 12 20:33:45.135562 systemd[1]: Started etcd-member.service. Apr 12 20:33:45.135895 systemd[1]: Reached target multi-user.target. Apr 12 20:33:45.136317 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:33:45.136Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Apr 12 20:33:45.136931 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 20:33:45.141055 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 20:33:45.141134 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 20:33:45.141213 systemd[1]: Startup finished in 2.017s (kernel) + 16.143s (initrd) + 19.166s (userspace) = 37.327s. Apr 12 20:33:47.501039 systemd[1]: Started sshd@3-145.40.90.201:22-221.226.39.202:65312.service. Apr 12 20:33:49.640326 systemd[1]: Started sshd@4-145.40.90.201:22-129.226.146.101:37946.service. Apr 12 20:33:50.640428 sshd[1954]: Invalid user tests from 129.226.146.101 port 37946 Apr 12 20:33:50.646494 sshd[1954]: pam_faillock(sshd:auth): User unknown Apr 12 20:33:50.647576 sshd[1954]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:33:50.647667 sshd[1954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:33:50.648705 sshd[1954]: pam_faillock(sshd:auth): User unknown Apr 12 20:33:50.952869 systemd[1]: Started sshd@5-145.40.90.201:22-147.75.109.163:37076.service. Apr 12 20:33:50.980721 sshd[1957]: Accepted publickey for core from 147.75.109.163 port 37076 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:50.981567 sshd[1957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:50.984336 systemd-logind[1451]: New session 6 of user core. Apr 12 20:33:50.984951 systemd[1]: Started session-6.scope. Apr 12 20:33:51.038541 sshd[1957]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:51.040001 systemd[1]: sshd@5-145.40.90.201:22-147.75.109.163:37076.service: Deactivated successfully. Apr 12 20:33:51.040312 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 20:33:51.040624 systemd-logind[1451]: Session 6 logged out. Waiting for processes to exit. Apr 12 20:33:51.041146 systemd[1]: Started sshd@6-145.40.90.201:22-147.75.109.163:37080.service. Apr 12 20:33:51.041703 systemd-logind[1451]: Removed session 6. Apr 12 20:33:51.069314 sshd[1963]: Accepted publickey for core from 147.75.109.163 port 37080 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:51.070087 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:51.072862 systemd-logind[1451]: New session 7 of user core. Apr 12 20:33:51.073379 systemd[1]: Started session-7.scope. Apr 12 20:33:51.124818 sshd[1963]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:51.126396 systemd[1]: sshd@6-145.40.90.201:22-147.75.109.163:37080.service: Deactivated successfully. Apr 12 20:33:51.126689 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 20:33:51.127052 systemd-logind[1451]: Session 7 logged out. Waiting for processes to exit. Apr 12 20:33:51.127558 systemd[1]: Started sshd@7-145.40.90.201:22-147.75.109.163:37092.service. Apr 12 20:33:51.127937 systemd-logind[1451]: Removed session 7. Apr 12 20:33:51.155736 sshd[1969]: Accepted publickey for core from 147.75.109.163 port 37092 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:51.156597 sshd[1969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:51.159593 systemd-logind[1451]: New session 8 of user core. Apr 12 20:33:51.160133 systemd[1]: Started session-8.scope. Apr 12 20:33:51.225098 sshd[1969]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:51.232094 systemd[1]: sshd@7-145.40.90.201:22-147.75.109.163:37092.service: Deactivated successfully. Apr 12 20:33:51.233739 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 20:33:51.235461 systemd-logind[1451]: Session 8 logged out. Waiting for processes to exit. Apr 12 20:33:51.238132 systemd[1]: Started sshd@8-145.40.90.201:22-147.75.109.163:37100.service. Apr 12 20:33:51.240562 systemd-logind[1451]: Removed session 8. Apr 12 20:33:51.322856 sshd[1975]: Accepted publickey for core from 147.75.109.163 port 37100 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:51.324090 sshd[1975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:51.327400 systemd-logind[1451]: New session 9 of user core. Apr 12 20:33:51.328136 systemd[1]: Started session-9.scope. Apr 12 20:33:51.417781 sudo[1978]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 20:33:51.418423 sudo[1978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:33:51.445821 dbus-daemon[1423]: \xd0\xfd\xd2\u0003 V: received setenforce notice (enforcing=1805757408) Apr 12 20:33:51.449956 sudo[1978]: pam_unix(sudo:session): session closed for user root Apr 12 20:33:51.451664 sshd[1975]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:51.453132 systemd[1]: sshd@8-145.40.90.201:22-147.75.109.163:37100.service: Deactivated successfully. Apr 12 20:33:51.453498 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 20:33:51.453907 systemd-logind[1451]: Session 9 logged out. Waiting for processes to exit. Apr 12 20:33:51.454402 systemd[1]: Started sshd@9-145.40.90.201:22-147.75.109.163:37112.service. Apr 12 20:33:51.454951 systemd-logind[1451]: Removed session 9. Apr 12 20:33:51.492418 sshd[1982]: Accepted publickey for core from 147.75.109.163 port 37112 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:51.493389 sshd[1982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:51.496602 systemd-logind[1451]: New session 10 of user core. Apr 12 20:33:51.497223 systemd[1]: Started session-10.scope. Apr 12 20:33:51.555832 sudo[1986]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 20:33:51.555941 sudo[1986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:33:51.557768 sudo[1986]: pam_unix(sudo:session): session closed for user root Apr 12 20:33:51.560108 sudo[1985]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 20:33:51.560220 sudo[1985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:33:51.565537 systemd[1]: Stopping audit-rules.service... Apr 12 20:33:51.565000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:33:51.566291 auditctl[1989]: No rules Apr 12 20:33:51.566488 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 20:33:51.566586 systemd[1]: Stopped audit-rules.service. Apr 12 20:33:51.567385 systemd[1]: Starting audit-rules.service... Apr 12 20:33:51.571796 kernel: kauditd_printk_skb: 113 callbacks suppressed Apr 12 20:33:51.571839 kernel: audit: type=1305 audit(1712954031.565:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:33:51.578017 augenrules[2006]: No rules Apr 12 20:33:51.578371 systemd[1]: Finished audit-rules.service. Apr 12 20:33:51.578896 sudo[1985]: pam_unix(sudo:session): session closed for user root Apr 12 20:33:51.579719 sshd[1982]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:51.581340 systemd[1]: sshd@9-145.40.90.201:22-147.75.109.163:37112.service: Deactivated successfully. Apr 12 20:33:51.581703 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 20:33:51.582092 systemd-logind[1451]: Session 10 logged out. Waiting for processes to exit. Apr 12 20:33:51.582687 systemd[1]: Started sshd@10-145.40.90.201:22-147.75.109.163:37116.service. Apr 12 20:33:51.583129 systemd-logind[1451]: Removed session 10. Apr 12 20:33:51.565000 audit[1989]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3ab61940 a2=420 a3=0 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:51.618401 kernel: audit: type=1300 audit(1712954031.565:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3ab61940 a2=420 a3=0 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:51.618444 kernel: audit: type=1327 audit(1712954031.565:166): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:33:51.565000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:33:51.627880 kernel: audit: type=1131 audit(1712954031.566:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.649385 sshd[2012]: Accepted publickey for core from 147.75.109.163 port 37116 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:51.650315 kernel: audit: type=1130 audit(1712954031.578:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.650518 sshd[2012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:51.653134 systemd-logind[1451]: New session 11 of user core. Apr 12 20:33:51.653550 systemd[1]: Started session-11.scope. Apr 12 20:33:51.672769 kernel: audit: type=1106 audit(1712954031.578:169): pid=1985 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.578000 audit[1985]: USER_END pid=1985 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.698850 kernel: audit: type=1104 audit(1712954031.578:170): pid=1985 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.578000 audit[1985]: CRED_DISP pid=1985 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.698878 sshd[2012]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:51.700307 systemd[1]: sshd@10-145.40.90.201:22-147.75.109.163:37116.service: Deactivated successfully. Apr 12 20:33:51.700607 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 20:33:51.700964 systemd-logind[1451]: Session 11 logged out. Waiting for processes to exit. Apr 12 20:33:51.701452 systemd[1]: Started sshd@11-145.40.90.201:22-147.75.109.163:37132.service. Apr 12 20:33:51.701879 systemd-logind[1451]: Removed session 11. Apr 12 20:33:51.722450 kernel: audit: type=1106 audit(1712954031.580:171): pid=1982 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.580000 audit[1982]: USER_END pid=1982 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.580000 audit[1982]: CRED_DISP pid=1982 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.775996 sshd[2020]: Accepted publickey for core from 147.75.109.163 port 37132 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:33:51.777615 sshd[2020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:33:51.779911 systemd-logind[1451]: New session 12 of user core. Apr 12 20:33:51.780287 systemd[1]: Started session-12.scope. Apr 12 20:33:51.780807 kernel: audit: type=1104 audit(1712954031.580:172): pid=1982 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.780832 kernel: audit: type=1131 audit(1712954031.581:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.90.201:22-147.75.109.163:37112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.90.201:22-147.75.109.163:37112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.90.201:22-147.75.109.163:37116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.649000 audit[2012]: USER_ACCT pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.650000 audit[2012]: CRED_ACQ pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.650000 audit[2012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4cf28c80 a2=3 a3=0 items=0 ppid=1 pid=2012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:51.650000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:33:51.655000 audit[2012]: USER_START pid=2012 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.655000 audit[2014]: CRED_ACQ pid=2014 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.699000 audit[2012]: USER_END pid=2012 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.699000 audit[2012]: CRED_DISP pid=2012 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.90.201:22-147.75.109.163:37116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.90.201:22-147.75.109.163:37132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:51.775000 audit[2020]: USER_ACCT pid=2020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.777000 audit[2020]: CRED_ACQ pid=2020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.777000 audit[2020]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e0bea90 a2=3 a3=0 items=0 ppid=1 pid=2020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:33:51.777000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:33:51.781000 audit[2020]: USER_START pid=2020 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:51.782000 audit[2022]: CRED_ACQ pid=2022 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:52.070132 sshd[2020]: pam_unix(sshd:session): session closed for user core Apr 12 20:33:52.072000 audit[2020]: USER_END pid=2020 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:52.072000 audit[2020]: CRED_DISP pid=2020 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:33:52.075646 systemd[1]: sshd@11-145.40.90.201:22-147.75.109.163:37132.service: Deactivated successfully. Apr 12 20:33:52.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.90.201:22-147.75.109.163:37132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:52.077227 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 20:33:52.078776 systemd-logind[1451]: Session 12 logged out. Waiting for processes to exit. Apr 12 20:33:52.080903 systemd-logind[1451]: Removed session 12. Apr 12 20:33:52.677582 sshd[1954]: Failed password for invalid user tests from 129.226.146.101 port 37946 ssh2 Apr 12 20:33:53.560698 sshd[1954]: Received disconnect from 129.226.146.101 port 37946:11: Bye Bye [preauth] Apr 12 20:33:53.560698 sshd[1954]: Disconnected from invalid user tests 129.226.146.101 port 37946 [preauth] Apr 12 20:33:53.563253 systemd[1]: sshd@4-145.40.90.201:22-129.226.146.101:37946.service: Deactivated successfully. Apr 12 20:33:53.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@4-145.40.90.201:22-129.226.146.101:37946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:57.291160 systemd[1]: Started sshd@12-145.40.90.201:22-219.152.174.29:46220.service. Apr 12 20:33:57.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.201:22-219.152.174.29:46220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:57.296776 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 20:33:57.296857 kernel: audit: type=1130 audit(1712954037.290:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.201:22-219.152.174.29:46220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:33:58.325068 sshd[2039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:33:58.325000 audit[2039]: USER_AUTH pid=2039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:33:58.402504 kernel: audit: type=1100 audit(1712954038.325:194): pid=2039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:34:00.785722 sshd[2039]: Failed password for root from 219.152.174.29 port 46220 ssh2 Apr 12 20:34:02.338403 systemd[1]: Started sshd@13-145.40.90.201:22-43.128.89.189:40366.service. Apr 12 20:34:02.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.201:22-43.128.89.189:40366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:02.417325 kernel: audit: type=1130 audit(1712954042.338:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.201:22-43.128.89.189:40366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:03.175950 sshd[2039]: Received disconnect from 219.152.174.29 port 46220:11: Bye Bye [preauth] Apr 12 20:34:03.175950 sshd[2039]: Disconnected from authenticating user root 219.152.174.29 port 46220 [preauth] Apr 12 20:34:03.178418 systemd[1]: sshd@12-145.40.90.201:22-219.152.174.29:46220.service: Deactivated successfully. Apr 12 20:34:03.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.201:22-219.152.174.29:46220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:03.261505 kernel: audit: type=1131 audit(1712954043.178:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.201:22-219.152.174.29:46220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:03.339153 sshd[2042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 user=root Apr 12 20:34:03.338000 audit[2042]: USER_AUTH pid=2042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:34:03.423495 kernel: audit: type=1100 audit(1712954043.338:197): pid=2042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:34:05.819531 sshd[2042]: Failed password for root from 43.128.89.189 port 40366 ssh2 Apr 12 20:34:08.190982 sshd[2042]: Received disconnect from 43.128.89.189 port 40366:11: Bye Bye [preauth] Apr 12 20:34:08.190982 sshd[2042]: Disconnected from authenticating user root 43.128.89.189 port 40366 [preauth] Apr 12 20:34:08.193454 systemd[1]: sshd@13-145.40.90.201:22-43.128.89.189:40366.service: Deactivated successfully. Apr 12 20:34:08.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.201:22-43.128.89.189:40366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:08.283524 kernel: audit: type=1131 audit(1712954048.193:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.201:22-43.128.89.189:40366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:10.756783 systemd-timesyncd[1409]: Contacted time server [2604:2dc0:202:300::13ac]:123 (2.flatcar.pool.ntp.org). Apr 12 20:34:10.756926 systemd-timesyncd[1409]: Initial clock synchronization to Fri 2024-04-12 20:34:10.698520 UTC. Apr 12 20:34:17.839817 update_engine[1453]: I0412 20:34:17.839700 1453 update_attempter.cc:509] Updating boot flags... Apr 12 20:34:20.135028 systemd[1]: Started sshd@14-145.40.90.201:22-43.156.243.235:33400.service. Apr 12 20:34:20.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.201:22-43.156.243.235:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:20.225499 kernel: audit: type=1130 audit(1712954060.133:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.201:22-43.156.243.235:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:21.160357 sshd[2065]: Invalid user igor from 43.156.243.235 port 33400 Apr 12 20:34:21.166428 sshd[2065]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:21.167440 sshd[2065]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:34:21.167531 sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:34:21.168608 sshd[2065]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:21.168000 audit[2065]: USER_AUTH pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="igor" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:34:21.260512 kernel: audit: type=1100 audit(1712954061.168:200): pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="igor" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:34:21.717145 systemd[1]: Started sshd@15-145.40.90.201:22-43.156.185.119:48968.service. Apr 12 20:34:21.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.201:22-43.156.185.119:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:21.808323 kernel: audit: type=1130 audit(1712954061.716:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.201:22-43.156.185.119:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:22.707093 sshd[2068]: Invalid user ubuntu from 43.156.185.119 port 48968 Apr 12 20:34:22.713271 sshd[2068]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:22.714374 sshd[2068]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:34:22.714465 sshd[2068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:34:22.715407 sshd[2068]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:22.714000 audit[2068]: USER_AUTH pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:34:22.808515 kernel: audit: type=1100 audit(1712954062.714:202): pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:34:23.453032 sshd[2065]: Failed password for invalid user igor from 43.156.243.235 port 33400 ssh2 Apr 12 20:34:25.363872 sshd[2065]: Received disconnect from 43.156.243.235 port 33400:11: Bye Bye [preauth] Apr 12 20:34:25.363872 sshd[2065]: Disconnected from invalid user igor 43.156.243.235 port 33400 [preauth] Apr 12 20:34:25.366359 systemd[1]: sshd@14-145.40.90.201:22-43.156.243.235:33400.service: Deactivated successfully. Apr 12 20:34:25.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.201:22-43.156.243.235:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:25.459519 kernel: audit: type=1131 audit(1712954065.365:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.201:22-43.156.243.235:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:25.471586 sshd[2068]: Failed password for invalid user ubuntu from 43.156.185.119 port 48968 ssh2 Apr 12 20:34:26.505477 sshd[2068]: Received disconnect from 43.156.185.119 port 48968:11: Bye Bye [preauth] Apr 12 20:34:26.505477 sshd[2068]: Disconnected from invalid user ubuntu 43.156.185.119 port 48968 [preauth] Apr 12 20:34:26.507948 systemd[1]: sshd@15-145.40.90.201:22-43.156.185.119:48968.service: Deactivated successfully. Apr 12 20:34:26.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.201:22-43.156.185.119:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:26.600388 kernel: audit: type=1131 audit(1712954066.507:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.201:22-43.156.185.119:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:33.399495 systemd[1]: Started sshd@16-145.40.90.201:22-221.226.39.202:5598.service. Apr 12 20:34:33.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.201:22-221.226.39.202:5598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:33.491515 kernel: audit: type=1130 audit(1712954073.399:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.201:22-221.226.39.202:5598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:34.097465 systemd[1]: Started sshd@17-145.40.90.201:22-150.109.19.36:46522.service. Apr 12 20:34:34.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-150.109.19.36:46522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:34.189518 kernel: audit: type=1130 audit(1712954074.096:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-150.109.19.36:46522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:35.092302 sshd[2076]: Invalid user ada from 150.109.19.36 port 46522 Apr 12 20:34:35.098419 sshd[2076]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:35.099452 sshd[2076]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:34:35.099545 sshd[2076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 Apr 12 20:34:35.100581 sshd[2076]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:35.099000 audit[2076]: USER_AUTH pid=2076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ada" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:34:35.192324 kernel: audit: type=1100 audit(1712954075.099:207): pid=2076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ada" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:34:35.915498 sshd[2073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.39.202 user=root Apr 12 20:34:35.914000 audit[2073]: USER_AUTH pid=2073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:34:36.008376 kernel: audit: type=1100 audit(1712954075.914:208): pid=2073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:34:36.973883 sshd[2076]: Failed password for invalid user ada from 150.109.19.36 port 46522 ssh2 Apr 12 20:34:37.788863 sshd[2073]: Failed password for root from 221.226.39.202 port 5598 ssh2 Apr 12 20:34:37.919583 sshd[2076]: Received disconnect from 150.109.19.36 port 46522:11: Bye Bye [preauth] Apr 12 20:34:37.919583 sshd[2076]: Disconnected from invalid user ada 150.109.19.36 port 46522 [preauth] Apr 12 20:34:37.922059 systemd[1]: sshd@17-145.40.90.201:22-150.109.19.36:46522.service: Deactivated successfully. Apr 12 20:34:37.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-150.109.19.36:46522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:38.015507 kernel: audit: type=1131 audit(1712954077.921:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-150.109.19.36:46522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:38.396131 sshd[2073]: Received disconnect from 221.226.39.202 port 5598:11: Bye Bye [preauth] Apr 12 20:34:38.396131 sshd[2073]: Disconnected from authenticating user root 221.226.39.202 port 5598 [preauth] Apr 12 20:34:38.398795 systemd[1]: sshd@16-145.40.90.201:22-221.226.39.202:5598.service: Deactivated successfully. Apr 12 20:34:38.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.201:22-221.226.39.202:5598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:38.492518 kernel: audit: type=1131 audit(1712954078.397:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.201:22-221.226.39.202:5598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:56.220909 systemd[1]: Started sshd@18-145.40.90.201:22-124.156.205.16:38622.service. Apr 12 20:34:56.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-124.156.205.16:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:56.313394 kernel: audit: type=1130 audit(1712954096.219:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-124.156.205.16:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:57.280627 sshd[2084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 user=root Apr 12 20:34:57.279000 audit[2084]: USER_AUTH pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:34:57.373501 kernel: audit: type=1100 audit(1712954097.279:212): pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:34:57.420840 systemd[1]: Started sshd@19-145.40.90.201:22-43.128.225.10:59678.service. Apr 12 20:34:57.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-43.128.225.10:59678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:57.513325 kernel: audit: type=1130 audit(1712954097.419:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-43.128.225.10:59678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:58.260866 systemd[1]: Started sshd@20-145.40.90.201:22-49.65.101.245:49474.service. Apr 12 20:34:58.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-49.65.101.245:49474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:58.278594 sshd[2087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 user=root Apr 12 20:34:58.278637 sshd[2087]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:34:58.277000 audit[2087]: ANOM_LOGIN_FAILURES pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:58.417442 kernel: audit: type=1130 audit(1712954098.259:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-49.65.101.245:49474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:58.417473 kernel: audit: type=2100 audit(1712954098.277:215): pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:34:58.417489 kernel: audit: type=1100 audit(1712954098.277:216): pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:34:58.277000 audit[2087]: USER_AUTH pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:34:59.056239 sshd[2090]: Invalid user zope from 49.65.101.245 port 49474 Apr 12 20:34:59.062376 sshd[2090]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:59.063379 sshd[2090]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:34:59.063470 sshd[2090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:34:59.064406 sshd[2090]: pam_faillock(sshd:auth): User unknown Apr 12 20:34:59.063000 audit[2090]: USER_AUTH pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zope" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:34:59.157502 kernel: audit: type=1100 audit(1712954099.063:217): pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zope" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:34:59.841563 sshd[2084]: Failed password for root from 124.156.205.16 port 38622 ssh2 Apr 12 20:35:00.897789 sshd[2090]: Failed password for invalid user zope from 49.65.101.245 port 49474 ssh2 Apr 12 20:35:00.974899 sshd[2087]: Failed password for root from 43.128.225.10 port 59678 ssh2 Apr 12 20:35:01.963888 sshd[2090]: Received disconnect from 49.65.101.245 port 49474:11: Bye Bye [preauth] Apr 12 20:35:01.963888 sshd[2090]: Disconnected from invalid user zope 49.65.101.245 port 49474 [preauth] Apr 12 20:35:01.966340 systemd[1]: sshd@20-145.40.90.201:22-49.65.101.245:49474.service: Deactivated successfully. Apr 12 20:35:01.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-49.65.101.245:49474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:02.059514 kernel: audit: type=1131 audit(1712954101.965:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-49.65.101.245:49474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:02.140133 sshd[2084]: Received disconnect from 124.156.205.16 port 38622:11: Bye Bye [preauth] Apr 12 20:35:02.140133 sshd[2084]: Disconnected from authenticating user root 124.156.205.16 port 38622 [preauth] Apr 12 20:35:02.141064 systemd[1]: sshd@18-145.40.90.201:22-124.156.205.16:38622.service: Deactivated successfully. Apr 12 20:35:02.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-124.156.205.16:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:02.233400 kernel: audit: type=1131 audit(1712954102.139:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-124.156.205.16:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:03.116398 sshd[2087]: Received disconnect from 43.128.225.10 port 59678:11: Bye Bye [preauth] Apr 12 20:35:03.116398 sshd[2087]: Disconnected from authenticating user root 43.128.225.10 port 59678 [preauth] Apr 12 20:35:03.118933 systemd[1]: sshd@19-145.40.90.201:22-43.128.225.10:59678.service: Deactivated successfully. Apr 12 20:35:03.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-43.128.225.10:59678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:03.211507 kernel: audit: type=1131 audit(1712954103.118:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-43.128.225.10:59678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:09.917825 systemd[1]: Started sshd@21-145.40.90.201:22-104.250.50.61:60569.service. Apr 12 20:35:09.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-104.250.50.61:60569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:10.010371 kernel: audit: type=1130 audit(1712954109.916:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-104.250.50.61:60569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:13.601073 systemd[1]: Started sshd@22-145.40.90.201:22-43.128.89.189:33606.service. Apr 12 20:35:13.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.128.89.189:33606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:13.694511 kernel: audit: type=1130 audit(1712954113.599:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.128.89.189:33606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:14.600593 sshd[2100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 user=root Apr 12 20:35:14.599000 audit[2100]: USER_AUTH pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:35:14.692325 kernel: audit: type=1100 audit(1712954114.599:223): pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:35:16.825659 sshd[2100]: Failed password for root from 43.128.89.189 port 33606 ssh2 Apr 12 20:35:17.114737 sshd[2100]: Received disconnect from 43.128.89.189 port 33606:11: Bye Bye [preauth] Apr 12 20:35:17.114737 sshd[2100]: Disconnected from authenticating user root 43.128.89.189 port 33606 [preauth] Apr 12 20:35:17.117121 systemd[1]: sshd@22-145.40.90.201:22-43.128.89.189:33606.service: Deactivated successfully. Apr 12 20:35:17.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.128.89.189:33606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:17.209510 kernel: audit: type=1131 audit(1712954117.116:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.128.89.189:33606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:17.813429 systemd[1]: Started sshd@23-145.40.90.201:22-221.226.39.202:10622.service. Apr 12 20:35:17.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-221.226.39.202:10622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:17.905501 kernel: audit: type=1130 audit(1712954117.812:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-221.226.39.202:10622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:21.373713 systemd[1]: Started sshd@24-145.40.90.201:22-129.226.146.101:34138.service. Apr 12 20:35:21.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-129.226.146.101:34138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:21.466506 kernel: audit: type=1130 audit(1712954121.372:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-129.226.146.101:34138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:22.377478 sshd[2107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 user=root Apr 12 20:35:22.376000 audit[2107]: USER_AUTH pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:35:22.470503 kernel: audit: type=1100 audit(1712954122.376:227): pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:35:24.702449 sshd[2107]: Failed password for root from 129.226.146.101 port 34138 ssh2 Apr 12 20:35:24.889160 sshd[2107]: Received disconnect from 129.226.146.101 port 34138:11: Bye Bye [preauth] Apr 12 20:35:24.889160 sshd[2107]: Disconnected from authenticating user root 129.226.146.101 port 34138 [preauth] Apr 12 20:35:24.891678 systemd[1]: sshd@24-145.40.90.201:22-129.226.146.101:34138.service: Deactivated successfully. Apr 12 20:35:24.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-129.226.146.101:34138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:24.985514 kernel: audit: type=1131 audit(1712954124.890:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-129.226.146.101:34138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:28.728946 systemd[1]: Started sshd@25-145.40.90.201:22-219.152.174.29:39022.service. Apr 12 20:35:28.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-219.152.174.29:39022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:28.822518 kernel: audit: type=1130 audit(1712954128.727:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-219.152.174.29:39022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:29.670387 sshd[2111]: Invalid user slkd from 219.152.174.29 port 39022 Apr 12 20:35:29.676480 sshd[2111]: pam_faillock(sshd:auth): User unknown Apr 12 20:35:29.677590 sshd[2111]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:35:29.677681 sshd[2111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:35:29.678735 sshd[2111]: pam_faillock(sshd:auth): User unknown Apr 12 20:35:29.677000 audit[2111]: USER_AUTH pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="slkd" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:35:29.771324 kernel: audit: type=1100 audit(1712954129.677:230): pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="slkd" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:35:30.964973 sshd[2111]: Failed password for invalid user slkd from 219.152.174.29 port 39022 ssh2 Apr 12 20:35:31.496145 sshd[2111]: Received disconnect from 219.152.174.29 port 39022:11: Bye Bye [preauth] Apr 12 20:35:31.496145 sshd[2111]: Disconnected from invalid user slkd 219.152.174.29 port 39022 [preauth] Apr 12 20:35:31.498638 systemd[1]: sshd@25-145.40.90.201:22-219.152.174.29:39022.service: Deactivated successfully. Apr 12 20:35:31.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-219.152.174.29:39022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:31.592521 kernel: audit: type=1131 audit(1712954131.497:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-219.152.174.29:39022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:32.666956 systemd[1]: Started sshd@26-145.40.90.201:22-43.156.185.119:42334.service. Apr 12 20:35:32.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-43.156.185.119:42334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:32.759349 kernel: audit: type=1130 audit(1712954132.665:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-43.156.185.119:42334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:33.624782 sshd[2115]: Invalid user parking from 43.156.185.119 port 42334 Apr 12 20:35:33.630867 sshd[2115]: pam_faillock(sshd:auth): User unknown Apr 12 20:35:33.632009 sshd[2115]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:35:33.632117 sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:35:33.633052 sshd[2115]: pam_faillock(sshd:auth): User unknown Apr 12 20:35:33.631000 audit[2115]: USER_AUTH pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:35:33.726528 kernel: audit: type=1100 audit(1712954133.631:233): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:35:36.133642 sshd[2115]: Failed password for invalid user parking from 43.156.185.119 port 42334 ssh2 Apr 12 20:35:36.932257 sshd[2115]: Received disconnect from 43.156.185.119 port 42334:11: Bye Bye [preauth] Apr 12 20:35:36.932257 sshd[2115]: Disconnected from invalid user parking 43.156.185.119 port 42334 [preauth] Apr 12 20:35:36.934757 systemd[1]: sshd@26-145.40.90.201:22-43.156.185.119:42334.service: Deactivated successfully. Apr 12 20:35:36.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-43.156.185.119:42334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:37.027513 kernel: audit: type=1131 audit(1712954136.933:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-43.156.185.119:42334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:38.709308 sshd[2097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 user=root Apr 12 20:35:38.708000 audit[2097]: USER_AUTH pid=2097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:35:38.801496 kernel: audit: type=1100 audit(1712954138.708:235): pid=2097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:35:40.898551 sshd[2097]: Failed password for root from 104.250.50.61 port 60569 ssh2 Apr 12 20:35:41.041022 sshd[2097]: Received disconnect from 104.250.50.61 port 60569:11: Bye Bye [preauth] Apr 12 20:35:41.041022 sshd[2097]: Disconnected from authenticating user root 104.250.50.61 port 60569 [preauth] Apr 12 20:35:41.043581 systemd[1]: sshd@21-145.40.90.201:22-104.250.50.61:60569.service: Deactivated successfully. Apr 12 20:35:41.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-104.250.50.61:60569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:41.137517 kernel: audit: type=1131 audit(1712954141.042:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-104.250.50.61:60569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:47.506255 sshd[1951]: Timeout before authentication for 221.226.39.202 port 65312 Apr 12 20:35:47.507850 systemd[1]: sshd@3-145.40.90.201:22-221.226.39.202:65312.service: Deactivated successfully. Apr 12 20:35:47.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@3-145.40.90.201:22-221.226.39.202:65312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:47.601510 kernel: audit: type=1131 audit(1712954147.507:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@3-145.40.90.201:22-221.226.39.202:65312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:53.309791 systemd[1]: Started sshd@27-145.40.90.201:22-43.156.243.235:57960.service. Apr 12 20:35:53.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-43.156.243.235:57960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:53.403519 kernel: audit: type=1130 audit(1712954153.308:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-43.156.243.235:57960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:54.293980 sshd[2131]: Invalid user swapnil from 43.156.243.235 port 57960 Apr 12 20:35:54.300166 sshd[2131]: pam_faillock(sshd:auth): User unknown Apr 12 20:35:54.301177 sshd[2131]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:35:54.301268 sshd[2131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:35:54.302200 sshd[2131]: pam_faillock(sshd:auth): User unknown Apr 12 20:35:54.301000 audit[2131]: USER_AUTH pid=2131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="swapnil" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:35:54.395365 kernel: audit: type=1100 audit(1712954154.301:239): pid=2131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="swapnil" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:35:56.687390 sshd[2131]: Failed password for invalid user swapnil from 43.156.243.235 port 57960 ssh2 Apr 12 20:35:57.483130 sshd[2131]: Received disconnect from 43.156.243.235 port 57960:11: Bye Bye [preauth] Apr 12 20:35:57.483130 sshd[2131]: Disconnected from invalid user swapnil 43.156.243.235 port 57960 [preauth] Apr 12 20:35:57.485850 systemd[1]: sshd@27-145.40.90.201:22-43.156.243.235:57960.service: Deactivated successfully. Apr 12 20:35:57.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-43.156.243.235:57960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:57.579516 kernel: audit: type=1131 audit(1712954157.485:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-43.156.243.235:57960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.955050 systemd[1]: Started sshd@28-145.40.90.201:22-221.226.39.202:15790.service. Apr 12 20:36:00.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-221.226.39.202:15790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:01.048502 kernel: audit: type=1130 audit(1712954160.953:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-221.226.39.202:15790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.441697 systemd[1]: Started sshd@29-145.40.90.201:22-150.109.19.36:42680.service. Apr 12 20:36:07.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-150.109.19.36:42680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.534509 kernel: audit: type=1130 audit(1712954167.440:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-150.109.19.36:42680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.833271 update_engine[1453]: I0412 20:36:07.833163 1453 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 20:36:07.833271 update_engine[1453]: I0412 20:36:07.833240 1453 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 20:36:07.834185 update_engine[1453]: I0412 20:36:07.834028 1453 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 20:36:07.835195 update_engine[1453]: I0412 20:36:07.835091 1453 omaha_request_params.cc:62] Current group set to lts Apr 12 20:36:07.835446 update_engine[1453]: I0412 20:36:07.835414 1453 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 20:36:07.835446 update_engine[1453]: I0412 20:36:07.835436 1453 update_attempter.cc:643] Scheduling an action processor start. Apr 12 20:36:07.835669 update_engine[1453]: I0412 20:36:07.835467 1453 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:36:07.835669 update_engine[1453]: I0412 20:36:07.835531 1453 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 20:36:07.835862 update_engine[1453]: I0412 20:36:07.835754 1453 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:36:07.835862 update_engine[1453]: I0412 20:36:07.835775 1453 omaha_request_action.cc:271] Request: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: Apr 12 20:36:07.835862 update_engine[1453]: I0412 20:36:07.835786 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:36:07.836856 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 20:36:07.838947 update_engine[1453]: I0412 20:36:07.838871 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:36:07.839152 update_engine[1453]: E0412 20:36:07.839108 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:36:07.839293 update_engine[1453]: I0412 20:36:07.839267 1453 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 20:36:08.436787 sshd[2138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:36:08.435000 audit[2138]: USER_AUTH pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:36:08.528373 kernel: audit: type=1100 audit(1712954168.435:243): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:36:10.742077 sshd[2138]: Failed password for root from 150.109.19.36 port 42680 ssh2 Apr 12 20:36:10.949641 sshd[2138]: Received disconnect from 150.109.19.36 port 42680:11: Bye Bye [preauth] Apr 12 20:36:10.949641 sshd[2138]: Disconnected from authenticating user root 150.109.19.36 port 42680 [preauth] Apr 12 20:36:10.952120 systemd[1]: sshd@29-145.40.90.201:22-150.109.19.36:42680.service: Deactivated successfully. Apr 12 20:36:10.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-150.109.19.36:42680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:11.045388 kernel: audit: type=1131 audit(1712954170.951:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-150.109.19.36:42680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.824706 update_engine[1453]: I0412 20:36:17.824585 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:36:17.825642 update_engine[1453]: I0412 20:36:17.825062 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:36:17.825642 update_engine[1453]: E0412 20:36:17.825265 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:36:17.825642 update_engine[1453]: I0412 20:36:17.825485 1453 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 20:36:18.688181 systemd[1]: Started sshd@30-145.40.90.201:22-124.156.205.16:41798.service. Apr 12 20:36:18.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-124.156.205.16:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.781324 kernel: audit: type=1130 audit(1712954178.686:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-124.156.205.16:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:19.081483 systemd[1]: Started sshd@31-145.40.90.201:22-43.128.225.10:54702.service. Apr 12 20:36:19.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:19.174356 kernel: audit: type=1130 audit(1712954179.080:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:19.655810 sshd[2142]: Invalid user l from 124.156.205.16 port 41798 Apr 12 20:36:19.661828 sshd[2142]: pam_faillock(sshd:auth): User unknown Apr 12 20:36:19.662930 sshd[2142]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:36:19.663022 sshd[2142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:36:19.664100 sshd[2142]: pam_faillock(sshd:auth): User unknown Apr 12 20:36:19.662000 audit[2142]: USER_AUTH pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:36:19.754243 sshd[2145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 user=root Apr 12 20:36:19.752000 audit[2145]: USER_AUTH pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:36:19.846813 kernel: audit: type=1100 audit(1712954179.662:247): pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:36:19.846844 kernel: audit: type=1100 audit(1712954179.752:248): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:36:21.813607 sshd[2142]: Failed password for invalid user l from 124.156.205.16 port 41798 ssh2 Apr 12 20:36:21.903370 sshd[2145]: Failed password for root from 43.128.225.10 port 54702 ssh2 Apr 12 20:36:22.207979 sshd[2145]: Received disconnect from 43.128.225.10 port 54702:11: Bye Bye [preauth] Apr 12 20:36:22.207979 sshd[2145]: Disconnected from authenticating user root 43.128.225.10 port 54702 [preauth] Apr 12 20:36:22.210346 systemd[1]: sshd@31-145.40.90.201:22-43.128.225.10:54702.service: Deactivated successfully. Apr 12 20:36:22.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:22.303512 kernel: audit: type=1131 audit(1712954182.209:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.267800 sshd[2142]: Received disconnect from 124.156.205.16 port 41798:11: Bye Bye [preauth] Apr 12 20:36:23.267800 sshd[2142]: Disconnected from invalid user l 124.156.205.16 port 41798 [preauth] Apr 12 20:36:23.270289 systemd[1]: sshd@30-145.40.90.201:22-124.156.205.16:41798.service: Deactivated successfully. Apr 12 20:36:23.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-124.156.205.16:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.364520 kernel: audit: type=1131 audit(1712954183.269:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-124.156.205.16:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:27.823967 update_engine[1453]: I0412 20:36:27.823845 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:36:27.824806 update_engine[1453]: I0412 20:36:27.824347 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:36:27.824806 update_engine[1453]: E0412 20:36:27.824573 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:36:27.824806 update_engine[1453]: I0412 20:36:27.824744 1453 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 20:36:29.003467 systemd[1]: Started sshd@32-145.40.90.201:22-49.65.101.245:57246.service. Apr 12 20:36:29.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-49.65.101.245:57246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:29.095389 kernel: audit: type=1130 audit(1712954189.002:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-49.65.101.245:57246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:29.875668 sshd[2150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:36:29.874000 audit[2150]: USER_AUTH pid=2150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:36:29.969512 kernel: audit: type=1100 audit(1712954189.874:252): pid=2150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:36:32.065127 sshd[2150]: Failed password for root from 49.65.101.245 port 57246 ssh2 Apr 12 20:36:32.358966 sshd[2150]: Received disconnect from 49.65.101.245 port 57246:11: Bye Bye [preauth] Apr 12 20:36:32.358966 sshd[2150]: Disconnected from authenticating user root 49.65.101.245 port 57246 [preauth] Apr 12 20:36:32.361291 systemd[1]: sshd@32-145.40.90.201:22-49.65.101.245:57246.service: Deactivated successfully. Apr 12 20:36:32.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-49.65.101.245:57246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:32.455517 kernel: audit: type=1131 audit(1712954192.360:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-49.65.101.245:57246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:37.824202 update_engine[1453]: I0412 20:36:37.824084 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:36:37.825155 update_engine[1453]: I0412 20:36:37.824594 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:36:37.825155 update_engine[1453]: E0412 20:36:37.824807 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:36:37.825155 update_engine[1453]: I0412 20:36:37.824959 1453 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:36:37.825155 update_engine[1453]: I0412 20:36:37.824975 1453 omaha_request_action.cc:621] Omaha request response: Apr 12 20:36:37.825155 update_engine[1453]: E0412 20:36:37.825116 1453 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 20:36:37.825155 update_engine[1453]: I0412 20:36:37.825143 1453 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 20:36:37.825155 update_engine[1453]: I0412 20:36:37.825153 1453 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:36:37.825155 update_engine[1453]: I0412 20:36:37.825163 1453 update_attempter.cc:306] Processing Done. Apr 12 20:36:37.825984 update_engine[1453]: E0412 20:36:37.825189 1453 update_attempter.cc:619] Update failed. Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825199 1453 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825207 1453 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825217 1453 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825402 1453 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825455 1453 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825465 1453 omaha_request_action.cc:271] Request: Apr 12 20:36:37.825984 update_engine[1453]: Apr 12 20:36:37.825984 update_engine[1453]: Apr 12 20:36:37.825984 update_engine[1453]: Apr 12 20:36:37.825984 update_engine[1453]: Apr 12 20:36:37.825984 update_engine[1453]: Apr 12 20:36:37.825984 update_engine[1453]: Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825476 1453 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:36:37.825984 update_engine[1453]: I0412 20:36:37.825765 1453 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:36:37.825984 update_engine[1453]: E0412 20:36:37.825928 1453 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826061 1453 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826076 1453 omaha_request_action.cc:621] Omaha request response: Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826086 1453 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826094 1453 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826102 1453 update_attempter.cc:306] Processing Done. Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826110 1453 update_attempter.cc:310] Error event sent. Apr 12 20:36:37.827412 update_engine[1453]: I0412 20:36:37.826138 1453 update_check_scheduler.cc:74] Next update check in 45m21s Apr 12 20:36:37.828059 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 20:36:37.828059 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 20:36:43.920309 systemd[1]: Started sshd@33-145.40.90.201:22-221.226.39.202:21015.service. Apr 12 20:36:43.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-221.226.39.202:21015 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:44.013397 kernel: audit: type=1130 audit(1712954203.919:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-221.226.39.202:21015 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:51.753304 systemd[1]: Started sshd@34-145.40.90.201:22-129.226.146.101:58556.service. Apr 12 20:36:51.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-129.226.146.101:58556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:51.847519 kernel: audit: type=1130 audit(1712954211.752:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-129.226.146.101:58556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:52.767496 sshd[2158]: Invalid user ftp from 129.226.146.101 port 58556 Apr 12 20:36:52.773838 sshd[2158]: pam_faillock(sshd:auth): User unknown Apr 12 20:36:52.775045 sshd[2158]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:36:52.775137 sshd[2158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:36:52.776205 sshd[2158]: pam_faillock(sshd:auth): User unknown Apr 12 20:36:52.775000 audit[2158]: USER_AUTH pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:36:52.869555 kernel: audit: type=1100 audit(1712954212.775:256): pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:36:55.121616 sshd[2158]: Failed password for invalid user ftp from 129.226.146.101 port 58556 ssh2 Apr 12 20:36:55.267224 systemd[1]: Started sshd@35-145.40.90.201:22-219.152.174.29:60050.service. Apr 12 20:36:55.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-219.152.174.29:60050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:55.360345 kernel: audit: type=1130 audit(1712954215.265:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-219.152.174.29:60050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:56.178448 sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:36:56.177000 audit[2161]: USER_AUTH pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:36:56.271369 kernel: audit: type=1100 audit(1712954216.177:258): pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:36:57.139159 sshd[2158]: Received disconnect from 129.226.146.101 port 58556:11: Bye Bye [preauth] Apr 12 20:36:57.139159 sshd[2158]: Disconnected from invalid user ftp 129.226.146.101 port 58556 [preauth] Apr 12 20:36:57.141670 systemd[1]: sshd@34-145.40.90.201:22-129.226.146.101:58556.service: Deactivated successfully. Apr 12 20:36:57.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-129.226.146.101:58556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:57.235358 kernel: audit: type=1131 audit(1712954217.140:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-129.226.146.101:58556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:58.408049 sshd[2161]: Failed password for root from 219.152.174.29 port 60050 ssh2 Apr 12 20:36:58.677492 sshd[2161]: Received disconnect from 219.152.174.29 port 60050:11: Bye Bye [preauth] Apr 12 20:36:58.677492 sshd[2161]: Disconnected from authenticating user root 219.152.174.29 port 60050 [preauth] Apr 12 20:36:58.679935 systemd[1]: sshd@35-145.40.90.201:22-219.152.174.29:60050.service: Deactivated successfully. Apr 12 20:36:58.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-219.152.174.29:60050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:58.774519 kernel: audit: type=1131 audit(1712954218.679:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-219.152.174.29:60050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:17.818526 sshd[2104]: Timeout before authentication for 221.226.39.202 port 10622 Apr 12 20:37:17.820108 systemd[1]: sshd@23-145.40.90.201:22-221.226.39.202:10622.service: Deactivated successfully. Apr 12 20:37:17.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-221.226.39.202:10622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:17.912374 kernel: audit: type=1131 audit(1712954237.819:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-221.226.39.202:10622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:25.310385 systemd[1]: Started sshd@36-145.40.90.201:22-43.156.243.235:54282.service. Apr 12 20:37:25.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-43.156.243.235:54282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:25.403358 kernel: audit: type=1130 audit(1712954245.310:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-43.156.243.235:54282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:26.346344 sshd[2167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:37:26.346000 audit[2167]: USER_AUTH pid=2167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:37:26.439510 kernel: audit: type=1100 audit(1712954246.346:263): pid=2167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:37:26.632262 systemd[1]: Started sshd@37-145.40.90.201:22-221.226.39.202:26168.service. Apr 12 20:37:26.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:26168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:26.724652 kernel: audit: type=1130 audit(1712954246.632:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:26168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:28.360473 sshd[2167]: Failed password for root from 43.156.243.235 port 54282 ssh2 Apr 12 20:37:28.865087 sshd[2167]: Received disconnect from 43.156.243.235 port 54282:11: Bye Bye [preauth] Apr 12 20:37:28.865087 sshd[2167]: Disconnected from authenticating user root 43.156.243.235 port 54282 [preauth] Apr 12 20:37:28.867631 systemd[1]: sshd@36-145.40.90.201:22-43.156.243.235:54282.service: Deactivated successfully. Apr 12 20:37:28.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-43.156.243.235:54282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:28.961518 kernel: audit: type=1131 audit(1712954248.867:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-43.156.243.235:54282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:38.466211 systemd[1]: Started sshd@38-145.40.90.201:22-150.109.19.36:38838.service. Apr 12 20:37:38.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-150.109.19.36:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:38.560517 kernel: audit: type=1130 audit(1712954258.465:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-150.109.19.36:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:39.012560 systemd[1]: Started sshd@39-145.40.90.201:22-43.128.225.10:49730.service. Apr 12 20:37:39.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-43.128.225.10:49730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:39.106504 kernel: audit: type=1130 audit(1712954259.012:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-43.128.225.10:49730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:39.114530 systemd[1]: Started sshd@40-145.40.90.201:22-124.156.205.16:36600.service. Apr 12 20:37:39.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-124.156.205.16:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:39.207529 kernel: audit: type=1130 audit(1712954259.114:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-124.156.205.16:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:39.502173 sshd[2174]: Invalid user client from 150.109.19.36 port 38838 Apr 12 20:37:39.506614 sshd[2174]: pam_faillock(sshd:auth): User unknown Apr 12 20:37:39.507556 sshd[2174]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:37:39.507643 sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 Apr 12 20:37:39.508490 sshd[2174]: pam_faillock(sshd:auth): User unknown Apr 12 20:37:39.508000 audit[2174]: USER_AUTH pid=2174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="client" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:37:39.602514 kernel: audit: type=1100 audit(1712954259.508:269): pid=2174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="client" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:37:39.930540 sshd[2177]: Invalid user samuel from 43.128.225.10 port 49730 Apr 12 20:37:39.936731 sshd[2177]: pam_faillock(sshd:auth): User unknown Apr 12 20:37:39.937851 sshd[2177]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:37:39.937943 sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:37:39.938993 sshd[2177]: pam_faillock(sshd:auth): User unknown Apr 12 20:37:39.938000 audit[2177]: USER_AUTH pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samuel" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:37:40.032421 kernel: audit: type=1100 audit(1712954259.938:270): pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samuel" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:37:40.081333 sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 user=root Apr 12 20:37:40.081000 audit[2180]: USER_AUTH pid=2180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:37:40.172504 kernel: audit: type=1100 audit(1712954260.081:271): pid=2180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:37:41.642605 sshd[2174]: Failed password for invalid user client from 150.109.19.36 port 38838 ssh2 Apr 12 20:37:42.073123 sshd[2177]: Failed password for invalid user samuel from 43.128.225.10 port 49730 ssh2 Apr 12 20:37:42.351142 sshd[2180]: Failed password for root from 124.156.205.16 port 36600 ssh2 Apr 12 20:37:42.590992 sshd[2180]: Received disconnect from 124.156.205.16 port 36600:11: Bye Bye [preauth] Apr 12 20:37:42.590992 sshd[2180]: Disconnected from authenticating user root 124.156.205.16 port 36600 [preauth] Apr 12 20:37:42.593563 systemd[1]: sshd@40-145.40.90.201:22-124.156.205.16:36600.service: Deactivated successfully. Apr 12 20:37:42.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-124.156.205.16:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:42.687511 kernel: audit: type=1131 audit(1712954262.593:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-124.156.205.16:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:43.891177 sshd[2174]: Received disconnect from 150.109.19.36 port 38838:11: Bye Bye [preauth] Apr 12 20:37:43.891177 sshd[2174]: Disconnected from invalid user client 150.109.19.36 port 38838 [preauth] Apr 12 20:37:43.893711 systemd[1]: sshd@38-145.40.90.201:22-150.109.19.36:38838.service: Deactivated successfully. Apr 12 20:37:43.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-150.109.19.36:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:43.903589 sshd[2177]: Received disconnect from 43.128.225.10 port 49730:11: Bye Bye [preauth] Apr 12 20:37:43.903589 sshd[2177]: Disconnected from invalid user samuel 43.128.225.10 port 49730 [preauth] Apr 12 20:37:43.904068 systemd[1]: sshd@39-145.40.90.201:22-43.128.225.10:49730.service: Deactivated successfully. Apr 12 20:37:43.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-43.128.225.10:49730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:44.079885 kernel: audit: type=1131 audit(1712954263.893:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-150.109.19.36:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:44.079920 kernel: audit: type=1131 audit(1712954263.903:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-43.128.225.10:49730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:57.220799 systemd[1]: Started sshd@41-145.40.90.201:22-49.65.101.245:51624.service. Apr 12 20:37:57.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-49.65.101.245:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:57.314454 kernel: audit: type=1130 audit(1712954277.220:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-49.65.101.245:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:58.019864 sshd[2190]: Invalid user webdb from 49.65.101.245 port 51624 Apr 12 20:37:58.025905 sshd[2190]: pam_faillock(sshd:auth): User unknown Apr 12 20:37:58.027000 sshd[2190]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:37:58.027092 sshd[2190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:37:58.028171 sshd[2190]: pam_faillock(sshd:auth): User unknown Apr 12 20:37:58.028000 audit[2190]: USER_AUTH pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="webdb" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:37:58.121400 kernel: audit: type=1100 audit(1712954278.028:276): pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="webdb" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:38:00.102457 sshd[2190]: Failed password for invalid user webdb from 49.65.101.245 port 51624 ssh2 Apr 12 20:38:00.461719 sshd[2190]: Received disconnect from 49.65.101.245 port 51624:11: Bye Bye [preauth] Apr 12 20:38:00.461719 sshd[2190]: Disconnected from invalid user webdb 49.65.101.245 port 51624 [preauth] Apr 12 20:38:00.464174 systemd[1]: sshd@41-145.40.90.201:22-49.65.101.245:51624.service: Deactivated successfully. Apr 12 20:38:00.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-49.65.101.245:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:00.558519 kernel: audit: type=1131 audit(1712954280.464:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-49.65.101.245:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:00.960230 sshd[2135]: Timeout before authentication for 221.226.39.202 port 15790 Apr 12 20:38:00.961791 systemd[1]: sshd@28-145.40.90.201:22-221.226.39.202:15790.service: Deactivated successfully. Apr 12 20:38:00.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-221.226.39.202:15790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:01.055516 kernel: audit: type=1131 audit(1712954280.961:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-221.226.39.202:15790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:07.695206 systemd[1]: Started sshd@42-145.40.90.201:22-104.250.50.61:55028.service. Apr 12 20:38:07.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-104.250.50.61:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:07.788517 kernel: audit: type=1130 audit(1712954287.694:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-104.250.50.61:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:08.659155 sshd[2195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 user=root Apr 12 20:38:08.658000 audit[2195]: USER_AUTH pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:38:08.752503 kernel: audit: type=1100 audit(1712954288.658:280): pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:38:10.436605 sshd[2195]: Failed password for root from 104.250.50.61 port 55028 ssh2 Apr 12 20:38:11.160667 sshd[2195]: Received disconnect from 104.250.50.61 port 55028:11: Bye Bye [preauth] Apr 12 20:38:11.160667 sshd[2195]: Disconnected from authenticating user root 104.250.50.61 port 55028 [preauth] Apr 12 20:38:11.163134 systemd[1]: sshd@42-145.40.90.201:22-104.250.50.61:55028.service: Deactivated successfully. Apr 12 20:38:11.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-104.250.50.61:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:11.257527 kernel: audit: type=1131 audit(1712954291.162:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-104.250.50.61:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:14.969346 systemd[1]: Started sshd@43-145.40.90.201:22-221.226.39.202:31416.service. Apr 12 20:38:14.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-221.226.39.202:31416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:15.062515 kernel: audit: type=1130 audit(1712954294.968:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-221.226.39.202:31416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:20.791577 systemd[1]: Started sshd@44-145.40.90.201:22-219.152.174.29:52850.service. Apr 12 20:38:20.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-219.152.174.29:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:20.885500 kernel: audit: type=1130 audit(1712954300.790:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-219.152.174.29:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:21.336962 systemd[1]: Started sshd@45-145.40.90.201:22-129.226.146.101:54738.service. Apr 12 20:38:21.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-129.226.146.101:54738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:21.430523 kernel: audit: type=1130 audit(1712954301.335:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-129.226.146.101:54738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:21.784217 sshd[2202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:38:21.782000 audit[2202]: USER_AUTH pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:38:21.876392 kernel: audit: type=1100 audit(1712954301.782:285): pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:38:22.342541 sshd[2205]: Invalid user www from 129.226.146.101 port 54738 Apr 12 20:38:22.348833 sshd[2205]: pam_faillock(sshd:auth): User unknown Apr 12 20:38:22.350029 sshd[2205]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:38:22.350126 sshd[2205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:38:22.351252 sshd[2205]: pam_faillock(sshd:auth): User unknown Apr 12 20:38:22.350000 audit[2205]: USER_AUTH pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:38:22.444397 kernel: audit: type=1100 audit(1712954302.350:286): pid=2205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:38:24.013561 sshd[2202]: Failed password for root from 219.152.174.29 port 52850 ssh2 Apr 12 20:38:24.298488 sshd[2202]: Received disconnect from 219.152.174.29 port 52850:11: Bye Bye [preauth] Apr 12 20:38:24.298488 sshd[2202]: Disconnected from authenticating user root 219.152.174.29 port 52850 [preauth] Apr 12 20:38:24.300943 systemd[1]: sshd@44-145.40.90.201:22-219.152.174.29:52850.service: Deactivated successfully. Apr 12 20:38:24.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-219.152.174.29:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:24.395530 kernel: audit: type=1131 audit(1712954304.300:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-219.152.174.29:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:24.721486 sshd[2205]: Failed password for invalid user www from 129.226.146.101 port 54738 ssh2 Apr 12 20:38:27.194275 sshd[2205]: Received disconnect from 129.226.146.101 port 54738:11: Bye Bye [preauth] Apr 12 20:38:27.194275 sshd[2205]: Disconnected from invalid user www 129.226.146.101 port 54738 [preauth] Apr 12 20:38:27.196771 systemd[1]: sshd@45-145.40.90.201:22-129.226.146.101:54738.service: Deactivated successfully. Apr 12 20:38:27.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-129.226.146.101:54738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:27.290513 kernel: audit: type=1131 audit(1712954307.195:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-129.226.146.101:54738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:43.925753 sshd[2155]: Timeout before authentication for 221.226.39.202 port 21015 Apr 12 20:38:43.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-221.226.39.202:21015 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:43.927396 systemd[1]: sshd@33-145.40.90.201:22-221.226.39.202:21015.service: Deactivated successfully. Apr 12 20:38:44.021506 kernel: audit: type=1131 audit(1712954323.926:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-221.226.39.202:21015 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:56.356166 systemd[1]: Started sshd@46-145.40.90.201:22-43.156.243.235:50614.service. Apr 12 20:38:56.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.156.243.235:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:56.449468 kernel: audit: type=1130 audit(1712954336.354:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.156.243.235:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:57.367167 sshd[2215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:38:57.366000 audit[2215]: ANOM_LOGIN_FAILURES pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:57.367436 sshd[2215]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:38:57.366000 audit[2215]: USER_AUTH pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:38:57.524376 kernel: audit: type=2100 audit(1712954337.366:291): pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:57.524408 kernel: audit: type=1100 audit(1712954337.366:292): pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:38:59.541714 sshd[2215]: Failed password for root from 43.156.243.235 port 50614 ssh2 Apr 12 20:38:59.882215 sshd[2215]: Received disconnect from 43.156.243.235 port 50614:11: Bye Bye [preauth] Apr 12 20:38:59.882215 sshd[2215]: Disconnected from authenticating user root 43.156.243.235 port 50614 [preauth] Apr 12 20:38:59.884674 systemd[1]: sshd@46-145.40.90.201:22-43.156.243.235:50614.service: Deactivated successfully. Apr 12 20:38:59.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.156.243.235:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:38:59.978517 kernel: audit: type=1131 audit(1712954339.883:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.156.243.235:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:00.081367 systemd[1]: Started sshd@47-145.40.90.201:22-221.226.39.202:36477.service. Apr 12 20:39:00.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-221.226.39.202:36477 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:00.174340 kernel: audit: type=1130 audit(1712954340.080:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-221.226.39.202:36477 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:00.950814 sshd[2219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.39.202 user=root Apr 12 20:39:00.949000 audit[2219]: USER_AUTH pid=2219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:39:01.044516 kernel: audit: type=1100 audit(1712954340.949:295): pid=2219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:39:02.869550 sshd[2219]: Failed password for root from 221.226.39.202 port 36477 ssh2 Apr 12 20:39:03.432749 sshd[2219]: Received disconnect from 221.226.39.202 port 36477:11: Bye Bye [preauth] Apr 12 20:39:03.432749 sshd[2219]: Disconnected from authenticating user root 221.226.39.202 port 36477 [preauth] Apr 12 20:39:03.435269 systemd[1]: sshd@47-145.40.90.201:22-221.226.39.202:36477.service: Deactivated successfully. Apr 12 20:39:03.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-221.226.39.202:36477 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:03.529517 kernel: audit: type=1131 audit(1712954343.434:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-221.226.39.202:36477 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:10.672991 systemd[1]: Started sshd@48-145.40.90.201:22-150.109.19.36:34986.service. Apr 12 20:39:10.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-150.109.19.36:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:10.766378 kernel: audit: type=1130 audit(1712954350.671:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-150.109.19.36:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:11.685290 sshd[2225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:39:11.684000 audit[2225]: USER_AUTH pid=2225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:39:11.778508 kernel: audit: type=1100 audit(1712954351.684:298): pid=2225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:39:13.448365 sshd[2225]: Failed password for root from 150.109.19.36 port 34986 ssh2 Apr 12 20:39:14.194572 sshd[2225]: Received disconnect from 150.109.19.36 port 34986:11: Bye Bye [preauth] Apr 12 20:39:14.194572 sshd[2225]: Disconnected from authenticating user root 150.109.19.36 port 34986 [preauth] Apr 12 20:39:14.197067 systemd[1]: sshd@48-145.40.90.201:22-150.109.19.36:34986.service: Deactivated successfully. Apr 12 20:39:14.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-150.109.19.36:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:14.291498 kernel: audit: type=1131 audit(1712954354.196:299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-150.109.19.36:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:26.637775 sshd[2170]: Timeout before authentication for 221.226.39.202 port 26168 Apr 12 20:39:26.639298 systemd[1]: sshd@37-145.40.90.201:22-221.226.39.202:26168.service: Deactivated successfully. Apr 12 20:39:26.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:26168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:26.732511 kernel: audit: type=1131 audit(1712954366.638:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:26168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:30.543906 systemd[1]: Started sshd@49-145.40.90.201:22-49.65.101.245:59162.service. Apr 12 20:39:30.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-49.65.101.245:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:30.637517 kernel: audit: type=1130 audit(1712954370.542:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-49.65.101.245:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:31.344030 sshd[2231]: Invalid user noxon from 49.65.101.245 port 59162 Apr 12 20:39:31.350233 sshd[2231]: pam_faillock(sshd:auth): User unknown Apr 12 20:39:31.351311 sshd[2231]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:39:31.351426 sshd[2231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:39:31.352298 sshd[2231]: pam_faillock(sshd:auth): User unknown Apr 12 20:39:31.351000 audit[2231]: USER_AUTH pid=2231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="noxon" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:39:31.445516 kernel: audit: type=1100 audit(1712954371.351:302): pid=2231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="noxon" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:39:33.526878 sshd[2231]: Failed password for invalid user noxon from 49.65.101.245 port 59162 ssh2 Apr 12 20:39:33.816448 sshd[2231]: Received disconnect from 49.65.101.245 port 59162:11: Bye Bye [preauth] Apr 12 20:39:33.816448 sshd[2231]: Disconnected from invalid user noxon 49.65.101.245 port 59162 [preauth] Apr 12 20:39:33.818884 systemd[1]: sshd@49-145.40.90.201:22-49.65.101.245:59162.service: Deactivated successfully. Apr 12 20:39:33.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-49.65.101.245:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:33.912409 kernel: audit: type=1131 audit(1712954373.818:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-49.65.101.245:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:48.009080 systemd[1]: Started sshd@50-145.40.90.201:22-219.152.174.29:45646.service. Apr 12 20:39:48.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-219.152.174.29:45646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:48.102517 kernel: audit: type=1130 audit(1712954388.007:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-219.152.174.29:45646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:48.955919 sshd[2235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:39:48.954000 audit[2235]: USER_AUTH pid=2235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:39:49.049505 kernel: audit: type=1100 audit(1712954388.954:305): pid=2235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:39:50.463097 sshd[2235]: Failed password for root from 219.152.174.29 port 45646 ssh2 Apr 12 20:39:51.287999 systemd[1]: Started sshd@51-145.40.90.201:22-129.226.146.101:50918.service. Apr 12 20:39:51.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-129.226.146.101:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:51.381513 kernel: audit: type=1130 audit(1712954391.286:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-129.226.146.101:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:51.455056 sshd[2235]: Received disconnect from 219.152.174.29 port 45646:11: Bye Bye [preauth] Apr 12 20:39:51.455056 sshd[2235]: Disconnected from authenticating user root 219.152.174.29 port 45646 [preauth] Apr 12 20:39:51.455902 systemd[1]: sshd@50-145.40.90.201:22-219.152.174.29:45646.service: Deactivated successfully. Apr 12 20:39:51.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-219.152.174.29:45646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:51.548325 kernel: audit: type=1131 audit(1712954391.454:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-219.152.174.29:45646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:52.336391 sshd[2238]: Invalid user maximo from 129.226.146.101 port 50918 Apr 12 20:39:52.342507 sshd[2238]: pam_faillock(sshd:auth): User unknown Apr 12 20:39:52.343681 sshd[2238]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:39:52.343698 sshd[2238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:39:52.343963 sshd[2238]: pam_faillock(sshd:auth): User unknown Apr 12 20:39:52.342000 audit[2238]: USER_AUTH pid=2238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="maximo" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:39:52.437516 kernel: audit: type=1100 audit(1712954392.342:308): pid=2238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="maximo" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:39:55.070027 sshd[2238]: Failed password for invalid user maximo from 129.226.146.101 port 50918 ssh2 Apr 12 20:39:55.340508 sshd[2238]: Received disconnect from 129.226.146.101 port 50918:11: Bye Bye [preauth] Apr 12 20:39:55.340508 sshd[2238]: Disconnected from invalid user maximo 129.226.146.101 port 50918 [preauth] Apr 12 20:39:55.342945 systemd[1]: sshd@51-145.40.90.201:22-129.226.146.101:50918.service: Deactivated successfully. Apr 12 20:39:55.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-129.226.146.101:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:39:55.436519 kernel: audit: type=1131 audit(1712954395.342:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-129.226.146.101:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:14.974793 sshd[2199]: Timeout before authentication for 221.226.39.202 port 31416 Apr 12 20:40:14.976405 systemd[1]: sshd@43-145.40.90.201:22-221.226.39.202:31416.service: Deactivated successfully. Apr 12 20:40:14.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-221.226.39.202:31416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:15.070412 kernel: audit: type=1131 audit(1712954414.975:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-221.226.39.202:31416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:29.436268 systemd[1]: Started sshd@52-145.40.90.201:22-43.156.243.235:46936.service. Apr 12 20:40:29.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-43.156.243.235:46936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:29.529511 kernel: audit: type=1130 audit(1712954429.435:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-43.156.243.235:46936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:30.455921 sshd[2250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:40:30.454000 audit[2250]: ANOM_LOGIN_FAILURES pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:30.456163 sshd[2250]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:40:30.454000 audit[2250]: USER_AUTH pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:40:30.612802 kernel: audit: type=2100 audit(1712954430.454:312): pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:30.612833 kernel: audit: type=1100 audit(1712954430.454:313): pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:40:32.730952 sshd[2250]: Failed password for root from 43.156.243.235 port 46936 ssh2 Apr 12 20:40:32.971969 sshd[2250]: Received disconnect from 43.156.243.235 port 46936:11: Bye Bye [preauth] Apr 12 20:40:32.971969 sshd[2250]: Disconnected from authenticating user root 43.156.243.235 port 46936 [preauth] Apr 12 20:40:32.974540 systemd[1]: sshd@52-145.40.90.201:22-43.156.243.235:46936.service: Deactivated successfully. Apr 12 20:40:32.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-43.156.243.235:46936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:33.068518 kernel: audit: type=1131 audit(1712954432.973:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-43.156.243.235:46936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:46.857946 systemd[1]: Started sshd@53-145.40.90.201:22-150.109.19.36:59378.service. Apr 12 20:40:46.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-150.109.19.36:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:46.951494 kernel: audit: type=1130 audit(1712954446.856:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-150.109.19.36:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:47.878819 sshd[2255]: Invalid user vnc from 150.109.19.36 port 59378 Apr 12 20:40:47.885051 sshd[2255]: pam_faillock(sshd:auth): User unknown Apr 12 20:40:47.886050 sshd[2255]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:40:47.886142 sshd[2255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 Apr 12 20:40:47.887186 sshd[2255]: pam_faillock(sshd:auth): User unknown Apr 12 20:40:47.886000 audit[2255]: USER_AUTH pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vnc" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:40:47.980516 kernel: audit: type=1100 audit(1712954447.886:316): pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vnc" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:40:50.162091 sshd[2255]: Failed password for invalid user vnc from 150.109.19.36 port 59378 ssh2 Apr 12 20:40:51.574805 sshd[2255]: Received disconnect from 150.109.19.36 port 59378:11: Bye Bye [preauth] Apr 12 20:40:51.574805 sshd[2255]: Disconnected from invalid user vnc 150.109.19.36 port 59378 [preauth] Apr 12 20:40:51.577441 systemd[1]: sshd@53-145.40.90.201:22-150.109.19.36:59378.service: Deactivated successfully. Apr 12 20:40:51.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-150.109.19.36:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:51.672501 kernel: audit: type=1131 audit(1712954451.576:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-150.109.19.36:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:40:59.981789 systemd[1]: Started sshd@54-145.40.90.201:22-49.65.101.245:46690.service. Apr 12 20:40:59.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-49.65.101.245:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:00.075512 kernel: audit: type=1130 audit(1712954459.980:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-49.65.101.245:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:00.819076 sshd[2260]: Invalid user wangdd from 49.65.101.245 port 46690 Apr 12 20:41:00.825200 sshd[2260]: pam_faillock(sshd:auth): User unknown Apr 12 20:41:00.826247 sshd[2260]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:41:00.826354 sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:41:00.827294 sshd[2260]: pam_faillock(sshd:auth): User unknown Apr 12 20:41:00.826000 audit[2260]: USER_AUTH pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wangdd" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:41:00.920393 kernel: audit: type=1100 audit(1712954460.826:319): pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wangdd" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:41:02.886508 sshd[2260]: Failed password for invalid user wangdd from 49.65.101.245 port 46690 ssh2 Apr 12 20:41:04.387206 sshd[2260]: Received disconnect from 49.65.101.245 port 46690:11: Bye Bye [preauth] Apr 12 20:41:04.387206 sshd[2260]: Disconnected from invalid user wangdd 49.65.101.245 port 46690 [preauth] Apr 12 20:41:04.389777 systemd[1]: sshd@54-145.40.90.201:22-49.65.101.245:46690.service: Deactivated successfully. Apr 12 20:41:04.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-49.65.101.245:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:04.483378 kernel: audit: type=1131 audit(1712954464.388:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-49.65.101.245:46690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:06.292128 systemd[1]: Started sshd@55-145.40.90.201:22-104.250.50.61:49177.service. Apr 12 20:41:06.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-104.250.50.61:49177 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:06.385343 kernel: audit: type=1130 audit(1712954466.290:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-104.250.50.61:49177 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:07.894722 sshd[2264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 user=root Apr 12 20:41:07.893000 audit[2264]: USER_AUTH pid=2264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:41:07.986481 kernel: audit: type=1100 audit(1712954467.893:322): pid=2264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:41:09.913964 sshd[2264]: Failed password for root from 104.250.50.61 port 49177 ssh2 Apr 12 20:41:10.379357 sshd[2264]: Received disconnect from 104.250.50.61 port 49177:11: Bye Bye [preauth] Apr 12 20:41:10.379357 sshd[2264]: Disconnected from authenticating user root 104.250.50.61 port 49177 [preauth] Apr 12 20:41:10.381920 systemd[1]: sshd@55-145.40.90.201:22-104.250.50.61:49177.service: Deactivated successfully. Apr 12 20:41:10.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-104.250.50.61:49177 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:10.475391 kernel: audit: type=1131 audit(1712954470.381:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-104.250.50.61:49177 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:14.041972 systemd[1]: Started sshd@56-145.40.90.201:22-219.152.174.29:38442.service. Apr 12 20:41:14.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-219.152.174.29:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:14.135437 kernel: audit: type=1130 audit(1712954474.041:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-219.152.174.29:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:15.132850 sshd[2270]: Invalid user market from 219.152.174.29 port 38442 Apr 12 20:41:15.138997 sshd[2270]: pam_faillock(sshd:auth): User unknown Apr 12 20:41:15.140128 sshd[2270]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:41:15.140221 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:41:15.141178 sshd[2270]: pam_faillock(sshd:auth): User unknown Apr 12 20:41:15.141000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="market" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:41:15.235519 kernel: audit: type=1100 audit(1712954475.141:325): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="market" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:41:17.591921 sshd[2270]: Failed password for invalid user market from 219.152.174.29 port 38442 ssh2 Apr 12 20:41:18.215152 sshd[2270]: Received disconnect from 219.152.174.29 port 38442:11: Bye Bye [preauth] Apr 12 20:41:18.215152 sshd[2270]: Disconnected from invalid user market 219.152.174.29 port 38442 [preauth] Apr 12 20:41:18.217728 systemd[1]: sshd@56-145.40.90.201:22-219.152.174.29:38442.service: Deactivated successfully. Apr 12 20:41:18.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-219.152.174.29:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:18.310508 kernel: audit: type=1131 audit(1712954478.217:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-219.152.174.29:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:23.891170 systemd[1]: Started sshd@57-145.40.90.201:22-139.19.117.129:54686.service. Apr 12 20:41:23.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-139.19.117.129:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:23.985515 kernel: audit: type=1130 audit(1712954483.890:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-139.19.117.129:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:33.883265 sshd[2276]: Connection closed by authenticating user root 139.19.117.129 port 54686 [preauth] Apr 12 20:41:33.883000 audit[2276]: USER_ERR pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=139.19.117.129 addr=139.19.117.129 terminal=ssh res=failed' Apr 12 20:41:33.886038 systemd[1]: sshd@57-145.40.90.201:22-139.19.117.129:54686.service: Deactivated successfully. Apr 12 20:41:33.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-139.19.117.129:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:41:33.976328 kernel: audit: type=1109 audit(1712954493.883:328): pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=139.19.117.129 addr=139.19.117.129 terminal=ssh res=failed' Apr 12 20:41:33.976421 kernel: audit: type=1131 audit(1712954493.886:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-139.19.117.129:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:03.613485 systemd[1]: Started sshd@58-145.40.90.201:22-43.156.243.235:43260.service. Apr 12 20:42:03.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-43.156.243.235:43260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:03.707512 kernel: audit: type=1130 audit(1712954523.613:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-43.156.243.235:43260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:04.619488 sshd[2282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:42:04.619000 audit[2282]: USER_AUTH pid=2282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:42:04.711396 kernel: audit: type=1100 audit(1712954524.619:331): pid=2282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:42:06.799020 sshd[2282]: Failed password for root from 43.156.243.235 port 43260 ssh2 Apr 12 20:42:07.128644 sshd[2282]: Received disconnect from 43.156.243.235 port 43260:11: Bye Bye [preauth] Apr 12 20:42:07.128644 sshd[2282]: Disconnected from authenticating user root 43.156.243.235 port 43260 [preauth] Apr 12 20:42:07.131126 systemd[1]: sshd@58-145.40.90.201:22-43.156.243.235:43260.service: Deactivated successfully. Apr 12 20:42:07.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-43.156.243.235:43260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:07.225512 kernel: audit: type=1131 audit(1712954527.131:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-43.156.243.235:43260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:28.464991 systemd[1]: Started sshd@59-145.40.90.201:22-49.65.101.245:40344.service. Apr 12 20:42:28.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-49.65.101.245:40344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:28.557329 kernel: audit: type=1130 audit(1712954548.464:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-49.65.101.245:40344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:29.294508 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:42:29.294000 audit[2286]: USER_AUTH pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:42:29.387502 kernel: audit: type=1100 audit(1712954549.294:334): pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:42:30.570804 sshd[2286]: Failed password for root from 49.65.101.245 port 40344 ssh2 Apr 12 20:42:31.772429 sshd[2286]: Received disconnect from 49.65.101.245 port 40344:11: Bye Bye [preauth] Apr 12 20:42:31.772429 sshd[2286]: Disconnected from authenticating user root 49.65.101.245 port 40344 [preauth] Apr 12 20:42:31.775042 systemd[1]: sshd@59-145.40.90.201:22-49.65.101.245:40344.service: Deactivated successfully. Apr 12 20:42:31.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-49.65.101.245:40344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:31.868513 kernel: audit: type=1131 audit(1712954551.775:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-49.65.101.245:40344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:39.646623 systemd[1]: Started sshd@60-145.40.90.201:22-219.152.174.29:59472.service. Apr 12 20:42:39.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-219.152.174.29:59472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:39.739324 kernel: audit: type=1130 audit(1712954559.646:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-219.152.174.29:59472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:40.601436 sshd[2291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:42:40.601000 audit[2291]: USER_AUTH pid=2291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:42:40.694497 kernel: audit: type=1100 audit(1712954560.601:337): pid=2291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:42:42.389582 sshd[2291]: Failed password for root from 219.152.174.29 port 59472 ssh2 Apr 12 20:42:43.106798 sshd[2291]: Received disconnect from 219.152.174.29 port 59472:11: Bye Bye [preauth] Apr 12 20:42:43.106798 sshd[2291]: Disconnected from authenticating user root 219.152.174.29 port 59472 [preauth] Apr 12 20:42:43.109364 systemd[1]: sshd@60-145.40.90.201:22-219.152.174.29:59472.service: Deactivated successfully. Apr 12 20:42:43.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-219.152.174.29:59472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:43.202508 kernel: audit: type=1131 audit(1712954563.109:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-219.152.174.29:59472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:43:43.036030 systemd[1]: Started sshd@61-145.40.90.201:22-43.156.243.235:39606.service. Apr 12 20:43:43.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:39606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:43:43.129511 kernel: audit: type=1130 audit(1712954623.035:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:39606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:43:44.050938 sshd[2295]: Invalid user parking from 43.156.243.235 port 39606 Apr 12 20:43:44.057238 sshd[2295]: pam_faillock(sshd:auth): User unknown Apr 12 20:43:44.058272 sshd[2295]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:43:44.058387 sshd[2295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:43:44.059278 sshd[2295]: pam_faillock(sshd:auth): User unknown Apr 12 20:43:44.059000 audit[2295]: USER_AUTH pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:43:44.153508 kernel: audit: type=1100 audit(1712954624.059:340): pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:43:45.967640 sshd[2295]: Failed password for invalid user parking from 43.156.243.235 port 39606 ssh2 Apr 12 20:43:47.366165 sshd[2295]: Received disconnect from 43.156.243.235 port 39606:11: Bye Bye [preauth] Apr 12 20:43:47.366165 sshd[2295]: Disconnected from invalid user parking 43.156.243.235 port 39606 [preauth] Apr 12 20:43:47.368740 systemd[1]: sshd@61-145.40.90.201:22-43.156.243.235:39606.service: Deactivated successfully. Apr 12 20:43:47.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:39606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:43:47.463428 kernel: audit: type=1131 audit(1712954627.368:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:39606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:03.503748 systemd[1]: Started sshd@62-145.40.90.201:22-219.152.174.29:52268.service. Apr 12 20:44:03.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-219.152.174.29:52268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:03.597517 kernel: audit: type=1130 audit(1712954643.503:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-219.152.174.29:52268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:03.702412 systemd[1]: Started sshd@63-145.40.90.201:22-49.65.101.245:36194.service. Apr 12 20:44:03.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-49.65.101.245:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:03.795367 kernel: audit: type=1130 audit(1712954643.702:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-49.65.101.245:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:04.517929 sshd[2304]: Invalid user jsalt2020 from 49.65.101.245 port 36194 Apr 12 20:44:04.520897 sshd[2301]: Invalid user sz from 219.152.174.29 port 52268 Apr 12 20:44:04.524236 sshd[2304]: pam_faillock(sshd:auth): User unknown Apr 12 20:44:04.526564 sshd[2304]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:44:04.526602 sshd[2304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:44:04.526761 sshd[2301]: pam_faillock(sshd:auth): User unknown Apr 12 20:44:04.526916 sshd[2304]: pam_faillock(sshd:auth): User unknown Apr 12 20:44:04.526000 audit[2304]: USER_AUTH pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jsalt2020" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:44:04.527013 sshd[2301]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:44:04.527029 sshd[2301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:44:04.527213 sshd[2301]: pam_faillock(sshd:auth): User unknown Apr 12 20:44:04.526000 audit[2301]: USER_AUTH pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sz" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:44:04.709410 kernel: audit: type=1100 audit(1712954644.526:344): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jsalt2020" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:44:04.709441 kernel: audit: type=1100 audit(1712954644.526:345): pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sz" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:44:06.099283 systemd[1]: Started sshd@64-145.40.90.201:22-104.250.50.61:43462.service. Apr 12 20:44:06.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-104.250.50.61:43462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:06.192510 kernel: audit: type=1130 audit(1712954646.099:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-104.250.50.61:43462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:06.846603 sshd[2301]: Failed password for invalid user sz from 219.152.174.29 port 52268 ssh2 Apr 12 20:44:06.847453 sshd[2304]: Failed password for invalid user jsalt2020 from 49.65.101.245 port 36194 ssh2 Apr 12 20:44:07.993646 sshd[2301]: Received disconnect from 219.152.174.29 port 52268:11: Bye Bye [preauth] Apr 12 20:44:07.993646 sshd[2301]: Disconnected from invalid user sz 219.152.174.29 port 52268 [preauth] Apr 12 20:44:07.996426 systemd[1]: sshd@62-145.40.90.201:22-219.152.174.29:52268.service: Deactivated successfully. Apr 12 20:44:07.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-219.152.174.29:52268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:08.090517 kernel: audit: type=1131 audit(1712954647.996:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-219.152.174.29:52268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:08.667632 sshd[2304]: Received disconnect from 49.65.101.245 port 36194:11: Bye Bye [preauth] Apr 12 20:44:08.667632 sshd[2304]: Disconnected from invalid user jsalt2020 49.65.101.245 port 36194 [preauth] Apr 12 20:44:08.670235 systemd[1]: sshd@63-145.40.90.201:22-49.65.101.245:36194.service: Deactivated successfully. Apr 12 20:44:08.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-49.65.101.245:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:08.764514 kernel: audit: type=1131 audit(1712954648.670:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-49.65.101.245:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:15.758316 sshd[2311]: Invalid user fanjiahui from 104.250.50.61 port 43462 Apr 12 20:44:15.764398 sshd[2311]: pam_faillock(sshd:auth): User unknown Apr 12 20:44:15.765467 sshd[2311]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:44:15.765559 sshd[2311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 Apr 12 20:44:15.766645 sshd[2311]: pam_faillock(sshd:auth): User unknown Apr 12 20:44:15.765000 audit[2311]: USER_AUTH pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:44:15.861530 kernel: audit: type=1100 audit(1712954655.765:349): pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:44:17.930700 sshd[2311]: Failed password for invalid user fanjiahui from 104.250.50.61 port 43462 ssh2 Apr 12 20:44:19.337568 sshd[2311]: Received disconnect from 104.250.50.61 port 43462:11: Bye Bye [preauth] Apr 12 20:44:19.337568 sshd[2311]: Disconnected from invalid user fanjiahui 104.250.50.61 port 43462 [preauth] Apr 12 20:44:19.340112 systemd[1]: sshd@64-145.40.90.201:22-104.250.50.61:43462.service: Deactivated successfully. Apr 12 20:44:19.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-104.250.50.61:43462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:44:19.433344 kernel: audit: type=1131 audit(1712954659.339:350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-104.250.50.61:43462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:30.156596 systemd[1]: Started sshd@65-145.40.90.201:22-219.152.174.29:45066.service. Apr 12 20:45:30.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-219.152.174.29:45066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:30.250379 kernel: audit: type=1130 audit(1712954730.155:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-219.152.174.29:45066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:31.121021 sshd[2317]: Invalid user lin from 219.152.174.29 port 45066 Apr 12 20:45:31.127246 sshd[2317]: pam_faillock(sshd:auth): User unknown Apr 12 20:45:31.128251 sshd[2317]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:45:31.128375 sshd[2317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:45:31.129280 sshd[2317]: pam_faillock(sshd:auth): User unknown Apr 12 20:45:31.128000 audit[2317]: USER_AUTH pid=2317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lin" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:45:31.222520 kernel: audit: type=1100 audit(1712954731.128:352): pid=2317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lin" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:45:33.057730 sshd[2317]: Failed password for invalid user lin from 219.152.174.29 port 45066 ssh2 Apr 12 20:45:33.356131 sshd[2317]: Received disconnect from 219.152.174.29 port 45066:11: Bye Bye [preauth] Apr 12 20:45:33.356131 sshd[2317]: Disconnected from invalid user lin 219.152.174.29 port 45066 [preauth] Apr 12 20:45:33.358655 systemd[1]: sshd@65-145.40.90.201:22-219.152.174.29:45066.service: Deactivated successfully. Apr 12 20:45:33.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-219.152.174.29:45066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:33.452326 kernel: audit: type=1131 audit(1712954733.357:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-219.152.174.29:45066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:38.235683 systemd[1]: Started sshd@66-145.40.90.201:22-49.65.101.245:54608.service. Apr 12 20:45:38.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-49.65.101.245:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:38.328326 kernel: audit: type=1130 audit(1712954738.234:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-49.65.101.245:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:39.058972 sshd[2321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:45:39.057000 audit[2321]: USER_AUTH pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:45:39.151352 kernel: audit: type=1100 audit(1712954739.057:355): pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:45:41.087896 sshd[2321]: Failed password for root from 49.65.101.245 port 54608 ssh2 Apr 12 20:45:41.532557 sshd[2321]: Received disconnect from 49.65.101.245 port 54608:11: Bye Bye [preauth] Apr 12 20:45:41.532557 sshd[2321]: Disconnected from authenticating user root 49.65.101.245 port 54608 [preauth] Apr 12 20:45:41.535082 systemd[1]: sshd@66-145.40.90.201:22-49.65.101.245:54608.service: Deactivated successfully. Apr 12 20:45:41.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-49.65.101.245:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:45:41.629513 kernel: audit: type=1131 audit(1712954741.534:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-49.65.101.245:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:46:58.920084 systemd[1]: Started sshd@67-145.40.90.201:22-219.152.174.29:37866.service. Apr 12 20:46:58.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-219.152.174.29:37866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:46:59.013508 kernel: audit: type=1130 audit(1712954818.918:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-219.152.174.29:37866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:46:59.833968 sshd[2325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:46:59.832000 audit[2325]: USER_AUTH pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:46:59.927505 kernel: audit: type=1100 audit(1712954819.832:358): pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:47:02.179015 sshd[2325]: Failed password for root from 219.152.174.29 port 37866 ssh2 Apr 12 20:47:04.667809 sshd[2325]: Received disconnect from 219.152.174.29 port 37866:11: Bye Bye [preauth] Apr 12 20:47:04.667809 sshd[2325]: Disconnected from authenticating user root 219.152.174.29 port 37866 [preauth] Apr 12 20:47:04.670310 systemd[1]: sshd@67-145.40.90.201:22-219.152.174.29:37866.service: Deactivated successfully. Apr 12 20:47:04.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-219.152.174.29:37866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:04.764512 kernel: audit: type=1131 audit(1712954824.669:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-219.152.174.29:37866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:07.879882 systemd[1]: Started sshd@68-145.40.90.201:22-104.250.50.61:38060.service. Apr 12 20:47:07.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-104.250.50.61:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:07.973325 kernel: audit: type=1130 audit(1712954827.878:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-104.250.50.61:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:10.867979 sshd[2329]: Invalid user johannes from 104.250.50.61 port 38060 Apr 12 20:47:10.874241 sshd[2329]: pam_faillock(sshd:auth): User unknown Apr 12 20:47:10.875381 sshd[2329]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:47:10.875472 sshd[2329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 Apr 12 20:47:10.876403 sshd[2329]: pam_faillock(sshd:auth): User unknown Apr 12 20:47:10.875000 audit[2329]: USER_AUTH pid=2329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:47:10.970516 kernel: audit: type=1100 audit(1712954830.875:361): pid=2329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:47:13.065650 sshd[2329]: Failed password for invalid user johannes from 104.250.50.61 port 38060 ssh2 Apr 12 20:47:14.855052 systemd[1]: Started sshd@69-145.40.90.201:22-49.65.101.245:51522.service. Apr 12 20:47:14.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-49.65.101.245:51522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:14.858767 sshd[2329]: Received disconnect from 104.250.50.61 port 38060:11: Bye Bye [preauth] Apr 12 20:47:14.858767 sshd[2329]: Disconnected from invalid user johannes 104.250.50.61 port 38060 [preauth] Apr 12 20:47:14.859242 systemd[1]: sshd@68-145.40.90.201:22-104.250.50.61:38060.service: Deactivated successfully. Apr 12 20:47:14.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-104.250.50.61:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:15.039161 kernel: audit: type=1130 audit(1712954834.853:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-49.65.101.245:51522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:15.039196 kernel: audit: type=1131 audit(1712954834.858:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-104.250.50.61:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:15.678885 sshd[2333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:47:15.677000 audit[2333]: USER_AUTH pid=2333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:47:15.772502 kernel: audit: type=1100 audit(1712954835.677:364): pid=2333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:47:17.888255 sshd[2333]: Failed password for root from 49.65.101.245 port 51522 ssh2 Apr 12 20:47:18.153356 sshd[2333]: Received disconnect from 49.65.101.245 port 51522:11: Bye Bye [preauth] Apr 12 20:47:18.153356 sshd[2333]: Disconnected from authenticating user root 49.65.101.245 port 51522 [preauth] Apr 12 20:47:18.155849 systemd[1]: sshd@69-145.40.90.201:22-49.65.101.245:51522.service: Deactivated successfully. Apr 12 20:47:18.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-49.65.101.245:51522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:47:18.250515 kernel: audit: type=1131 audit(1712954838.154:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-49.65.101.245:51522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:26.212335 systemd[1]: Started sshd@70-145.40.90.201:22-219.152.174.29:58896.service. Apr 12 20:48:26.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-219.152.174.29:58896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:26.213160 systemd[1]: Starting systemd-tmpfiles-clean.service... Apr 12 20:48:26.305372 kernel: audit: type=1130 audit(1712954906.211:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-219.152.174.29:58896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:26.309695 systemd-tmpfiles[2341]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:48:26.309923 systemd-tmpfiles[2341]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:48:26.310630 systemd-tmpfiles[2341]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:48:26.321868 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Apr 12 20:48:26.321960 systemd[1]: Finished systemd-tmpfiles-clean.service. Apr 12 20:48:26.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:26.322799 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Apr 12 20:48:26.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:26.499289 kernel: audit: type=1130 audit(1712954906.320:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:26.499325 kernel: audit: type=1131 audit(1712954906.320:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:27.259959 sshd[2340]: Invalid user user1 from 219.152.174.29 port 58896 Apr 12 20:48:27.266152 sshd[2340]: pam_faillock(sshd:auth): User unknown Apr 12 20:48:27.267149 sshd[2340]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:48:27.267239 sshd[2340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:48:27.268316 sshd[2340]: pam_faillock(sshd:auth): User unknown Apr 12 20:48:27.267000 audit[2340]: USER_AUTH pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:48:27.362523 kernel: audit: type=1100 audit(1712954907.267:369): pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:48:29.026298 sshd[2340]: Failed password for invalid user user1 from 219.152.174.29 port 58896 ssh2 Apr 12 20:48:29.776068 sshd[2340]: Received disconnect from 219.152.174.29 port 58896:11: Bye Bye [preauth] Apr 12 20:48:29.776068 sshd[2340]: Disconnected from invalid user user1 219.152.174.29 port 58896 [preauth] Apr 12 20:48:29.778557 systemd[1]: sshd@70-145.40.90.201:22-219.152.174.29:58896.service: Deactivated successfully. Apr 12 20:48:29.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-219.152.174.29:58896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:29.872379 kernel: audit: type=1131 audit(1712954909.777:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-219.152.174.29:58896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:34.457625 systemd[1]: Started sshd@71-145.40.90.201:22-218.92.0.33:45554.service. Apr 12 20:48:34.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-218.92.0.33:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:34.550369 kernel: audit: type=1130 audit(1712954914.456:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-218.92.0.33:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:34.598347 sshd[2347]: Unable to negotiate with 218.92.0.33 port 45554: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Apr 12 20:48:34.598873 systemd[1]: sshd@71-145.40.90.201:22-218.92.0.33:45554.service: Deactivated successfully. Apr 12 20:48:34.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-218.92.0.33:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:34.691512 kernel: audit: type=1131 audit(1712954914.597:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-218.92.0.33:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:46.070784 systemd[1]: Started sshd@72-145.40.90.201:22-49.65.101.245:60636.service. Apr 12 20:48:46.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-49.65.101.245:60636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:46.163369 kernel: audit: type=1130 audit(1712954926.069:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-49.65.101.245:60636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:46.898726 sshd[2352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:48:46.897000 audit[2352]: USER_AUTH pid=2352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:48:46.991498 kernel: audit: type=1100 audit(1712954926.897:374): pid=2352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:48:48.932475 sshd[2352]: Failed password for root from 49.65.101.245 port 60636 ssh2 Apr 12 20:48:49.370971 sshd[2352]: Received disconnect from 49.65.101.245 port 60636:11: Bye Bye [preauth] Apr 12 20:48:49.370971 sshd[2352]: Disconnected from authenticating user root 49.65.101.245 port 60636 [preauth] Apr 12 20:48:49.373546 systemd[1]: sshd@72-145.40.90.201:22-49.65.101.245:60636.service: Deactivated successfully. Apr 12 20:48:49.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-49.65.101.245:60636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:49.467515 kernel: audit: type=1131 audit(1712954929.372:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-49.65.101.245:60636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:21.294848 systemd[1]: Started sshd@73-145.40.90.201:22-179.43.180.106:36762.service. Apr 12 20:49:21.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-179.43.180.106:36762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:21.388513 kernel: audit: type=1130 audit(1712954961.293:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-179.43.180.106:36762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:22.412976 sshd[2360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:22.411000 audit[2360]: USER_AUTH pid=2360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:22.506505 kernel: audit: type=1100 audit(1712954962.411:377): pid=2360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:24.722790 sshd[2360]: Failed password for root from 179.43.180.106 port 36762 ssh2 Apr 12 20:49:24.904235 sshd[2360]: Connection closed by authenticating user root 179.43.180.106 port 36762 [preauth] Apr 12 20:49:24.906795 systemd[1]: sshd@73-145.40.90.201:22-179.43.180.106:36762.service: Deactivated successfully. Apr 12 20:49:24.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-179.43.180.106:36762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:25.000323 kernel: audit: type=1131 audit(1712954964.906:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-179.43.180.106:36762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:25.065760 systemd[1]: Started sshd@74-145.40.90.201:22-179.43.180.106:33410.service. Apr 12 20:49:25.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-179.43.180.106:33410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:25.158382 kernel: audit: type=1130 audit(1712954965.064:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-179.43.180.106:33410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:26.435157 sshd[2365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:26.434000 audit[2365]: USER_AUTH pid=2365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:26.528501 kernel: audit: type=1100 audit(1712954966.434:380): pid=2365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:28.629122 sshd[2365]: Failed password for root from 179.43.180.106 port 33410 ssh2 Apr 12 20:49:28.926202 sshd[2365]: Connection closed by authenticating user root 179.43.180.106 port 33410 [preauth] Apr 12 20:49:28.928686 systemd[1]: sshd@74-145.40.90.201:22-179.43.180.106:33410.service: Deactivated successfully. Apr 12 20:49:28.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-179.43.180.106:33410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:29.022516 kernel: audit: type=1131 audit(1712954968.928:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-179.43.180.106:33410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:29.080409 systemd[1]: Started sshd@75-145.40.90.201:22-179.43.180.106:33436.service. Apr 12 20:49:29.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-179.43.180.106:33436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:29.172503 kernel: audit: type=1130 audit(1712954969.079:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-179.43.180.106:33436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:30.176731 sshd[2369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:30.175000 audit[2369]: USER_AUTH pid=2369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:30.269355 kernel: audit: type=1100 audit(1712954970.175:383): pid=2369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:32.250867 sshd[2369]: Failed password for root from 179.43.180.106 port 33436 ssh2 Apr 12 20:49:32.668204 sshd[2369]: Connection closed by authenticating user root 179.43.180.106 port 33436 [preauth] Apr 12 20:49:32.670680 systemd[1]: sshd@75-145.40.90.201:22-179.43.180.106:33436.service: Deactivated successfully. Apr 12 20:49:32.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-179.43.180.106:33436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:32.764514 kernel: audit: type=1131 audit(1712954972.670:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-179.43.180.106:33436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:32.821354 systemd[1]: Started sshd@76-145.40.90.201:22-179.43.180.106:38752.service. Apr 12 20:49:32.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-179.43.180.106:38752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:32.912339 kernel: audit: type=1130 audit(1712954972.820:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-179.43.180.106:38752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:33.874397 sshd[2373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:33.873000 audit[2373]: ANOM_LOGIN_FAILURES pid=2373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:33.874655 sshd[2373]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:49:33.873000 audit[2373]: USER_AUTH pid=2373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:34.031135 kernel: audit: type=2100 audit(1712954973.873:386): pid=2373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:34.031166 kernel: audit: type=1100 audit(1712954973.873:387): pid=2373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:35.692602 sshd[2373]: Failed password for root from 179.43.180.106 port 38752 ssh2 Apr 12 20:49:36.366845 sshd[2373]: Connection closed by authenticating user root 179.43.180.106 port 38752 [preauth] Apr 12 20:49:36.369382 systemd[1]: sshd@76-145.40.90.201:22-179.43.180.106:38752.service: Deactivated successfully. Apr 12 20:49:36.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-179.43.180.106:38752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:36.463497 kernel: audit: type=1131 audit(1712954976.368:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-179.43.180.106:38752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:36.520835 systemd[1]: Started sshd@77-145.40.90.201:22-179.43.180.106:38758.service. Apr 12 20:49:36.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-179.43.180.106:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:36.614521 kernel: audit: type=1130 audit(1712954976.519:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-179.43.180.106:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.606923 sshd[2377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:37.605000 audit[2377]: USER_AUTH pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:37.699376 kernel: audit: type=1100 audit(1712954977.605:390): pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:39.974595 sshd[2377]: Failed password for root from 179.43.180.106 port 38758 ssh2 Apr 12 20:49:42.437052 sshd[2377]: Connection closed by authenticating user root 179.43.180.106 port 38758 [preauth] Apr 12 20:49:42.439637 systemd[1]: sshd@77-145.40.90.201:22-179.43.180.106:38758.service: Deactivated successfully. Apr 12 20:49:42.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-179.43.180.106:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:42.533508 kernel: audit: type=1131 audit(1712954982.438:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-179.43.180.106:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:42.591506 systemd[1]: Started sshd@78-145.40.90.201:22-179.43.180.106:42910.service. Apr 12 20:49:42.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-179.43.180.106:42910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:42.684325 kernel: audit: type=1130 audit(1712954982.590:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-179.43.180.106:42910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:43.545710 sshd[2381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:43.544000 audit[2381]: USER_AUTH pid=2381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:43.638367 kernel: audit: type=1100 audit(1712954983.544:393): pid=2381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:45.404109 sshd[2381]: Failed password for root from 179.43.180.106 port 42910 ssh2 Apr 12 20:49:46.037159 sshd[2381]: Connection closed by authenticating user root 179.43.180.106 port 42910 [preauth] Apr 12 20:49:46.039732 systemd[1]: sshd@78-145.40.90.201:22-179.43.180.106:42910.service: Deactivated successfully. Apr 12 20:49:46.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-179.43.180.106:42910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:46.133396 kernel: audit: type=1131 audit(1712954986.039:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-179.43.180.106:42910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:46.198058 systemd[1]: Started sshd@79-145.40.90.201:22-179.43.180.106:42918.service. Apr 12 20:49:46.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-179.43.180.106:42918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:46.291519 kernel: audit: type=1130 audit(1712954986.196:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-179.43.180.106:42918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:47.204870 sshd[2385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:47.203000 audit[2385]: USER_AUTH pid=2385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:47.298502 kernel: audit: type=1100 audit(1712954987.203:396): pid=2385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:48.947601 sshd[2385]: Failed password for root from 179.43.180.106 port 42918 ssh2 Apr 12 20:49:49.696751 sshd[2385]: Connection closed by authenticating user root 179.43.180.106 port 42918 [preauth] Apr 12 20:49:49.699274 systemd[1]: sshd@79-145.40.90.201:22-179.43.180.106:42918.service: Deactivated successfully. Apr 12 20:49:49.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-179.43.180.106:42918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.793511 kernel: audit: type=1131 audit(1712954989.698:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-179.43.180.106:42918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.848802 systemd[1]: Started sshd@80-145.40.90.201:22-179.43.180.106:42928.service. Apr 12 20:49:49.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-179.43.180.106:42928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.942514 kernel: audit: type=1130 audit(1712954989.847:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-179.43.180.106:42928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:50.906167 sshd[2389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:50.905000 audit[2389]: USER_AUTH pid=2389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:50.999488 kernel: audit: type=1100 audit(1712954990.905:399): pid=2389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:53.060466 sshd[2389]: Failed password for root from 179.43.180.106 port 42928 ssh2 Apr 12 20:49:53.415080 sshd[2389]: Connection closed by authenticating user root 179.43.180.106 port 42928 [preauth] Apr 12 20:49:53.417574 systemd[1]: sshd@80-145.40.90.201:22-179.43.180.106:42928.service: Deactivated successfully. Apr 12 20:49:53.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-179.43.180.106:42928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:53.512499 kernel: audit: type=1131 audit(1712954993.416:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-179.43.180.106:42928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:53.553892 systemd[1]: Started sshd@81-145.40.90.201:22-179.43.180.106:60916.service. Apr 12 20:49:53.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-179.43.180.106:60916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:53.647496 kernel: audit: type=1130 audit(1712954993.552:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-179.43.180.106:60916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:54.604100 sshd[2393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:54.603000 audit[2393]: USER_AUTH pid=2393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:54.697506 kernel: audit: type=1100 audit(1712954994.603:402): pid=2393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:55.692476 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:49:55.691Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1279} Apr 12 20:49:55.712465 etcd-wrapper[1707]: {"level":"info","ts":"2024-04-12T20:49:55.712Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1279,"took":"19.664371ms"} Apr 12 20:49:56.306641 sshd[2393]: Failed password for root from 179.43.180.106 port 60916 ssh2 Apr 12 20:49:56.423476 systemd[1]: Started sshd@82-145.40.90.201:22-219.152.174.29:51696.service. Apr 12 20:49:56.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-219.152.174.29:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:56.516331 kernel: audit: type=1130 audit(1712954996.422:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-219.152.174.29:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:57.094190 sshd[2393]: Connection closed by authenticating user root 179.43.180.106 port 60916 [preauth] Apr 12 20:49:57.096684 systemd[1]: sshd@81-145.40.90.201:22-179.43.180.106:60916.service: Deactivated successfully. Apr 12 20:49:57.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-179.43.180.106:60916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:57.190516 kernel: audit: type=1131 audit(1712954997.095:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-179.43.180.106:60916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:57.253616 systemd[1]: Started sshd@83-145.40.90.201:22-179.43.180.106:60926.service. Apr 12 20:49:57.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-179.43.180.106:60926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:57.346325 kernel: audit: type=1130 audit(1712954997.252:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-179.43.180.106:60926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:57.498585 sshd[2396]: Invalid user sasaki from 219.152.174.29 port 51696 Apr 12 20:49:57.503620 sshd[2396]: pam_faillock(sshd:auth): User unknown Apr 12 20:49:57.504742 sshd[2396]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:49:57.504835 sshd[2396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:49:57.505776 sshd[2396]: pam_faillock(sshd:auth): User unknown Apr 12 20:49:57.504000 audit[2396]: USER_AUTH pid=2396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sasaki" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:49:57.606501 kernel: audit: type=1100 audit(1712954997.504:406): pid=2396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sasaki" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:49:58.090521 sshd[2400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:49:58.089000 audit[2400]: USER_AUTH pid=2400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:58.184638 kernel: audit: type=1100 audit(1712954998.089:407): pid=2400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:49:59.288466 sshd[2396]: Failed password for invalid user sasaki from 219.152.174.29 port 51696 ssh2 Apr 12 20:49:59.677684 sshd[2400]: Failed password for root from 179.43.180.106 port 60926 ssh2 Apr 12 20:50:00.387431 sshd[2396]: Received disconnect from 219.152.174.29 port 51696:11: Bye Bye [preauth] Apr 12 20:50:00.387431 sshd[2396]: Disconnected from invalid user sasaki 219.152.174.29 port 51696 [preauth] Apr 12 20:50:00.389938 systemd[1]: sshd@82-145.40.90.201:22-219.152.174.29:51696.service: Deactivated successfully. Apr 12 20:50:00.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-219.152.174.29:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:00.484509 kernel: audit: type=1131 audit(1712955000.389:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-219.152.174.29:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:00.580796 sshd[2400]: Connection closed by authenticating user root 179.43.180.106 port 60926 [preauth] Apr 12 20:50:00.581841 systemd[1]: sshd@83-145.40.90.201:22-179.43.180.106:60926.service: Deactivated successfully. Apr 12 20:50:00.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-179.43.180.106:60926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:00.675653 kernel: audit: type=1131 audit(1712955000.580:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-179.43.180.106:60926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:00.735539 systemd[1]: Started sshd@84-145.40.90.201:22-179.43.180.106:60936.service. Apr 12 20:50:00.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-179.43.180.106:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:00.828513 kernel: audit: type=1130 audit(1712955000.734:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-179.43.180.106:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:01.534373 sshd[2405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:01.533000 audit[2405]: USER_AUTH pid=2405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:01.627382 kernel: audit: type=1100 audit(1712955001.533:411): pid=2405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:03.532914 sshd[2405]: Failed password for root from 179.43.180.106 port 60936 ssh2 Apr 12 20:50:04.276422 sshd[2405]: Connection closed by authenticating user root 179.43.180.106 port 60936 [preauth] Apr 12 20:50:04.278961 systemd[1]: sshd@84-145.40.90.201:22-179.43.180.106:60936.service: Deactivated successfully. Apr 12 20:50:04.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-179.43.180.106:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:04.372324 kernel: audit: type=1131 audit(1712955004.278:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-179.43.180.106:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:04.441187 systemd[1]: Started sshd@85-145.40.90.201:22-179.43.180.106:58168.service. Apr 12 20:50:04.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-179.43.180.106:58168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:04.534454 kernel: audit: type=1130 audit(1712955004.440:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-179.43.180.106:58168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:05.228211 sshd[2409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:05.227000 audit[2409]: USER_AUTH pid=2409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:05.321504 kernel: audit: type=1100 audit(1712955005.227:414): pid=2409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:07.106663 sshd[2409]: Failed password for root from 179.43.180.106 port 58168 ssh2 Apr 12 20:50:07.982164 sshd[2409]: Connection closed by authenticating user root 179.43.180.106 port 58168 [preauth] Apr 12 20:50:07.984711 systemd[1]: sshd@85-145.40.90.201:22-179.43.180.106:58168.service: Deactivated successfully. Apr 12 20:50:07.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-179.43.180.106:58168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:08.078393 kernel: audit: type=1131 audit(1712955007.983:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-179.43.180.106:58168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:08.159987 systemd[1]: Started sshd@86-145.40.90.201:22-179.43.180.106:58172.service. Apr 12 20:50:08.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-179.43.180.106:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:08.253516 kernel: audit: type=1130 audit(1712955008.158:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-179.43.180.106:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:08.957994 sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:08.956000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:09.051502 kernel: audit: type=1100 audit(1712955008.956:417): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:10.916588 sshd[2413]: Failed password for root from 179.43.180.106 port 58172 ssh2 Apr 12 20:50:11.748347 sshd[2413]: Connection closed by authenticating user root 179.43.180.106 port 58172 [preauth] Apr 12 20:50:11.750902 systemd[1]: sshd@86-145.40.90.201:22-179.43.180.106:58172.service: Deactivated successfully. Apr 12 20:50:11.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-179.43.180.106:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:11.844389 kernel: audit: type=1131 audit(1712955011.750:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-179.43.180.106:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:11.910098 systemd[1]: Started sshd@87-145.40.90.201:22-179.43.180.106:59696.service. Apr 12 20:50:11.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-179.43.180.106:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:12.003392 kernel: audit: type=1130 audit(1712955011.908:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-179.43.180.106:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:12.716725 sshd[2418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:12.715000 audit[2418]: USER_AUTH pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:12.810501 kernel: audit: type=1100 audit(1712955012.715:420): pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:14.890845 sshd[2418]: Failed password for root from 179.43.180.106 port 59696 ssh2 Apr 12 20:50:15.291306 sshd[2418]: Connection closed by authenticating user root 179.43.180.106 port 59696 [preauth] Apr 12 20:50:15.293882 systemd[1]: sshd@87-145.40.90.201:22-179.43.180.106:59696.service: Deactivated successfully. Apr 12 20:50:15.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-179.43.180.106:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:15.387510 kernel: audit: type=1131 audit(1712955015.293:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-179.43.180.106:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:15.612140 systemd[1]: Started sshd@88-145.40.90.201:22-179.43.180.106:59698.service. Apr 12 20:50:15.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-179.43.180.106:59698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:15.706526 kernel: audit: type=1130 audit(1712955015.611:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-179.43.180.106:59698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:16.432461 sshd[2422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:16.431000 audit[2422]: USER_AUTH pid=2422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:16.525498 kernel: audit: type=1100 audit(1712955016.431:423): pid=2422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:18.155223 sshd[2422]: Failed password for root from 179.43.180.106 port 59698 ssh2 Apr 12 20:50:19.186697 sshd[2422]: Connection closed by authenticating user root 179.43.180.106 port 59698 [preauth] Apr 12 20:50:19.189225 systemd[1]: sshd@88-145.40.90.201:22-179.43.180.106:59698.service: Deactivated successfully. Apr 12 20:50:19.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-179.43.180.106:59698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:19.282498 kernel: audit: type=1131 audit(1712955019.188:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-179.43.180.106:59698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:19.343043 systemd[1]: Started sshd@89-145.40.90.201:22-179.43.180.106:59714.service. Apr 12 20:50:19.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-179.43.180.106:59714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:19.436518 kernel: audit: type=1130 audit(1712955019.341:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-179.43.180.106:59714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:20.139118 sshd[2426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:20.138000 audit[2426]: USER_AUTH pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:20.232486 kernel: audit: type=1100 audit(1712955020.138:426): pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:22.413570 sshd[2426]: Failed password for root from 179.43.180.106 port 59714 ssh2 Apr 12 20:50:22.630028 sshd[2426]: Connection closed by authenticating user root 179.43.180.106 port 59714 [preauth] Apr 12 20:50:22.632636 systemd[1]: sshd@89-145.40.90.201:22-179.43.180.106:59714.service: Deactivated successfully. Apr 12 20:50:22.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-179.43.180.106:59714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:22.727528 kernel: audit: type=1131 audit(1712955022.631:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-179.43.180.106:59714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:22.787538 systemd[1]: Started sshd@90-145.40.90.201:22-179.43.180.106:44780.service. Apr 12 20:50:22.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-179.43.180.106:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:22.879508 kernel: audit: type=1130 audit(1712955022.786:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-179.43.180.106:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:23.341878 systemd[1]: Started sshd@91-145.40.90.201:22-49.65.101.245:59668.service. Apr 12 20:50:23.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-49.65.101.245:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:23.435516 kernel: audit: type=1130 audit(1712955023.340:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-49.65.101.245:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:23.685622 sshd[2430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:23.684000 audit[2430]: USER_AUTH pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:23.779505 kernel: audit: type=1100 audit(1712955023.684:430): pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:24.195391 sshd[2433]: Invalid user qi from 49.65.101.245 port 59668 Apr 12 20:50:24.201435 sshd[2433]: pam_faillock(sshd:auth): User unknown Apr 12 20:50:24.202430 sshd[2433]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:50:24.202523 sshd[2433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:50:24.203461 sshd[2433]: pam_faillock(sshd:auth): User unknown Apr 12 20:50:24.202000 audit[2433]: USER_AUTH pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="qi" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:50:24.297430 kernel: audit: type=1100 audit(1712955024.202:431): pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="qi" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:50:25.704267 sshd[2430]: Failed password for root from 179.43.180.106 port 44780 ssh2 Apr 12 20:50:26.176605 sshd[2430]: Connection closed by authenticating user root 179.43.180.106 port 44780 [preauth] Apr 12 20:50:26.179068 systemd[1]: sshd@90-145.40.90.201:22-179.43.180.106:44780.service: Deactivated successfully. Apr 12 20:50:26.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-179.43.180.106:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:26.273522 kernel: audit: type=1131 audit(1712955026.178:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-179.43.180.106:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:26.343243 systemd[1]: Started sshd@92-145.40.90.201:22-179.43.180.106:44786.service. Apr 12 20:50:26.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-179.43.180.106:44786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:26.357353 sshd[2433]: Failed password for invalid user qi from 49.65.101.245 port 59668 ssh2 Apr 12 20:50:26.436518 kernel: audit: type=1130 audit(1712955026.342:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-179.43.180.106:44786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:27.245888 sshd[2437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:27.244000 audit[2437]: USER_AUTH pid=2437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:27.339503 kernel: audit: type=1100 audit(1712955027.244:434): pid=2437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:27.903124 sshd[2433]: Received disconnect from 49.65.101.245 port 59668:11: Bye Bye [preauth] Apr 12 20:50:27.903124 sshd[2433]: Disconnected from invalid user qi 49.65.101.245 port 59668 [preauth] Apr 12 20:50:27.905682 systemd[1]: sshd@91-145.40.90.201:22-49.65.101.245:59668.service: Deactivated successfully. Apr 12 20:50:27.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-49.65.101.245:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:27.999433 kernel: audit: type=1131 audit(1712955027.905:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-49.65.101.245:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:28.477136 sshd[2437]: Failed password for root from 179.43.180.106 port 44786 ssh2 Apr 12 20:50:29.738119 sshd[2437]: Connection closed by authenticating user root 179.43.180.106 port 44786 [preauth] Apr 12 20:50:29.740727 systemd[1]: sshd@92-145.40.90.201:22-179.43.180.106:44786.service: Deactivated successfully. Apr 12 20:50:29.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-179.43.180.106:44786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:29.834470 kernel: audit: type=1131 audit(1712955029.739:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-179.43.180.106:44786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:29.899787 systemd[1]: Started sshd@93-145.40.90.201:22-179.43.180.106:44790.service. Apr 12 20:50:29.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-179.43.180.106:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:29.992495 kernel: audit: type=1130 audit(1712955029.899:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-179.43.180.106:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:31.107926 sshd[2442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:31.106000 audit[2442]: USER_AUTH pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:31.200482 kernel: audit: type=1100 audit(1712955031.106:438): pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:33.558126 sshd[2442]: Failed password for root from 179.43.180.106 port 44790 ssh2 Apr 12 20:50:36.095733 sshd[2442]: Connection closed by authenticating user root 179.43.180.106 port 44790 [preauth] Apr 12 20:50:36.098273 systemd[1]: sshd@93-145.40.90.201:22-179.43.180.106:44790.service: Deactivated successfully. Apr 12 20:50:36.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-179.43.180.106:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:36.191503 kernel: audit: type=1131 audit(1712955036.097:439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-179.43.180.106:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:36.256718 systemd[1]: Started sshd@94-145.40.90.201:22-179.43.180.106:37102.service. Apr 12 20:50:36.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-179.43.180.106:37102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:36.349506 kernel: audit: type=1130 audit(1712955036.255:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-179.43.180.106:37102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:37.084238 sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.180.106 user=root Apr 12 20:50:37.083000 audit[2446]: USER_AUTH pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:37.177503 kernel: audit: type=1100 audit(1712955037.083:441): pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.43.180.106 addr=179.43.180.106 terminal=ssh res=failed' Apr 12 20:50:39.022903 sshd[2446]: Failed password for root from 179.43.180.106 port 37102 ssh2 Apr 12 20:50:39.583671 sshd[2446]: Connection closed by authenticating user root 179.43.180.106 port 37102 [preauth] Apr 12 20:50:39.586176 systemd[1]: sshd@94-145.40.90.201:22-179.43.180.106:37102.service: Deactivated successfully. Apr 12 20:50:39.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-179.43.180.106:37102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:39.679489 kernel: audit: type=1131 audit(1712955039.585:442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-179.43.180.106:37102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:27.810266 systemd[1]: Started sshd@95-145.40.90.201:22-219.152.174.29:44490.service. Apr 12 20:51:27.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-219.152.174.29:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:27.904397 kernel: audit: type=1130 audit(1712955087.809:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-219.152.174.29:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:28.834237 sshd[2450]: Invalid user user1 from 219.152.174.29 port 44490 Apr 12 20:51:28.840437 sshd[2450]: pam_faillock(sshd:auth): User unknown Apr 12 20:51:28.841445 sshd[2450]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:51:28.841536 sshd[2450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:51:28.842490 sshd[2450]: pam_faillock(sshd:auth): User unknown Apr 12 20:51:28.841000 audit[2450]: USER_AUTH pid=2450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:51:28.936397 kernel: audit: type=1100 audit(1712955088.841:444): pid=2450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:51:30.449808 sshd[2450]: Failed password for invalid user user1 from 219.152.174.29 port 44490 ssh2 Apr 12 20:51:31.356832 sshd[2450]: Received disconnect from 219.152.174.29 port 44490:11: Bye Bye [preauth] Apr 12 20:51:31.356832 sshd[2450]: Disconnected from invalid user user1 219.152.174.29 port 44490 [preauth] Apr 12 20:51:31.359419 systemd[1]: sshd@95-145.40.90.201:22-219.152.174.29:44490.service: Deactivated successfully. Apr 12 20:51:31.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-219.152.174.29:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:31.453515 kernel: audit: type=1131 audit(1712955091.358:445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-219.152.174.29:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:56.127515 systemd[1]: Started sshd@96-145.40.90.201:22-49.65.101.245:36390.service. Apr 12 20:51:56.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-49.65.101.245:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:56.221522 kernel: audit: type=1130 audit(1712955116.127:446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-49.65.101.245:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:56.904401 sshd[2455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:51:56.904000 audit[2455]: USER_AUTH pid=2455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:51:56.997501 kernel: audit: type=1100 audit(1712955116.904:447): pid=2455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:51:59.354915 sshd[2455]: Failed password for root from 49.65.101.245 port 36390 ssh2 Apr 12 20:52:01.707145 sshd[2455]: Received disconnect from 49.65.101.245 port 36390:11: Bye Bye [preauth] Apr 12 20:52:01.707145 sshd[2455]: Disconnected from authenticating user root 49.65.101.245 port 36390 [preauth] Apr 12 20:52:01.709658 systemd[1]: sshd@96-145.40.90.201:22-49.65.101.245:36390.service: Deactivated successfully. Apr 12 20:52:01.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-49.65.101.245:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:01.803507 kernel: audit: type=1131 audit(1712955121.709:448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-49.65.101.245:36390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:54.046786 systemd[1]: Started sshd@97-145.40.90.201:22-219.152.174.29:37286.service. Apr 12 20:52:54.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-219.152.174.29:37286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:54.140388 kernel: audit: type=1130 audit(1712955174.045:449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-219.152.174.29:37286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:55.020348 sshd[2459]: Invalid user hjchen from 219.152.174.29 port 37286 Apr 12 20:52:55.026481 sshd[2459]: pam_faillock(sshd:auth): User unknown Apr 12 20:52:55.027476 sshd[2459]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:52:55.027570 sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:52:55.028492 sshd[2459]: pam_faillock(sshd:auth): User unknown Apr 12 20:52:55.027000 audit[2459]: USER_AUTH pid=2459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hjchen" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:52:55.122519 kernel: audit: type=1100 audit(1712955175.027:450): pid=2459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hjchen" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:52:57.246609 sshd[2459]: Failed password for invalid user hjchen from 219.152.174.29 port 37286 ssh2 Apr 12 20:52:57.434934 sshd[2459]: Received disconnect from 219.152.174.29 port 37286:11: Bye Bye [preauth] Apr 12 20:52:57.434934 sshd[2459]: Disconnected from invalid user hjchen 219.152.174.29 port 37286 [preauth] Apr 12 20:52:57.437453 systemd[1]: sshd@97-145.40.90.201:22-219.152.174.29:37286.service: Deactivated successfully. Apr 12 20:52:57.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-219.152.174.29:37286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:57.531514 kernel: audit: type=1131 audit(1712955177.436:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-219.152.174.29:37286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:06.787769 systemd[1]: Started sshd@98-145.40.90.201:22-104.250.50.61:54922.service. Apr 12 20:53:06.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:54922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:06.881390 kernel: audit: type=1130 audit(1712955186.786:452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:54922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:08.418141 sshd[2463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 user=root Apr 12 20:53:08.417000 audit[2463]: USER_AUTH pid=2463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:53:08.510496 kernel: audit: type=1100 audit(1712955188.417:453): pid=2463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:53:11.089057 sshd[2463]: Failed password for root from 104.250.50.61 port 54922 ssh2 Apr 12 20:53:13.240049 sshd[2463]: Received disconnect from 104.250.50.61 port 54922:11: Bye Bye [preauth] Apr 12 20:53:13.240049 sshd[2463]: Disconnected from authenticating user root 104.250.50.61 port 54922 [preauth] Apr 12 20:53:13.242624 systemd[1]: sshd@98-145.40.90.201:22-104.250.50.61:54922.service: Deactivated successfully. Apr 12 20:53:13.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:54922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:13.336399 kernel: audit: type=1131 audit(1712955193.241:454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:54922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:26.453789 systemd[1]: Started sshd@99-145.40.90.201:22-49.65.101.245:53534.service. Apr 12 20:53:26.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-49.65.101.245:53534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:26.547515 kernel: audit: type=1130 audit(1712955206.452:455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-49.65.101.245:53534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:27.253568 sshd[2467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:53:27.252000 audit[2467]: USER_AUTH pid=2467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:53:27.345488 kernel: audit: type=1100 audit(1712955207.252:456): pid=2467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:53:29.532991 sshd[2467]: Failed password for root from 49.65.101.245 port 53534 ssh2 Apr 12 20:53:29.722348 sshd[2467]: Received disconnect from 49.65.101.245 port 53534:11: Bye Bye [preauth] Apr 12 20:53:29.722348 sshd[2467]: Disconnected from authenticating user root 49.65.101.245 port 53534 [preauth] Apr 12 20:53:29.724877 systemd[1]: sshd@99-145.40.90.201:22-49.65.101.245:53534.service: Deactivated successfully. Apr 12 20:53:29.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-49.65.101.245:53534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:53:29.819518 kernel: audit: type=1131 audit(1712955209.724:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-49.65.101.245:53534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:54:25.990826 systemd[1]: Started sshd@100-145.40.90.201:22-219.152.174.29:58316.service. Apr 12 20:54:25.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-219.152.174.29:58316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:54:26.084347 kernel: audit: type=1130 audit(1712955265.989:458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-219.152.174.29:58316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:54:27.071203 sshd[2472]: Invalid user ubuntu from 219.152.174.29 port 58316 Apr 12 20:54:27.077302 sshd[2472]: pam_faillock(sshd:auth): User unknown Apr 12 20:54:27.078345 sshd[2472]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:54:27.078442 sshd[2472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:54:27.080253 sshd[2472]: pam_faillock(sshd:auth): User unknown Apr 12 20:54:27.079000 audit[2472]: USER_AUTH pid=2472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:54:27.174523 kernel: audit: type=1100 audit(1712955267.079:459): pid=2472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:54:28.928087 sshd[2472]: Failed password for invalid user ubuntu from 219.152.174.29 port 58316 ssh2 Apr 12 20:54:30.887717 sshd[2472]: Received disconnect from 219.152.174.29 port 58316:11: Bye Bye [preauth] Apr 12 20:54:30.887717 sshd[2472]: Disconnected from invalid user ubuntu 219.152.174.29 port 58316 [preauth] Apr 12 20:54:30.890178 systemd[1]: sshd@100-145.40.90.201:22-219.152.174.29:58316.service: Deactivated successfully. Apr 12 20:54:30.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-219.152.174.29:58316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:54:30.984511 kernel: audit: type=1131 audit(1712955270.890:460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-219.152.174.29:58316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'