Nov 1 00:36:07.556870 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Nov 1 00:36:07.556883 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 Nov 1 00:36:07.556891 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:36:07.556895 kernel: BIOS-provided physical RAM map: Nov 1 00:36:07.556898 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Nov 1 00:36:07.556902 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Nov 1 00:36:07.556907 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Nov 1 00:36:07.556911 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Nov 1 00:36:07.556914 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Nov 1 00:36:07.556919 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000061f5ffff] usable Nov 1 00:36:07.556923 kernel: BIOS-e820: [mem 0x0000000061f60000-0x0000000061f60fff] ACPI NVS Nov 1 00:36:07.556927 kernel: BIOS-e820: [mem 0x0000000061f61000-0x0000000061f61fff] reserved Nov 1 00:36:07.556930 kernel: BIOS-e820: [mem 0x0000000061f62000-0x000000006c0c4fff] usable Nov 1 00:36:07.556934 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Nov 1 00:36:07.556939 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Nov 1 00:36:07.556944 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Nov 1 00:36:07.556948 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Nov 1 00:36:07.556953 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Nov 1 00:36:07.556957 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Nov 1 00:36:07.556961 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Nov 1 00:36:07.556965 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Nov 1 00:36:07.556969 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Nov 1 00:36:07.556973 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Nov 1 00:36:07.556977 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Nov 1 00:36:07.556981 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Nov 1 00:36:07.556986 kernel: NX (Execute Disable) protection: active Nov 1 00:36:07.556991 kernel: SMBIOS 3.2.1 present. Nov 1 00:36:07.556995 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Nov 1 00:36:07.556999 kernel: tsc: Detected 3400.000 MHz processor Nov 1 00:36:07.557003 kernel: tsc: Detected 3399.906 MHz TSC Nov 1 00:36:07.557007 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 1 00:36:07.557012 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 1 00:36:07.557016 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Nov 1 00:36:07.557021 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 1 00:36:07.557025 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Nov 1 00:36:07.557030 kernel: Using GB pages for direct mapping Nov 1 00:36:07.557035 kernel: ACPI: Early table checksum verification disabled Nov 1 00:36:07.557039 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Nov 1 00:36:07.557043 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Nov 1 00:36:07.557048 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Nov 1 00:36:07.557054 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Nov 1 00:36:07.557059 kernel: ACPI: FACS 0x000000006D762F80 000040 Nov 1 00:36:07.557064 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Nov 1 00:36:07.557069 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Nov 1 00:36:07.557074 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Nov 1 00:36:07.557078 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Nov 1 00:36:07.557083 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Nov 1 00:36:07.557088 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Nov 1 00:36:07.557092 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Nov 1 00:36:07.557098 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Nov 1 00:36:07.557103 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Nov 1 00:36:07.557107 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Nov 1 00:36:07.557112 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Nov 1 00:36:07.557117 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Nov 1 00:36:07.557122 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Nov 1 00:36:07.557126 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Nov 1 00:36:07.557131 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Nov 1 00:36:07.557136 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Nov 1 00:36:07.557141 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Nov 1 00:36:07.557146 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Nov 1 00:36:07.557151 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Nov 1 00:36:07.557155 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Nov 1 00:36:07.557160 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Nov 1 00:36:07.557165 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Nov 1 00:36:07.557170 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xefa 01072009 AMI 00010013) Nov 1 00:36:07.557175 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Nov 1 00:36:07.557180 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Nov 1 00:36:07.557185 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Nov 1 00:36:07.557190 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Nov 1 00:36:07.557194 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Nov 1 00:36:07.557199 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Nov 1 00:36:07.557204 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Nov 1 00:36:07.557209 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Nov 1 00:36:07.557213 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Nov 1 00:36:07.557218 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Nov 1 00:36:07.557224 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Nov 1 00:36:07.557228 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Nov 1 00:36:07.557233 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Nov 1 00:36:07.557238 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Nov 1 00:36:07.557243 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Nov 1 00:36:07.557247 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Nov 1 00:36:07.557252 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Nov 1 00:36:07.557257 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Nov 1 00:36:07.557262 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Nov 1 00:36:07.557267 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Nov 1 00:36:07.557272 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Nov 1 00:36:07.557277 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Nov 1 00:36:07.557281 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Nov 1 00:36:07.557286 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Nov 1 00:36:07.557290 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Nov 1 00:36:07.557295 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Nov 1 00:36:07.557300 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Nov 1 00:36:07.557305 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Nov 1 00:36:07.557310 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Nov 1 00:36:07.557315 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Nov 1 00:36:07.557319 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Nov 1 00:36:07.557324 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Nov 1 00:36:07.557329 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Nov 1 00:36:07.557334 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Nov 1 00:36:07.557339 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Nov 1 00:36:07.557344 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Nov 1 00:36:07.557350 kernel: No NUMA configuration found Nov 1 00:36:07.557356 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Nov 1 00:36:07.557361 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Nov 1 00:36:07.557365 kernel: Zone ranges: Nov 1 00:36:07.557370 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 1 00:36:07.557375 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Nov 1 00:36:07.557380 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Nov 1 00:36:07.557384 kernel: Movable zone start for each node Nov 1 00:36:07.557389 kernel: Early memory node ranges Nov 1 00:36:07.557394 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Nov 1 00:36:07.557398 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Nov 1 00:36:07.557404 kernel: node 0: [mem 0x0000000040400000-0x0000000061f5ffff] Nov 1 00:36:07.557409 kernel: node 0: [mem 0x0000000061f62000-0x000000006c0c4fff] Nov 1 00:36:07.557413 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Nov 1 00:36:07.557418 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Nov 1 00:36:07.557423 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Nov 1 00:36:07.557428 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Nov 1 00:36:07.557435 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 1 00:36:07.557441 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Nov 1 00:36:07.557446 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Nov 1 00:36:07.557451 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Nov 1 00:36:07.557457 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Nov 1 00:36:07.557462 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Nov 1 00:36:07.557468 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Nov 1 00:36:07.557473 kernel: ACPI: PM-Timer IO Port: 0x1808 Nov 1 00:36:07.557478 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Nov 1 00:36:07.557483 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Nov 1 00:36:07.557489 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Nov 1 00:36:07.557494 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Nov 1 00:36:07.557499 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Nov 1 00:36:07.557504 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Nov 1 00:36:07.557509 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Nov 1 00:36:07.557514 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Nov 1 00:36:07.557519 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Nov 1 00:36:07.557524 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Nov 1 00:36:07.557529 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Nov 1 00:36:07.557534 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Nov 1 00:36:07.557539 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Nov 1 00:36:07.557544 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Nov 1 00:36:07.557549 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Nov 1 00:36:07.557554 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Nov 1 00:36:07.557560 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Nov 1 00:36:07.557565 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 1 00:36:07.557570 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 1 00:36:07.557575 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 1 00:36:07.557581 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Nov 1 00:36:07.557586 kernel: TSC deadline timer available Nov 1 00:36:07.557591 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Nov 1 00:36:07.557596 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Nov 1 00:36:07.557601 kernel: Booting paravirtualized kernel on bare hardware Nov 1 00:36:07.557606 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 1 00:36:07.557611 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Nov 1 00:36:07.557616 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Nov 1 00:36:07.557621 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Nov 1 00:36:07.557627 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Nov 1 00:36:07.557632 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Nov 1 00:36:07.557637 kernel: Policy zone: Normal Nov 1 00:36:07.557643 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:36:07.557648 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:36:07.557653 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Nov 1 00:36:07.557658 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Nov 1 00:36:07.557663 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:36:07.557669 kernel: Memory: 32553612K/33281940K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 728068K reserved, 0K cma-reserved) Nov 1 00:36:07.557674 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Nov 1 00:36:07.557679 kernel: ftrace: allocating 34614 entries in 136 pages Nov 1 00:36:07.557684 kernel: ftrace: allocated 136 pages with 2 groups Nov 1 00:36:07.557690 kernel: rcu: Hierarchical RCU implementation. Nov 1 00:36:07.557695 kernel: rcu: RCU event tracing is enabled. Nov 1 00:36:07.557700 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Nov 1 00:36:07.557705 kernel: Rude variant of Tasks RCU enabled. Nov 1 00:36:07.557710 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:36:07.557716 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:36:07.557721 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Nov 1 00:36:07.557726 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Nov 1 00:36:07.557731 kernel: random: crng init done Nov 1 00:36:07.557736 kernel: Console: colour dummy device 80x25 Nov 1 00:36:07.557741 kernel: printk: console [tty0] enabled Nov 1 00:36:07.557746 kernel: printk: console [ttyS1] enabled Nov 1 00:36:07.557751 kernel: ACPI: Core revision 20210730 Nov 1 00:36:07.557756 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Nov 1 00:36:07.557762 kernel: APIC: Switch to symmetric I/O mode setup Nov 1 00:36:07.557767 kernel: DMAR: Host address width 39 Nov 1 00:36:07.557772 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Nov 1 00:36:07.557777 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Nov 1 00:36:07.557782 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Nov 1 00:36:07.557788 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Nov 1 00:36:07.557793 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Nov 1 00:36:07.557798 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Nov 1 00:36:07.557803 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Nov 1 00:36:07.557809 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Nov 1 00:36:07.557814 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Nov 1 00:36:07.557819 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Nov 1 00:36:07.557824 kernel: x2apic enabled Nov 1 00:36:07.557829 kernel: Switched APIC routing to cluster x2apic. Nov 1 00:36:07.557834 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Nov 1 00:36:07.557839 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Nov 1 00:36:07.557844 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Nov 1 00:36:07.557849 kernel: CPU0: Thermal monitoring enabled (TM1) Nov 1 00:36:07.557855 kernel: process: using mwait in idle threads Nov 1 00:36:07.557860 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Nov 1 00:36:07.557865 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Nov 1 00:36:07.557870 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 1 00:36:07.557875 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Nov 1 00:36:07.557881 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Nov 1 00:36:07.557886 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Nov 1 00:36:07.557891 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Nov 1 00:36:07.557896 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Nov 1 00:36:07.557902 kernel: RETBleed: Mitigation: Enhanced IBRS Nov 1 00:36:07.557907 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 1 00:36:07.557912 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 1 00:36:07.557917 kernel: TAA: Mitigation: TSX disabled Nov 1 00:36:07.557922 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Nov 1 00:36:07.557927 kernel: SRBDS: Mitigation: Microcode Nov 1 00:36:07.557932 kernel: GDS: Vulnerable: No microcode Nov 1 00:36:07.557937 kernel: active return thunk: its_return_thunk Nov 1 00:36:07.557942 kernel: ITS: Mitigation: Aligned branch/return thunks Nov 1 00:36:07.557948 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 1 00:36:07.557953 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 1 00:36:07.557958 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 1 00:36:07.557963 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Nov 1 00:36:07.557968 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Nov 1 00:36:07.557974 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 1 00:36:07.557979 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Nov 1 00:36:07.557984 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Nov 1 00:36:07.557989 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Nov 1 00:36:07.557995 kernel: Freeing SMP alternatives memory: 32K Nov 1 00:36:07.558000 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:36:07.558005 kernel: LSM: Security Framework initializing Nov 1 00:36:07.558010 kernel: SELinux: Initializing. Nov 1 00:36:07.558015 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 1 00:36:07.558020 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 1 00:36:07.558025 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Nov 1 00:36:07.558030 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Nov 1 00:36:07.558035 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Nov 1 00:36:07.558041 kernel: ... version: 4 Nov 1 00:36:07.558046 kernel: ... bit width: 48 Nov 1 00:36:07.558051 kernel: ... generic registers: 4 Nov 1 00:36:07.558056 kernel: ... value mask: 0000ffffffffffff Nov 1 00:36:07.558061 kernel: ... max period: 00007fffffffffff Nov 1 00:36:07.558066 kernel: ... fixed-purpose events: 3 Nov 1 00:36:07.558071 kernel: ... event mask: 000000070000000f Nov 1 00:36:07.558076 kernel: signal: max sigframe size: 2032 Nov 1 00:36:07.558081 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:36:07.558087 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Nov 1 00:36:07.558092 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:36:07.558097 kernel: x86: Booting SMP configuration: Nov 1 00:36:07.558103 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Nov 1 00:36:07.558108 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Nov 1 00:36:07.558113 kernel: #9 #10 #11 #12 #13 #14 #15 Nov 1 00:36:07.558118 kernel: smp: Brought up 1 node, 16 CPUs Nov 1 00:36:07.558123 kernel: smpboot: Max logical packages: 1 Nov 1 00:36:07.558129 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Nov 1 00:36:07.558134 kernel: devtmpfs: initialized Nov 1 00:36:07.558139 kernel: x86/mm: Memory block size: 128MB Nov 1 00:36:07.558144 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x61f60000-0x61f60fff] (4096 bytes) Nov 1 00:36:07.558149 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Nov 1 00:36:07.558155 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:36:07.558160 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Nov 1 00:36:07.558165 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:36:07.558170 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:36:07.558176 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:36:07.558181 kernel: audit: type=2000 audit(1761957361.122:1): state=initialized audit_enabled=0 res=1 Nov 1 00:36:07.558186 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:36:07.558191 kernel: thermal_sys: Registered thermal governor 'user_space' Nov 1 00:36:07.558196 kernel: cpuidle: using governor menu Nov 1 00:36:07.558201 kernel: ACPI: bus type PCI registered Nov 1 00:36:07.558206 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:36:07.558211 kernel: dca service started, version 1.12.1 Nov 1 00:36:07.558216 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Nov 1 00:36:07.558222 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Nov 1 00:36:07.558227 kernel: PCI: Using configuration type 1 for base access Nov 1 00:36:07.558232 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Nov 1 00:36:07.558237 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 1 00:36:07.558242 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:36:07.558247 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:36:07.558252 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:36:07.558257 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:36:07.558262 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:36:07.558268 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:36:07.558273 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:36:07.558278 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:36:07.558283 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Nov 1 00:36:07.558288 kernel: ACPI: Dynamic OEM Table Load: Nov 1 00:36:07.558293 kernel: ACPI: SSDT 0xFFFF93FEC021CB00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Nov 1 00:36:07.558299 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Nov 1 00:36:07.558304 kernel: ACPI: Dynamic OEM Table Load: Nov 1 00:36:07.558309 kernel: ACPI: SSDT 0xFFFF93FEC1CE8800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Nov 1 00:36:07.558315 kernel: ACPI: Dynamic OEM Table Load: Nov 1 00:36:07.558320 kernel: ACPI: SSDT 0xFFFF93FEC1C5F000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Nov 1 00:36:07.558325 kernel: ACPI: Dynamic OEM Table Load: Nov 1 00:36:07.558330 kernel: ACPI: SSDT 0xFFFF93FEC1D49800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Nov 1 00:36:07.558335 kernel: ACPI: Dynamic OEM Table Load: Nov 1 00:36:07.558339 kernel: ACPI: SSDT 0xFFFF93FEC0148000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Nov 1 00:36:07.558344 kernel: ACPI: Dynamic OEM Table Load: Nov 1 00:36:07.558351 kernel: ACPI: SSDT 0xFFFF93FEC1CEBC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Nov 1 00:36:07.558356 kernel: ACPI: Interpreter enabled Nov 1 00:36:07.558361 kernel: ACPI: PM: (supports S0 S5) Nov 1 00:36:07.558367 kernel: ACPI: Using IOAPIC for interrupt routing Nov 1 00:36:07.558372 kernel: HEST: Enabling Firmware First mode for corrected errors. Nov 1 00:36:07.558377 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Nov 1 00:36:07.558382 kernel: HEST: Table parsing has been initialized. Nov 1 00:36:07.558387 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Nov 1 00:36:07.558393 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 1 00:36:07.558398 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Nov 1 00:36:07.558403 kernel: ACPI: PM: Power Resource [USBC] Nov 1 00:36:07.558408 kernel: ACPI: PM: Power Resource [V0PR] Nov 1 00:36:07.558414 kernel: ACPI: PM: Power Resource [V1PR] Nov 1 00:36:07.558419 kernel: ACPI: PM: Power Resource [V2PR] Nov 1 00:36:07.558424 kernel: ACPI: PM: Power Resource [WRST] Nov 1 00:36:07.558429 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Nov 1 00:36:07.558434 kernel: ACPI: PM: Power Resource [FN00] Nov 1 00:36:07.558439 kernel: ACPI: PM: Power Resource [FN01] Nov 1 00:36:07.558444 kernel: ACPI: PM: Power Resource [FN02] Nov 1 00:36:07.558449 kernel: ACPI: PM: Power Resource [FN03] Nov 1 00:36:07.558454 kernel: ACPI: PM: Power Resource [FN04] Nov 1 00:36:07.558460 kernel: ACPI: PM: Power Resource [PIN] Nov 1 00:36:07.558465 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Nov 1 00:36:07.558536 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:36:07.558584 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Nov 1 00:36:07.558629 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Nov 1 00:36:07.558636 kernel: PCI host bridge to bus 0000:00 Nov 1 00:36:07.558682 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 1 00:36:07.558725 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 1 00:36:07.558764 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 1 00:36:07.558803 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Nov 1 00:36:07.558841 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Nov 1 00:36:07.558880 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Nov 1 00:36:07.558934 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Nov 1 00:36:07.558985 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Nov 1 00:36:07.559033 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.559085 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Nov 1 00:36:07.559131 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.559180 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Nov 1 00:36:07.559225 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Nov 1 00:36:07.559269 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Nov 1 00:36:07.559317 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Nov 1 00:36:07.559371 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Nov 1 00:36:07.559417 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Nov 1 00:36:07.559465 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Nov 1 00:36:07.559511 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Nov 1 00:36:07.559558 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Nov 1 00:36:07.559606 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Nov 1 00:36:07.559650 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Nov 1 00:36:07.559698 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Nov 1 00:36:07.559743 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Nov 1 00:36:07.559787 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Nov 1 00:36:07.559836 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Nov 1 00:36:07.559883 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Nov 1 00:36:07.559930 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Nov 1 00:36:07.559974 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Nov 1 00:36:07.560025 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Nov 1 00:36:07.560077 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Nov 1 00:36:07.560123 kernel: pci 0000:00:16.0: PME# supported from D3hot Nov 1 00:36:07.560172 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Nov 1 00:36:07.560219 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Nov 1 00:36:07.560263 kernel: pci 0000:00:16.1: PME# supported from D3hot Nov 1 00:36:07.560311 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Nov 1 00:36:07.560358 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Nov 1 00:36:07.560403 kernel: pci 0000:00:16.4: PME# supported from D3hot Nov 1 00:36:07.560451 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Nov 1 00:36:07.560496 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Nov 1 00:36:07.560542 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Nov 1 00:36:07.560587 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Nov 1 00:36:07.560630 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Nov 1 00:36:07.560675 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Nov 1 00:36:07.560719 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Nov 1 00:36:07.560762 kernel: pci 0000:00:17.0: PME# supported from D3hot Nov 1 00:36:07.560813 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Nov 1 00:36:07.560858 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.560911 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Nov 1 00:36:07.560956 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.561007 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Nov 1 00:36:07.561052 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.561101 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Nov 1 00:36:07.561145 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.561193 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Nov 1 00:36:07.561239 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.561289 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Nov 1 00:36:07.561334 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Nov 1 00:36:07.561427 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Nov 1 00:36:07.561479 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Nov 1 00:36:07.561523 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Nov 1 00:36:07.561567 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Nov 1 00:36:07.561630 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Nov 1 00:36:07.561676 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Nov 1 00:36:07.561720 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Nov 1 00:36:07.561770 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Nov 1 00:36:07.561817 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Nov 1 00:36:07.561862 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Nov 1 00:36:07.561909 kernel: pci 0000:02:00.0: PME# supported from D3cold Nov 1 00:36:07.561955 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Nov 1 00:36:07.562002 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Nov 1 00:36:07.562052 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Nov 1 00:36:07.562098 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Nov 1 00:36:07.562143 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Nov 1 00:36:07.562188 kernel: pci 0000:02:00.1: PME# supported from D3cold Nov 1 00:36:07.562234 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Nov 1 00:36:07.562280 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Nov 1 00:36:07.562326 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Nov 1 00:36:07.562417 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Nov 1 00:36:07.562462 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Nov 1 00:36:07.562506 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Nov 1 00:36:07.562556 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Nov 1 00:36:07.562603 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Nov 1 00:36:07.562648 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Nov 1 00:36:07.562695 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Nov 1 00:36:07.562740 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Nov 1 00:36:07.562785 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.562829 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Nov 1 00:36:07.562872 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Nov 1 00:36:07.562916 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Nov 1 00:36:07.562965 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect Nov 1 00:36:07.563014 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Nov 1 00:36:07.563132 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Nov 1 00:36:07.563179 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Nov 1 00:36:07.563224 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Nov 1 00:36:07.563269 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Nov 1 00:36:07.563313 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Nov 1 00:36:07.563382 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Nov 1 00:36:07.563443 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Nov 1 00:36:07.563489 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Nov 1 00:36:07.563542 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Nov 1 00:36:07.563587 kernel: pci 0000:07:00.0: enabling Extended Tags Nov 1 00:36:07.563633 kernel: pci 0000:07:00.0: supports D1 D2 Nov 1 00:36:07.563677 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:36:07.563721 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Nov 1 00:36:07.563765 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Nov 1 00:36:07.563811 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Nov 1 00:36:07.563861 kernel: pci_bus 0000:08: extended config space not accessible Nov 1 00:36:07.563913 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Nov 1 00:36:07.563961 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Nov 1 00:36:07.564009 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Nov 1 00:36:07.564057 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Nov 1 00:36:07.564106 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 1 00:36:07.564155 kernel: pci 0000:08:00.0: supports D1 D2 Nov 1 00:36:07.564204 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Nov 1 00:36:07.564249 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Nov 1 00:36:07.564295 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Nov 1 00:36:07.564340 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Nov 1 00:36:07.564349 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Nov 1 00:36:07.564377 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Nov 1 00:36:07.564382 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Nov 1 00:36:07.564389 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Nov 1 00:36:07.564414 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Nov 1 00:36:07.564419 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Nov 1 00:36:07.564424 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Nov 1 00:36:07.564429 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Nov 1 00:36:07.564434 kernel: iommu: Default domain type: Translated Nov 1 00:36:07.564440 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 1 00:36:07.564488 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Nov 1 00:36:07.564536 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 1 00:36:07.564586 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Nov 1 00:36:07.564594 kernel: vgaarb: loaded Nov 1 00:36:07.564599 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:36:07.564605 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:36:07.564610 kernel: PTP clock support registered Nov 1 00:36:07.564615 kernel: PCI: Using ACPI for IRQ routing Nov 1 00:36:07.564621 kernel: PCI: pci_cache_line_size set to 64 bytes Nov 1 00:36:07.564627 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Nov 1 00:36:07.564632 kernel: e820: reserve RAM buffer [mem 0x61f60000-0x63ffffff] Nov 1 00:36:07.564638 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Nov 1 00:36:07.564643 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Nov 1 00:36:07.564648 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Nov 1 00:36:07.564654 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Nov 1 00:36:07.564659 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Nov 1 00:36:07.564664 kernel: clocksource: Switched to clocksource tsc-early Nov 1 00:36:07.564670 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:36:07.564675 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:36:07.564680 kernel: pnp: PnP ACPI init Nov 1 00:36:07.564727 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Nov 1 00:36:07.564771 kernel: pnp 00:02: [dma 0 disabled] Nov 1 00:36:07.564818 kernel: pnp 00:03: [dma 0 disabled] Nov 1 00:36:07.564861 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Nov 1 00:36:07.564904 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Nov 1 00:36:07.564947 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Nov 1 00:36:07.564992 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Nov 1 00:36:07.565033 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Nov 1 00:36:07.565072 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Nov 1 00:36:07.565112 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Nov 1 00:36:07.565151 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Nov 1 00:36:07.565191 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Nov 1 00:36:07.565230 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Nov 1 00:36:07.565272 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Nov 1 00:36:07.565316 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Nov 1 00:36:07.565381 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Nov 1 00:36:07.565421 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Nov 1 00:36:07.565461 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Nov 1 00:36:07.565502 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Nov 1 00:36:07.565541 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Nov 1 00:36:07.565584 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Nov 1 00:36:07.565627 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Nov 1 00:36:07.565635 kernel: pnp: PnP ACPI: found 10 devices Nov 1 00:36:07.565641 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 1 00:36:07.565646 kernel: NET: Registered PF_INET protocol family Nov 1 00:36:07.565651 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:36:07.565657 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Nov 1 00:36:07.565663 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:36:07.565669 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:36:07.565674 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Nov 1 00:36:07.565680 kernel: TCP: Hash tables configured (established 262144 bind 65536) Nov 1 00:36:07.565685 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Nov 1 00:36:07.565690 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Nov 1 00:36:07.565696 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:36:07.565701 kernel: NET: Registered PF_XDP protocol family Nov 1 00:36:07.565747 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Nov 1 00:36:07.565794 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Nov 1 00:36:07.565838 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Nov 1 00:36:07.565884 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Nov 1 00:36:07.565931 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Nov 1 00:36:07.565978 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Nov 1 00:36:07.566026 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Nov 1 00:36:07.566073 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Nov 1 00:36:07.566118 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Nov 1 00:36:07.566165 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Nov 1 00:36:07.566209 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Nov 1 00:36:07.566256 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Nov 1 00:36:07.566301 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Nov 1 00:36:07.566346 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Nov 1 00:36:07.566397 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Nov 1 00:36:07.566442 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Nov 1 00:36:07.566488 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Nov 1 00:36:07.566534 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Nov 1 00:36:07.566579 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Nov 1 00:36:07.566626 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Nov 1 00:36:07.566672 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Nov 1 00:36:07.566719 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Nov 1 00:36:07.566764 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Nov 1 00:36:07.566812 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Nov 1 00:36:07.566858 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Nov 1 00:36:07.566900 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Nov 1 00:36:07.566941 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 1 00:36:07.566982 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 1 00:36:07.567021 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 1 00:36:07.567060 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Nov 1 00:36:07.567100 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Nov 1 00:36:07.567149 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Nov 1 00:36:07.567193 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Nov 1 00:36:07.567239 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Nov 1 00:36:07.567281 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Nov 1 00:36:07.567326 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Nov 1 00:36:07.567370 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Nov 1 00:36:07.567418 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Nov 1 00:36:07.567460 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Nov 1 00:36:07.567505 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Nov 1 00:36:07.567549 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Nov 1 00:36:07.567556 kernel: PCI: CLS 64 bytes, default 64 Nov 1 00:36:07.567562 kernel: DMAR: No ATSR found Nov 1 00:36:07.567567 kernel: DMAR: No SATC found Nov 1 00:36:07.567574 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Nov 1 00:36:07.567579 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Nov 1 00:36:07.567585 kernel: DMAR: IOMMU feature nwfs inconsistent Nov 1 00:36:07.567590 kernel: DMAR: IOMMU feature pasid inconsistent Nov 1 00:36:07.567595 kernel: DMAR: IOMMU feature eafs inconsistent Nov 1 00:36:07.567601 kernel: DMAR: IOMMU feature prs inconsistent Nov 1 00:36:07.567606 kernel: DMAR: IOMMU feature nest inconsistent Nov 1 00:36:07.567611 kernel: DMAR: IOMMU feature mts inconsistent Nov 1 00:36:07.567617 kernel: DMAR: IOMMU feature sc_support inconsistent Nov 1 00:36:07.567622 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Nov 1 00:36:07.567628 kernel: DMAR: dmar0: Using Queued invalidation Nov 1 00:36:07.567634 kernel: DMAR: dmar1: Using Queued invalidation Nov 1 00:36:07.567680 kernel: pci 0000:00:00.0: Adding to iommu group 0 Nov 1 00:36:07.567726 kernel: pci 0000:00:01.0: Adding to iommu group 1 Nov 1 00:36:07.567772 kernel: pci 0000:00:01.1: Adding to iommu group 1 Nov 1 00:36:07.567817 kernel: pci 0000:00:02.0: Adding to iommu group 2 Nov 1 00:36:07.567861 kernel: pci 0000:00:08.0: Adding to iommu group 3 Nov 1 00:36:07.567907 kernel: pci 0000:00:12.0: Adding to iommu group 4 Nov 1 00:36:07.567953 kernel: pci 0000:00:14.0: Adding to iommu group 5 Nov 1 00:36:07.567998 kernel: pci 0000:00:14.2: Adding to iommu group 5 Nov 1 00:36:07.568041 kernel: pci 0000:00:15.0: Adding to iommu group 6 Nov 1 00:36:07.568086 kernel: pci 0000:00:15.1: Adding to iommu group 6 Nov 1 00:36:07.568129 kernel: pci 0000:00:16.0: Adding to iommu group 7 Nov 1 00:36:07.568173 kernel: pci 0000:00:16.1: Adding to iommu group 7 Nov 1 00:36:07.568218 kernel: pci 0000:00:16.4: Adding to iommu group 7 Nov 1 00:36:07.568262 kernel: pci 0000:00:17.0: Adding to iommu group 8 Nov 1 00:36:07.568310 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Nov 1 00:36:07.568357 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Nov 1 00:36:07.568403 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Nov 1 00:36:07.568447 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Nov 1 00:36:07.568492 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Nov 1 00:36:07.568536 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Nov 1 00:36:07.568597 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Nov 1 00:36:07.568641 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Nov 1 00:36:07.568687 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Nov 1 00:36:07.568734 kernel: pci 0000:02:00.0: Adding to iommu group 1 Nov 1 00:36:07.568779 kernel: pci 0000:02:00.1: Adding to iommu group 1 Nov 1 00:36:07.568825 kernel: pci 0000:04:00.0: Adding to iommu group 16 Nov 1 00:36:07.568869 kernel: pci 0000:05:00.0: Adding to iommu group 17 Nov 1 00:36:07.568915 kernel: pci 0000:07:00.0: Adding to iommu group 18 Nov 1 00:36:07.568963 kernel: pci 0000:08:00.0: Adding to iommu group 18 Nov 1 00:36:07.568970 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Nov 1 00:36:07.568976 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Nov 1 00:36:07.568983 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Nov 1 00:36:07.568988 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Nov 1 00:36:07.568993 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Nov 1 00:36:07.568998 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Nov 1 00:36:07.569004 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Nov 1 00:36:07.569009 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Nov 1 00:36:07.569056 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Nov 1 00:36:07.569064 kernel: Initialise system trusted keyrings Nov 1 00:36:07.569070 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Nov 1 00:36:07.569076 kernel: Key type asymmetric registered Nov 1 00:36:07.569081 kernel: Asymmetric key parser 'x509' registered Nov 1 00:36:07.569086 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:36:07.569091 kernel: io scheduler mq-deadline registered Nov 1 00:36:07.569096 kernel: io scheduler kyber registered Nov 1 00:36:07.569102 kernel: io scheduler bfq registered Nov 1 00:36:07.569146 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Nov 1 00:36:07.569190 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Nov 1 00:36:07.569237 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Nov 1 00:36:07.569281 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Nov 1 00:36:07.569326 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Nov 1 00:36:07.569397 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Nov 1 00:36:07.569462 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Nov 1 00:36:07.569514 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Nov 1 00:36:07.569523 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Nov 1 00:36:07.569529 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Nov 1 00:36:07.569534 kernel: pstore: Registered erst as persistent store backend Nov 1 00:36:07.569539 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Nov 1 00:36:07.569545 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:36:07.569550 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 1 00:36:07.569555 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Nov 1 00:36:07.569601 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Nov 1 00:36:07.569609 kernel: i8042: PNP: No PS/2 controller found. Nov 1 00:36:07.569650 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Nov 1 00:36:07.569691 kernel: rtc_cmos rtc_cmos: registered as rtc0 Nov 1 00:36:07.569733 kernel: rtc_cmos rtc_cmos: setting system clock to 2025-11-01T00:36:06 UTC (1761957366) Nov 1 00:36:07.569773 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Nov 1 00:36:07.569780 kernel: intel_pstate: Intel P-state driver initializing Nov 1 00:36:07.569786 kernel: intel_pstate: Disabling energy efficiency optimization Nov 1 00:36:07.569791 kernel: intel_pstate: HWP enabled Nov 1 00:36:07.569797 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Nov 1 00:36:07.569803 kernel: vesafb: scrolling: redraw Nov 1 00:36:07.569809 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Nov 1 00:36:07.569814 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x00000000ede50d76, using 768k, total 768k Nov 1 00:36:07.569819 kernel: Console: switching to colour frame buffer device 128x48 Nov 1 00:36:07.569825 kernel: fb0: VESA VGA frame buffer device Nov 1 00:36:07.569830 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:36:07.569835 kernel: Segment Routing with IPv6 Nov 1 00:36:07.569840 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:36:07.569845 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:36:07.569852 kernel: Key type dns_resolver registered Nov 1 00:36:07.569857 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Nov 1 00:36:07.569862 kernel: microcode: Microcode Update Driver: v2.2. Nov 1 00:36:07.569867 kernel: IPI shorthand broadcast: enabled Nov 1 00:36:07.569873 kernel: sched_clock: Marking stable (1856899289, 1353830242)->(4657337517, -1446607986) Nov 1 00:36:07.569878 kernel: registered taskstats version 1 Nov 1 00:36:07.569883 kernel: Loading compiled-in X.509 certificates Nov 1 00:36:07.569888 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' Nov 1 00:36:07.569894 kernel: Key type .fscrypt registered Nov 1 00:36:07.569900 kernel: Key type fscrypt-provisioning registered Nov 1 00:36:07.569905 kernel: pstore: Using crash dump compression: deflate Nov 1 00:36:07.569910 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:36:07.569916 kernel: ima: No architecture policies found Nov 1 00:36:07.569921 kernel: clk: Disabling unused clocks Nov 1 00:36:07.569926 kernel: Freeing unused kernel image (initmem) memory: 47496K Nov 1 00:36:07.569931 kernel: Write protecting the kernel read-only data: 28672k Nov 1 00:36:07.569937 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 1 00:36:07.569942 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Nov 1 00:36:07.569948 kernel: Run /init as init process Nov 1 00:36:07.569953 kernel: with arguments: Nov 1 00:36:07.569959 kernel: /init Nov 1 00:36:07.569964 kernel: with environment: Nov 1 00:36:07.569969 kernel: HOME=/ Nov 1 00:36:07.569974 kernel: TERM=linux Nov 1 00:36:07.569979 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:36:07.569985 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:36:07.569993 systemd[1]: Detected architecture x86-64. Nov 1 00:36:07.569999 systemd[1]: Running in initrd. Nov 1 00:36:07.570004 systemd[1]: No hostname configured, using default hostname. Nov 1 00:36:07.570009 systemd[1]: Hostname set to . Nov 1 00:36:07.570015 systemd[1]: Initializing machine ID from random generator. Nov 1 00:36:07.570020 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:36:07.570026 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:36:07.570031 systemd[1]: Reached target cryptsetup.target. Nov 1 00:36:07.570037 systemd[1]: Reached target paths.target. Nov 1 00:36:07.570043 systemd[1]: Reached target slices.target. Nov 1 00:36:07.570048 systemd[1]: Reached target swap.target. Nov 1 00:36:07.570053 systemd[1]: Reached target timers.target. Nov 1 00:36:07.570058 systemd[1]: Listening on iscsid.socket. Nov 1 00:36:07.570064 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:36:07.570070 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:36:07.570076 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:36:07.570081 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:36:07.570087 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Nov 1 00:36:07.570092 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:36:07.570098 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Nov 1 00:36:07.570104 kernel: clocksource: Switched to clocksource tsc Nov 1 00:36:07.570109 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:36:07.570114 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:36:07.570120 systemd[1]: Reached target sockets.target. Nov 1 00:36:07.570126 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:36:07.570132 systemd[1]: Finished network-cleanup.service. Nov 1 00:36:07.570137 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:36:07.570142 systemd[1]: Starting systemd-journald.service... Nov 1 00:36:07.570148 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:36:07.570155 systemd-journald[268]: Journal started Nov 1 00:36:07.570181 systemd-journald[268]: Runtime Journal (/run/log/journal/46b02572664c44d197d41c448a62bfa3) is 8.0M, max 636.8M, 628.8M free. Nov 1 00:36:07.572706 systemd-modules-load[269]: Inserted module 'overlay' Nov 1 00:36:07.578000 audit: BPF prog-id=6 op=LOAD Nov 1 00:36:07.596352 kernel: audit: type=1334 audit(1761957367.578:2): prog-id=6 op=LOAD Nov 1 00:36:07.596366 systemd[1]: Starting systemd-resolved.service... Nov 1 00:36:07.647390 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:36:07.647406 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:36:07.680400 kernel: Bridge firewalling registered Nov 1 00:36:07.680415 systemd[1]: Started systemd-journald.service. Nov 1 00:36:07.694536 systemd-modules-load[269]: Inserted module 'br_netfilter' Nov 1 00:36:07.742486 kernel: audit: type=1130 audit(1761957367.702:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.697295 systemd-resolved[272]: Positive Trust Anchors: Nov 1 00:36:07.807394 kernel: SCSI subsystem initialized Nov 1 00:36:07.807494 kernel: audit: type=1130 audit(1761957367.754:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.697302 systemd-resolved[272]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:36:07.923442 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:36:07.923453 kernel: audit: type=1130 audit(1761957367.827:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.923461 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:36:07.923467 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:36:07.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.697322 systemd-resolved[272]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:36:08.021565 kernel: audit: type=1130 audit(1761957367.932:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.698923 systemd-resolved[272]: Defaulting to hostname 'linux'. Nov 1 00:36:08.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.702576 systemd[1]: Started systemd-resolved.service. Nov 1 00:36:08.137568 kernel: audit: type=1130 audit(1761957368.029:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.137582 kernel: audit: type=1130 audit(1761957368.084:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:07.754521 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:36:07.827518 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:36:07.926066 systemd-modules-load[269]: Inserted module 'dm_multipath' Nov 1 00:36:07.932658 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:36:08.029856 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:36:08.084663 systemd[1]: Reached target nss-lookup.target. Nov 1 00:36:08.146951 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:36:08.167895 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:36:08.168211 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:36:08.170991 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:36:08.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.171726 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:36:08.292586 kernel: audit: type=1130 audit(1761957368.170:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.292598 kernel: audit: type=1130 audit(1761957368.235:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.235694 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:36:08.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.300948 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:36:08.322458 dracut-cmdline[295]: dracut-dracut-053 Nov 1 00:36:08.322458 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Nov 1 00:36:08.322458 dracut-cmdline[295]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:36:08.395437 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:36:08.395453 kernel: iscsi: registered transport (tcp) Nov 1 00:36:08.455211 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:36:08.455230 kernel: QLogic iSCSI HBA Driver Nov 1 00:36:08.471481 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:36:08.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:08.480062 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:36:08.536413 kernel: raid6: avx2x4 gen() 48874 MB/s Nov 1 00:36:08.571412 kernel: raid6: avx2x4 xor() 17501 MB/s Nov 1 00:36:08.606412 kernel: raid6: avx2x2 gen() 53775 MB/s Nov 1 00:36:08.641425 kernel: raid6: avx2x2 xor() 32144 MB/s Nov 1 00:36:08.676421 kernel: raid6: avx2x1 gen() 45174 MB/s Nov 1 00:36:08.711420 kernel: raid6: avx2x1 xor() 27907 MB/s Nov 1 00:36:08.745417 kernel: raid6: sse2x4 gen() 21363 MB/s Nov 1 00:36:08.779421 kernel: raid6: sse2x4 xor() 11990 MB/s Nov 1 00:36:08.813420 kernel: raid6: sse2x2 gen() 21666 MB/s Nov 1 00:36:08.847382 kernel: raid6: sse2x2 xor() 13431 MB/s Nov 1 00:36:08.881425 kernel: raid6: sse2x1 gen() 18291 MB/s Nov 1 00:36:08.933253 kernel: raid6: sse2x1 xor() 8917 MB/s Nov 1 00:36:08.933269 kernel: raid6: using algorithm avx2x2 gen() 53775 MB/s Nov 1 00:36:08.933277 kernel: raid6: .... xor() 32144 MB/s, rmw enabled Nov 1 00:36:08.951425 kernel: raid6: using avx2x2 recovery algorithm Nov 1 00:36:08.998354 kernel: xor: automatically using best checksumming function avx Nov 1 00:36:09.078356 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Nov 1 00:36:09.082943 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:36:09.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:09.091000 audit: BPF prog-id=7 op=LOAD Nov 1 00:36:09.091000 audit: BPF prog-id=8 op=LOAD Nov 1 00:36:09.092434 systemd[1]: Starting systemd-udevd.service... Nov 1 00:36:09.100305 systemd-udevd[474]: Using default interface naming scheme 'v252'. Nov 1 00:36:09.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:09.105474 systemd[1]: Started systemd-udevd.service. Nov 1 00:36:09.145402 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation Nov 1 00:36:09.122324 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:36:09.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:09.149000 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:36:09.163252 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:36:09.217053 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:36:09.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:09.246357 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:36:09.273362 kernel: AVX2 version of gcm_enc/dec engaged. Nov 1 00:36:09.293356 kernel: AES CTR mode by8 optimization enabled Nov 1 00:36:09.293385 kernel: ACPI: bus type USB registered Nov 1 00:36:09.293393 kernel: libata version 3.00 loaded. Nov 1 00:36:09.309353 kernel: usbcore: registered new interface driver usbfs Nov 1 00:36:09.327305 kernel: usbcore: registered new interface driver hub Nov 1 00:36:09.344799 kernel: usbcore: registered new device driver usb Nov 1 00:36:09.362356 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Nov 1 00:36:09.396011 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Nov 1 00:36:09.403353 kernel: ahci 0000:00:17.0: version 3.0 Nov 1 00:36:09.435940 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Nov 1 00:36:09.920479 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Nov 1 00:36:10.011127 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Nov 1 00:36:10.011192 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Nov 1 00:36:10.011247 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Nov 1 00:36:10.011301 kernel: igb 0000:04:00.0: added PHC on eth0 Nov 1 00:36:10.011367 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Nov 1 00:36:10.011423 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:38 Nov 1 00:36:10.011475 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Nov 1 00:36:10.011528 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Nov 1 00:36:10.011580 kernel: scsi host0: ahci Nov 1 00:36:10.011640 kernel: scsi host1: ahci Nov 1 00:36:10.011699 kernel: scsi host2: ahci Nov 1 00:36:10.011756 kernel: scsi host3: ahci Nov 1 00:36:10.011811 kernel: scsi host4: ahci Nov 1 00:36:10.011865 kernel: scsi host5: ahci Nov 1 00:36:10.011920 kernel: scsi host6: ahci Nov 1 00:36:10.011978 kernel: scsi host7: ahci Nov 1 00:36:10.012034 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 134 Nov 1 00:36:10.012043 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 134 Nov 1 00:36:10.012050 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 134 Nov 1 00:36:10.012056 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 134 Nov 1 00:36:10.012063 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 134 Nov 1 00:36:10.012069 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 134 Nov 1 00:36:10.012075 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 134 Nov 1 00:36:10.012082 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 134 Nov 1 00:36:10.012088 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Nov 1 00:36:10.012142 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Nov 1 00:36:10.012195 kernel: igb 0000:05:00.0: added PHC on eth1 Nov 1 00:36:10.012250 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Nov 1 00:36:10.012303 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:39 Nov 1 00:36:10.012360 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Nov 1 00:36:10.012415 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Nov 1 00:36:10.012468 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Nov 1 00:36:10.012521 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Nov 1 00:36:10.012571 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Nov 1 00:36:10.012580 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Nov 1 00:36:10.012631 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Nov 1 00:36:10.012684 kernel: ata6: SATA link down (SStatus 0 SControl 300) Nov 1 00:36:10.012692 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Nov 1 00:36:10.012742 kernel: ata5: SATA link down (SStatus 0 SControl 300) Nov 1 00:36:10.012749 kernel: hub 1-0:1.0: USB hub found Nov 1 00:36:10.012811 kernel: ata3: SATA link down (SStatus 0 SControl 300) Nov 1 00:36:10.012818 kernel: hub 1-0:1.0: 16 ports detected Nov 1 00:36:10.012875 kernel: ata4: SATA link down (SStatus 0 SControl 300) Nov 1 00:36:10.012883 kernel: hub 2-0:1.0: USB hub found Nov 1 00:36:10.012942 kernel: ata8: SATA link down (SStatus 0 SControl 300) Nov 1 00:36:10.012950 kernel: hub 2-0:1.0: 10 ports detected Nov 1 00:36:10.013004 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Nov 1 00:36:10.013011 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Nov 1 00:36:10.013066 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Nov 1 00:36:10.013075 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Nov 1 00:36:10.699132 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Nov 1 00:36:10.699144 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Nov 1 00:36:10.699210 kernel: ata7: SATA link down (SStatus 0 SControl 300) Nov 1 00:36:10.699218 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Nov 1 00:36:10.782027 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Nov 1 00:36:10.782036 kernel: ata1.00: Features: NCQ-prio Nov 1 00:36:10.782043 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Nov 1 00:36:10.782052 kernel: ata2.00: Features: NCQ-prio Nov 1 00:36:10.782059 kernel: ata1.00: configured for UDMA/133 Nov 1 00:36:10.782066 kernel: ata2.00: configured for UDMA/133 Nov 1 00:36:10.782072 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Nov 1 00:36:10.828627 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Nov 1 00:36:10.828742 kernel: hub 1-14:1.0: USB hub found Nov 1 00:36:10.828845 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Nov 1 00:36:10.828923 kernel: hub 1-14:1.0: 4 ports detected Nov 1 00:36:10.829006 kernel: port_module: 9 callbacks suppressed Nov 1 00:36:10.829015 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Nov 1 00:36:10.829096 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Nov 1 00:36:10.829189 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:10.829202 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Nov 1 00:36:10.829294 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Nov 1 00:36:10.829386 kernel: ata2.00: Enabling discard_zeroes_data Nov 1 00:36:10.829395 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Nov 1 00:36:10.829458 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Nov 1 00:36:10.829521 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Nov 1 00:36:10.829579 kernel: sd 1:0:0:0: [sdb] Write Protect is off Nov 1 00:36:10.829637 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Nov 1 00:36:10.829694 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Nov 1 00:36:10.829753 kernel: ata2.00: Enabling discard_zeroes_data Nov 1 00:36:10.829761 kernel: ata2.00: Enabling discard_zeroes_data Nov 1 00:36:10.829767 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Nov 1 00:36:10.829823 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Nov 1 00:36:10.829880 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Nov 1 00:36:10.829935 kernel: sd 0:0:0:0: [sda] Write Protect is off Nov 1 00:36:10.829992 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Nov 1 00:36:10.830095 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Nov 1 00:36:10.830157 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Nov 1 00:36:10.830214 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:10.830222 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 00:36:10.830229 kernel: GPT:9289727 != 937703087 Nov 1 00:36:10.830235 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 00:36:10.830242 kernel: GPT:9289727 != 937703087 Nov 1 00:36:10.830247 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 00:36:10.830254 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:36:10.830260 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:10.830268 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Nov 1 00:36:10.830325 kernel: hid: raw HID events driver (C) Jiri Kosina Nov 1 00:36:10.830332 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Nov 1 00:36:10.860355 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by (udev-worker) (544) Nov 1 00:36:10.861204 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:36:10.975413 kernel: usbcore: registered new interface driver usbhid Nov 1 00:36:10.975430 kernel: usbhid: USB HID core driver Nov 1 00:36:10.975438 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Nov 1 00:36:10.975520 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Nov 1 00:36:10.895444 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:36:10.937202 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:36:10.997268 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:36:11.073828 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Nov 1 00:36:11.073915 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Nov 1 00:36:11.073924 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Nov 1 00:36:11.109788 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:11.042619 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:36:11.145503 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:36:11.094958 systemd[1]: Starting disk-uuid.service... Nov 1 00:36:11.159454 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:11.159506 disk-uuid[693]: Primary Header is updated. Nov 1 00:36:11.159506 disk-uuid[693]: Secondary Entries is updated. Nov 1 00:36:11.159506 disk-uuid[693]: Secondary Header is updated. Nov 1 00:36:11.216430 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:36:11.216441 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:11.216448 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:36:12.203235 kernel: ata1.00: Enabling discard_zeroes_data Nov 1 00:36:12.222393 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:36:12.222410 disk-uuid[694]: The operation has completed successfully. Nov 1 00:36:12.264280 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:36:12.360947 kernel: audit: type=1130 audit(1761957372.271:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.360963 kernel: audit: type=1131 audit(1761957372.271:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.264343 systemd[1]: Finished disk-uuid.service. Nov 1 00:36:12.390389 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Nov 1 00:36:12.272089 systemd[1]: Starting verity-setup.service... Nov 1 00:36:12.424462 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:36:12.433596 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:36:12.446714 systemd[1]: Finished verity-setup.service. Nov 1 00:36:12.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.511354 kernel: audit: type=1130 audit(1761957372.462:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.569125 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:36:12.584471 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:36:12.576653 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:36:12.668069 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:36:12.668084 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:36:12.668091 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:36:12.668102 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:36:12.577053 systemd[1]: Starting ignition-setup.service... Nov 1 00:36:12.599781 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:36:12.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.677833 systemd[1]: Finished ignition-setup.service. Nov 1 00:36:12.800886 kernel: audit: type=1130 audit(1761957372.693:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.800901 kernel: audit: type=1130 audit(1761957372.751:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.693713 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:36:12.838233 kernel: audit: type=1334 audit(1761957372.814:24): prog-id=9 op=LOAD Nov 1 00:36:12.814000 audit: BPF prog-id=9 op=LOAD Nov 1 00:36:12.752053 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:36:12.815947 systemd[1]: Starting systemd-networkd.service... Nov 1 00:36:12.855253 systemd-networkd[882]: lo: Link UP Nov 1 00:36:12.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.890028 ignition[871]: Ignition 2.14.0 Nov 1 00:36:12.933494 kernel: audit: type=1130 audit(1761957372.868:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.855255 systemd-networkd[882]: lo: Gained carrier Nov 1 00:36:12.890033 ignition[871]: Stage: fetch-offline Nov 1 00:36:12.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.855604 systemd-networkd[882]: Enumeration completed Nov 1 00:36:13.095505 kernel: audit: type=1130 audit(1761957372.947:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:13.095522 kernel: audit: type=1130 audit(1761957373.007:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:13.095530 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Nov 1 00:36:13.095609 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Nov 1 00:36:13.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.890060 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:36:12.855672 systemd[1]: Started systemd-networkd.service. Nov 1 00:36:12.890074 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Nov 1 00:36:12.856330 systemd-networkd[882]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:36:12.898070 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Nov 1 00:36:13.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.868505 systemd[1]: Reached target network.target. Nov 1 00:36:13.178455 iscsid[898]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:36:13.178455 iscsid[898]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Nov 1 00:36:13.178455 iscsid[898]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:36:13.178455 iscsid[898]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:36:13.178455 iscsid[898]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:36:13.178455 iscsid[898]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:36:13.178455 iscsid[898]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:36:13.348464 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Nov 1 00:36:13.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:13.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:12.898134 ignition[871]: parsed url from cmdline: "" Nov 1 00:36:12.900646 unknown[871]: fetched base config from "system" Nov 1 00:36:12.898136 ignition[871]: no config URL provided Nov 1 00:36:12.900652 unknown[871]: fetched user config from "system" Nov 1 00:36:12.898139 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:36:12.927618 systemd[1]: Starting iscsiuio.service... Nov 1 00:36:12.898151 ignition[871]: parsing config with SHA512: a11783a8b7aaca04f07c47c03c9c2c5dc255e852a2dac8bf26e5bed6d727661dd3ad008515d300b2b4baea91daad194f76e44de01d4280236132aca534ce9b1e Nov 1 00:36:12.940644 systemd[1]: Started iscsiuio.service. Nov 1 00:36:12.900837 ignition[871]: fetch-offline: fetch-offline passed Nov 1 00:36:12.947722 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:36:12.900841 ignition[871]: POST message to Packet Timeline Nov 1 00:36:13.007599 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Nov 1 00:36:12.900848 ignition[871]: POST Status error: resource requires networking Nov 1 00:36:13.008049 systemd[1]: Starting ignition-kargs.service... Nov 1 00:36:12.900890 ignition[871]: Ignition finished successfully Nov 1 00:36:13.083907 systemd-networkd[882]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:36:13.107881 ignition[892]: Ignition 2.14.0 Nov 1 00:36:13.108098 systemd[1]: Starting iscsid.service... Nov 1 00:36:13.107885 ignition[892]: Stage: kargs Nov 1 00:36:13.133545 systemd[1]: Started iscsid.service. Nov 1 00:36:13.107943 ignition[892]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:36:13.155652 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:36:13.107952 ignition[892]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Nov 1 00:36:13.171547 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:36:13.109270 ignition[892]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Nov 1 00:36:13.186586 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:36:13.110512 ignition[892]: kargs: kargs passed Nov 1 00:36:13.230500 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:36:13.110515 ignition[892]: POST message to Packet Timeline Nov 1 00:36:13.257575 systemd[1]: Reached target remote-fs.target. Nov 1 00:36:13.110526 ignition[892]: GET https://metadata.packet.net/metadata: attempt #1 Nov 1 00:36:13.274197 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:36:13.112812 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33684->[::1]:53: read: connection refused Nov 1 00:36:13.283737 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:36:13.313256 ignition[892]: GET https://metadata.packet.net/metadata: attempt #2 Nov 1 00:36:13.333593 systemd-networkd[882]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:36:13.314085 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58287->[::1]:53: read: connection refused Nov 1 00:36:13.362608 systemd-networkd[882]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:36:13.391187 systemd-networkd[882]: enp2s0f1np1: Link UP Nov 1 00:36:13.391496 systemd-networkd[882]: enp2s0f1np1: Gained carrier Nov 1 00:36:13.401900 systemd-networkd[882]: enp2s0f0np0: Link UP Nov 1 00:36:13.402319 systemd-networkd[882]: eno2: Link UP Nov 1 00:36:13.402760 systemd-networkd[882]: eno1: Link UP Nov 1 00:36:13.714206 ignition[892]: GET https://metadata.packet.net/metadata: attempt #3 Nov 1 00:36:13.715441 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:54456->[::1]:53: read: connection refused Nov 1 00:36:14.132983 systemd-networkd[882]: enp2s0f0np0: Gained carrier Nov 1 00:36:14.141607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Nov 1 00:36:14.161796 systemd-networkd[882]: enp2s0f0np0: DHCPv4 address 145.40.82.39/31, gateway 145.40.82.38 acquired from 145.40.83.140 Nov 1 00:36:14.515682 ignition[892]: GET https://metadata.packet.net/metadata: attempt #4 Nov 1 00:36:14.517095 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49601->[::1]:53: read: connection refused Nov 1 00:36:14.813824 systemd-networkd[882]: enp2s0f1np1: Gained IPv6LL Nov 1 00:36:15.901847 systemd-networkd[882]: enp2s0f0np0: Gained IPv6LL Nov 1 00:36:16.118508 ignition[892]: GET https://metadata.packet.net/metadata: attempt #5 Nov 1 00:36:16.119879 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60644->[::1]:53: read: connection refused Nov 1 00:36:19.323090 ignition[892]: GET https://metadata.packet.net/metadata: attempt #6 Nov 1 00:36:21.576846 ignition[892]: GET result: OK Nov 1 00:36:22.897198 ignition[892]: Ignition finished successfully Nov 1 00:36:22.901943 systemd[1]: Finished ignition-kargs.service. Nov 1 00:36:22.989877 kernel: kauditd_printk_skb: 3 callbacks suppressed Nov 1 00:36:22.989893 kernel: audit: type=1130 audit(1761957382.912:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:22.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:22.921406 ignition[920]: Ignition 2.14.0 Nov 1 00:36:22.914706 systemd[1]: Starting ignition-disks.service... Nov 1 00:36:22.921410 ignition[920]: Stage: disks Nov 1 00:36:22.921488 ignition[920]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:36:22.921497 ignition[920]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Nov 1 00:36:22.922871 ignition[920]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Nov 1 00:36:22.924177 ignition[920]: disks: disks passed Nov 1 00:36:22.924180 ignition[920]: POST message to Packet Timeline Nov 1 00:36:22.924190 ignition[920]: GET https://metadata.packet.net/metadata: attempt #1 Nov 1 00:36:23.973185 ignition[920]: GET result: OK Nov 1 00:36:24.459156 ignition[920]: Ignition finished successfully Nov 1 00:36:24.462394 systemd[1]: Finished ignition-disks.service. Nov 1 00:36:24.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:24.476944 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:36:24.556656 kernel: audit: type=1130 audit(1761957384.476:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:24.541599 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:36:24.541634 systemd[1]: Reached target local-fs.target. Nov 1 00:36:24.565619 systemd[1]: Reached target sysinit.target. Nov 1 00:36:24.572615 systemd[1]: Reached target basic.target. Nov 1 00:36:24.586145 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:36:24.611200 systemd-fsck[936]: ROOT: clean, 637/553520 files, 56032/553472 blocks Nov 1 00:36:24.626500 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:36:24.723608 kernel: audit: type=1130 audit(1761957384.635:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:24.723702 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:36:24.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:24.637408 systemd[1]: Mounting sysroot.mount... Nov 1 00:36:24.730990 systemd[1]: Mounted sysroot.mount. Nov 1 00:36:24.745623 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:36:24.762306 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:36:24.777425 systemd[1]: Starting flatcar-metadata-hostname.service... Nov 1 00:36:24.792979 systemd[1]: Starting flatcar-static-network.service... Nov 1 00:36:24.809475 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:36:24.809536 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:36:24.828280 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:36:24.853239 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:36:24.923438 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by mount (949) Nov 1 00:36:24.923454 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:36:24.866135 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:36:24.971823 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:36:24.971836 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:36:24.928311 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:36:25.049321 kernel: BTRFS info (device sda6): enabling ssd optimizations Nov 1 00:36:25.049338 kernel: audit: type=1130 audit(1761957384.991:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:24.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:25.049382 initrd-setup-root[954]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:36:24.991922 systemd[1]: Starting ignition-mount.service... Nov 1 00:36:25.085686 coreos-metadata[943]: Nov 01 00:36:24.950 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Nov 1 00:36:25.106493 coreos-metadata[944]: Nov 01 00:36:24.950 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Nov 1 00:36:25.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:25.146477 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:36:25.178568 kernel: audit: type=1130 audit(1761957385.114:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:25.061948 systemd[1]: Starting sysroot-boot.service... Nov 1 00:36:25.185616 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:36:25.083866 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:36:25.204538 bash[1014]: umount: /sysroot/usr/share/oem: not mounted. Nov 1 00:36:25.213661 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:36:25.095636 systemd[1]: Finished sysroot-boot.service. Nov 1 00:36:25.230569 ignition[1019]: INFO : Ignition 2.14.0 Nov 1 00:36:25.230569 ignition[1019]: INFO : Stage: mount Nov 1 00:36:25.230569 ignition[1019]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:36:25.230569 ignition[1019]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Nov 1 00:36:25.230569 ignition[1019]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Nov 1 00:36:25.230569 ignition[1019]: INFO : mount: mount passed Nov 1 00:36:25.230569 ignition[1019]: INFO : POST message to Packet Timeline Nov 1 00:36:25.230569 ignition[1019]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Nov 1 00:36:25.904565 coreos-metadata[944]: Nov 01 00:36:25.904 INFO Fetch successful Nov 1 00:36:25.939031 systemd[1]: flatcar-static-network.service: Deactivated successfully. Nov 1 00:36:26.072602 kernel: audit: type=1130 audit(1761957385.947:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:26.072617 kernel: audit: type=1131 audit(1761957385.947:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:25.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:25.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:26.072662 ignition[1019]: INFO : GET result: OK Nov 1 00:36:25.939080 systemd[1]: Finished flatcar-static-network.service. Nov 1 00:36:26.207920 coreos-metadata[943]: Nov 01 00:36:26.207 INFO Fetch successful Nov 1 00:36:26.257861 coreos-metadata[943]: Nov 01 00:36:26.257 INFO wrote hostname ci-3510.3.8-n-4851ae666d to /sysroot/etc/hostname Nov 1 00:36:26.258697 systemd[1]: Finished flatcar-metadata-hostname.service. Nov 1 00:36:26.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:26.338535 kernel: audit: type=1130 audit(1761957386.280:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:26.486568 ignition[1019]: INFO : Ignition finished successfully Nov 1 00:36:26.487310 systemd[1]: Finished ignition-mount.service. Nov 1 00:36:26.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:26.504429 systemd[1]: Starting ignition-files.service... Nov 1 00:36:26.574481 kernel: audit: type=1130 audit(1761957386.503:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:26.574567 ignition[1033]: INFO : Ignition 2.14.0 Nov 1 00:36:26.574567 ignition[1033]: INFO : Stage: files Nov 1 00:36:26.574567 ignition[1033]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:36:26.574567 ignition[1033]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Nov 1 00:36:26.580509 unknown[1033]: wrote ssh authorized keys file for user: core Nov 1 00:36:26.629575 ignition[1033]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Nov 1 00:36:26.629575 ignition[1033]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:36:26.629575 ignition[1033]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:36:26.629575 ignition[1033]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem974565094" Nov 1 00:36:26.629575 ignition[1033]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem974565094": device or resource busy Nov 1 00:36:26.629575 ignition[1033]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem974565094", trying btrfs: device or resource busy Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem974565094" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem974565094" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem974565094" Nov 1 00:36:26.629575 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem974565094" Nov 1 00:36:26.587954 systemd[1]: mnt-oem974565094.mount: Deactivated successfully. Nov 1 00:36:26.908698 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(a): [started] processing unit "etcd-member.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:36:26.908698 ignition[1033]: INFO : files: files passed Nov 1 00:36:26.908698 ignition[1033]: INFO : POST message to Packet Timeline Nov 1 00:36:26.908698 ignition[1033]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Nov 1 00:36:27.641644 ignition[1033]: INFO : GET result: OK Nov 1 00:36:28.100609 ignition[1033]: INFO : Ignition finished successfully Nov 1 00:36:28.103668 systemd[1]: Finished ignition-files.service. Nov 1 00:36:28.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.123004 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:36:28.195590 kernel: audit: type=1130 audit(1761957388.117:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.184587 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:36:28.219599 initrd-setup-root-after-ignition[1065]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:36:28.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.184915 systemd[1]: Starting ignition-quench.service... Nov 1 00:36:28.414534 kernel: audit: type=1130 audit(1761957388.229:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.414550 kernel: audit: type=1130 audit(1761957388.297:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.414558 kernel: audit: type=1131 audit(1761957388.297:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.202710 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:36:28.229875 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:36:28.229939 systemd[1]: Finished ignition-quench.service. Nov 1 00:36:28.576745 kernel: audit: type=1130 audit(1761957388.456:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.576760 kernel: audit: type=1131 audit(1761957388.456:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.297619 systemd[1]: Reached target ignition-complete.target. Nov 1 00:36:28.423961 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:36:28.445393 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:36:28.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.445443 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:36:28.702574 kernel: audit: type=1130 audit(1761957388.626:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.456652 systemd[1]: Reached target initrd-fs.target. Nov 1 00:36:28.586582 systemd[1]: Reached target initrd.target. Nov 1 00:36:28.586713 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:36:28.587068 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:36:28.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.608802 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:36:28.842567 kernel: audit: type=1131 audit(1761957388.761:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.627308 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:36:28.697345 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:36:28.712622 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:36:28.727873 systemd[1]: Stopped target timers.target. Nov 1 00:36:28.741812 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:36:28.742114 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:36:28.762160 systemd[1]: Stopped target initrd.target. Nov 1 00:36:28.835601 systemd[1]: Stopped target basic.target. Nov 1 00:36:28.842663 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:36:28.864651 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:36:28.880770 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:36:29.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.078368 kernel: audit: type=1131 audit(1761957389.011:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.896579 systemd[1]: Stopped target remote-fs.target. Nov 1 00:36:28.911651 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:36:28.928965 systemd[1]: Stopped target sysinit.target. Nov 1 00:36:29.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.945895 systemd[1]: Stopped target local-fs.target. Nov 1 00:36:29.183566 kernel: audit: type=1131 audit(1761957389.107:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:28.962888 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:36:28.979051 systemd[1]: Stopped target swap.target. Nov 1 00:36:28.994964 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:36:28.995294 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:36:29.012127 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:36:29.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.086593 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:36:29.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.086659 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:36:29.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.107636 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:36:29.309520 ignition[1080]: INFO : Ignition 2.14.0 Nov 1 00:36:29.309520 ignition[1080]: INFO : Stage: umount Nov 1 00:36:29.309520 ignition[1080]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:36:29.309520 ignition[1080]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Nov 1 00:36:29.309520 ignition[1080]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Nov 1 00:36:29.309520 ignition[1080]: INFO : umount: umount passed Nov 1 00:36:29.309520 ignition[1080]: INFO : POST message to Packet Timeline Nov 1 00:36:29.309520 ignition[1080]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Nov 1 00:36:29.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.107693 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:36:29.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.463875 iscsid[898]: iscsid shutting down. Nov 1 00:36:29.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:29.176638 systemd[1]: Stopped target paths.target. Nov 1 00:36:29.190586 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:36:29.195598 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:36:29.197661 systemd[1]: Stopped target slices.target. Nov 1 00:36:29.218617 systemd[1]: Stopped target sockets.target. Nov 1 00:36:29.235623 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:36:29.235745 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:36:29.252768 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:36:29.252925 systemd[1]: Stopped ignition-files.service. Nov 1 00:36:29.267938 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Nov 1 00:36:29.268231 systemd[1]: Stopped flatcar-metadata-hostname.service. Nov 1 00:36:29.288038 systemd[1]: Stopping ignition-mount.service... Nov 1 00:36:29.299579 systemd[1]: Stopping iscsid.service... Nov 1 00:36:29.317104 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:36:29.330516 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:36:29.330636 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:36:29.345755 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:36:29.345912 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:36:29.371827 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:36:29.373425 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:36:29.373648 systemd[1]: Stopped iscsid.service. Nov 1 00:36:29.391718 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:36:29.391932 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:36:29.409739 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:36:29.409973 systemd[1]: Closed iscsid.socket. Nov 1 00:36:29.423776 systemd[1]: Stopping iscsiuio.service... Nov 1 00:36:29.438990 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:36:29.439213 systemd[1]: Stopped iscsiuio.service. Nov 1 00:36:29.456167 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:36:29.456390 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:36:29.473515 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:36:29.473603 systemd[1]: Closed iscsiuio.socket. Nov 1 00:36:30.468388 ignition[1080]: INFO : GET result: OK Nov 1 00:36:31.681075 ignition[1080]: INFO : Ignition finished successfully Nov 1 00:36:31.683993 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:36:31.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.684234 systemd[1]: Stopped ignition-mount.service. Nov 1 00:36:31.698923 systemd[1]: Stopped target network.target. Nov 1 00:36:31.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.714584 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:36:31.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.714723 systemd[1]: Stopped ignition-disks.service. Nov 1 00:36:31.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.729648 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:36:31.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.729763 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:36:31.745759 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:36:31.745902 systemd[1]: Stopped ignition-setup.service. Nov 1 00:36:31.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.763784 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:36:31.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.845000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:36:31.763933 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:36:31.781054 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:36:31.791510 systemd-networkd[882]: enp2s0f0np0: DHCPv6 lease lost Nov 1 00:36:31.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.796806 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:36:31.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.798569 systemd-networkd[882]: enp2s0f1np1: DHCPv6 lease lost Nov 1 00:36:31.917000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:36:31.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.812153 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:36:31.812402 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:36:31.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.829951 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:36:31.830185 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:36:31.844974 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:36:32.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.845057 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:36:32.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.864376 systemd[1]: Stopping network-cleanup.service... Nov 1 00:36:32.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.876535 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:36:31.876760 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:36:32.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.893811 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:36:32.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.893935 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:36:32.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.910017 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:36:32.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:32.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:31.910149 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:36:31.928080 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:36:31.948325 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:36:31.949777 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:36:31.950161 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:36:31.964123 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:36:31.964235 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:36:31.976672 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:36:31.976782 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:36:31.992590 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:36:31.992710 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:36:32.007726 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:36:32.007845 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:36:32.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:32.024454 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:36:32.024477 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:36:32.039827 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:36:32.055443 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Nov 1 00:36:32.055491 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Nov 1 00:36:32.073609 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:36:32.073672 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:36:32.089639 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:36:32.089764 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:36:32.107924 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Nov 1 00:36:32.109177 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:36:32.109387 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:36:32.228457 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:36:32.228677 systemd[1]: Stopped network-cleanup.service. Nov 1 00:36:32.240851 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:36:32.257127 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:36:32.295692 systemd[1]: Switching root. Nov 1 00:36:32.354084 systemd-journald[268]: Journal stopped Nov 1 00:36:36.189978 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Nov 1 00:36:36.189992 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:36:36.190001 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:36:36.190007 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:36:36.190012 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:36:36.190018 kernel: SELinux: policy capability open_perms=1 Nov 1 00:36:36.190023 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:36:36.190029 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:36:36.190035 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:36:36.190041 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:36:36.190046 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:36:36.190051 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:36:36.190057 systemd[1]: Successfully loaded SELinux policy in 324.394ms. Nov 1 00:36:36.190064 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.324ms. Nov 1 00:36:36.190072 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:36:36.190078 systemd[1]: Detected architecture x86-64. Nov 1 00:36:36.190084 systemd[1]: Detected first boot. Nov 1 00:36:36.190090 systemd[1]: Hostname set to . Nov 1 00:36:36.190097 systemd[1]: Initializing machine ID from random generator. Nov 1 00:36:36.190103 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:36:36.190110 kernel: kauditd_printk_skb: 41 callbacks suppressed Nov 1 00:36:36.190116 kernel: audit: type=1400 audit(1761957393.123:91): avc: denied { associate } for pid=1121 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:36:36.190123 kernel: audit: type=1300 audit(1761957393.123:91): arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78d2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1104 pid=1121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:36.190129 kernel: audit: type=1327 audit(1761957393.123:91): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:36:36.190135 kernel: audit: type=1400 audit(1761957393.150:92): avc: denied { associate } for pid=1121 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:36:36.190141 kernel: audit: type=1300 audit(1761957393.150:92): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79a9 a2=1ed a3=0 items=2 ppid=1104 pid=1121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:36.190148 kernel: audit: type=1307 audit(1761957393.150:92): cwd="/" Nov 1 00:36:36.190154 kernel: audit: type=1302 audit(1761957393.150:92): item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.190160 kernel: audit: type=1302 audit(1761957393.150:92): item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.190166 kernel: audit: type=1327 audit(1761957393.150:92): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:36:36.190172 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:36:36.190178 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:36:36.190186 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:36:36.190193 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:36:36.190198 kernel: audit: type=1334 audit(1761957394.722:93): prog-id=12 op=LOAD Nov 1 00:36:36.190204 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:36:36.190210 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:36:36.190216 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:36:36.190223 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:36:36.190230 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:36:36.190238 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 00:36:36.190245 systemd[1]: Created slice system-getty.slice. Nov 1 00:36:36.190251 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:36:36.190258 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:36:36.190264 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:36:36.190270 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:36:36.190277 systemd[1]: Created slice user.slice. Nov 1 00:36:36.190283 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:36:36.190290 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:36:36.190297 systemd[1]: Set up automount boot.automount. Nov 1 00:36:36.190303 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:36:36.190309 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:36:36.190316 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:36:36.190322 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:36:36.190328 systemd[1]: Reached target integritysetup.target. Nov 1 00:36:36.190335 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:36:36.190342 systemd[1]: Reached target remote-fs.target. Nov 1 00:36:36.190350 systemd[1]: Reached target slices.target. Nov 1 00:36:36.190357 systemd[1]: Reached target swap.target. Nov 1 00:36:36.190382 systemd[1]: Reached target torcx.target. Nov 1 00:36:36.190389 systemd[1]: Reached target veritysetup.target. Nov 1 00:36:36.190409 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:36:36.190429 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:36:36.190435 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:36:36.190443 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:36:36.190449 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:36:36.190456 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:36:36.190462 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:36:36.190468 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:36:36.190476 systemd[1]: Mounting media.mount... Nov 1 00:36:36.190483 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:36:36.190489 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:36:36.190496 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:36:36.190502 systemd[1]: Mounting tmp.mount... Nov 1 00:36:36.190508 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:36:36.190515 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:36:36.190521 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:36:36.190528 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:36:36.190535 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:36:36.190541 systemd[1]: Starting modprobe@drm.service... Nov 1 00:36:36.190548 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:36:36.190554 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:36:36.190560 kernel: fuse: init (API version 7.34) Nov 1 00:36:36.190566 systemd[1]: Starting modprobe@loop.service... Nov 1 00:36:36.190572 kernel: loop: module loaded Nov 1 00:36:36.190579 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:36:36.190585 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:36:36.190592 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:36:36.190599 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:36:36.190605 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:36:36.190611 systemd[1]: Stopped systemd-journald.service. Nov 1 00:36:36.190618 systemd[1]: Starting systemd-journald.service... Nov 1 00:36:36.190624 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:36:36.190633 systemd-journald[1230]: Journal started Nov 1 00:36:36.190658 systemd-journald[1230]: Runtime Journal (/run/log/journal/02541aa27b524b038fc3dedc9121a61b) is 8.0M, max 636.8M, 628.8M free. Nov 1 00:36:32.771000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:36:33.054000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:36:33.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:36:33.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:36:33.056000 audit: BPF prog-id=10 op=LOAD Nov 1 00:36:33.056000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:36:33.056000 audit: BPF prog-id=11 op=LOAD Nov 1 00:36:33.056000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:36:33.123000 audit[1121]: AVC avc: denied { associate } for pid=1121 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:36:33.123000 audit[1121]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78d2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1104 pid=1121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:33.123000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:36:33.150000 audit[1121]: AVC avc: denied { associate } for pid=1121 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:36:33.150000 audit[1121]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79a9 a2=1ed a3=0 items=2 ppid=1104 pid=1121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:33.150000 audit: CWD cwd="/" Nov 1 00:36:33.150000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:33.150000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:33.150000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:36:34.722000 audit: BPF prog-id=12 op=LOAD Nov 1 00:36:34.722000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:36:34.747000 audit: BPF prog-id=13 op=LOAD Nov 1 00:36:34.747000 audit: BPF prog-id=14 op=LOAD Nov 1 00:36:34.747000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:36:34.747000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:36:34.748000 audit: BPF prog-id=15 op=LOAD Nov 1 00:36:34.748000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:36:34.748000 audit: BPF prog-id=16 op=LOAD Nov 1 00:36:34.748000 audit: BPF prog-id=17 op=LOAD Nov 1 00:36:34.748000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:36:34.748000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:36:34.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:34.801000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:36:34.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:34.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.162000 audit: BPF prog-id=18 op=LOAD Nov 1 00:36:36.163000 audit: BPF prog-id=19 op=LOAD Nov 1 00:36:36.163000 audit: BPF prog-id=20 op=LOAD Nov 1 00:36:36.163000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:36:36.163000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:36:36.186000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:36:36.186000 audit[1230]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff0de237d0 a2=4000 a3=7fff0de2386c items=0 ppid=1 pid=1230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:36.186000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:36:34.721485 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:36:33.121051 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:36:34.721493 systemd[1]: Unnecessary job was removed for dev-sda6.device. Nov 1 00:36:33.121470 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:36:34.749220 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:36:33.121487 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:36:33.121512 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:36:33.121520 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:36:33.121544 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:36:33.121553 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:36:33.121709 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:36:33.121738 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:36:33.121749 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:36:33.122944 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:36:33.122972 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:36:33.122987 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:36:33.122999 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:36:33.123012 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:36:33.123022 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:36:34.359332 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:36:34.359520 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:36:34.359580 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:36:34.359677 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:36:34.359706 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:36:34.359741 /usr/lib/systemd/system-generators/torcx-generator[1121]: time="2025-11-01T00:36:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:36:36.221576 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:36:36.244537 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:36:36.266408 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:36:36.287407 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:36:36.287444 systemd[1]: Stopped verity-setup.service. Nov 1 00:36:36.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.333406 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:36:36.347416 systemd[1]: Started systemd-journald.service. Nov 1 00:36:36.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.355898 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:36:36.363620 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:36:36.370620 systemd[1]: Mounted media.mount. Nov 1 00:36:36.378614 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:36:36.387580 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:36:36.395571 systemd[1]: Mounted tmp.mount. Nov 1 00:36:36.402669 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:36:36.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.410682 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:36:36.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.418729 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:36:36.418854 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:36:36.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.428850 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:36:36.429011 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:36:36.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.437917 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:36:36.438111 systemd[1]: Finished modprobe@drm.service. Nov 1 00:36:36.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.448215 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:36:36.448543 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:36:36.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.457201 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:36:36.457575 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:36:36.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.466291 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:36:36.466631 systemd[1]: Finished modprobe@loop.service. Nov 1 00:36:36.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.476224 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:36:36.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.485165 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:36:36.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.495174 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:36:36.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.505175 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:36:36.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.515698 systemd[1]: Reached target network-pre.target. Nov 1 00:36:36.527299 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:36:36.538220 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:36:36.545626 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:36:36.549072 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:36:36.557956 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:36:36.566624 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:36:36.569113 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:36:36.570454 systemd-journald[1230]: Time spent on flushing to /var/log/journal/02541aa27b524b038fc3dedc9121a61b is 18.318ms for 1596 entries. Nov 1 00:36:36.570454 systemd-journald[1230]: System Journal (/var/log/journal/02541aa27b524b038fc3dedc9121a61b) is 8.0M, max 195.6M, 187.6M free. Nov 1 00:36:36.614173 systemd-journald[1230]: Received client request to flush runtime journal. Nov 1 00:36:36.585561 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:36:36.587300 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:36:36.599951 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:36:36.608059 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:36:36.615552 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:36:36.623514 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:36:36.631577 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:36:36.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.639586 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:36:36.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.647577 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:36:36.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.655561 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:36:36.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.664477 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:36:36.673093 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:36:36.682476 udevadm[1246]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Nov 1 00:36:36.692451 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:36:36.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.898397 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:36:36.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.907000 audit: BPF prog-id=21 op=LOAD Nov 1 00:36:36.907000 audit: BPF prog-id=22 op=LOAD Nov 1 00:36:36.907000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:36:36.907000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:36:36.908217 systemd[1]: Starting systemd-udevd.service... Nov 1 00:36:36.922937 systemd-udevd[1250]: Using default interface naming scheme 'v252'. Nov 1 00:36:36.941556 systemd[1]: Started systemd-udevd.service. Nov 1 00:36:36.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:36.952608 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Nov 1 00:36:36.953000 audit: BPF prog-id=23 op=LOAD Nov 1 00:36:36.953832 systemd[1]: Starting systemd-networkd.service... Nov 1 00:36:36.986853 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Nov 1 00:36:36.986913 kernel: ACPI: button: Sleep Button [SLPB] Nov 1 00:36:36.986935 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Nov 1 00:36:37.002000 audit: BPF prog-id=24 op=LOAD Nov 1 00:36:37.003000 audit: BPF prog-id=25 op=LOAD Nov 1 00:36:37.003000 audit: BPF prog-id=26 op=LOAD Nov 1 00:36:37.004214 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:36:36.992000 audit[1311]: AVC avc: denied { confidentiality } for pid=1311 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:36:36.992000 audit[1311]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556b82a92ae0 a1=4d9cc a2=7f8058efdbc5 a3=5 items=42 ppid=1250 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:36.992000 audit: CWD cwd="/" Nov 1 00:36:36.992000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=1 name=(null) inode=18789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=2 name=(null) inode=18789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=3 name=(null) inode=18790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=4 name=(null) inode=18789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=5 name=(null) inode=18791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=6 name=(null) inode=18789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=7 name=(null) inode=18792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=8 name=(null) inode=18792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=9 name=(null) inode=18793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=10 name=(null) inode=18792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=11 name=(null) inode=18794 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=12 name=(null) inode=18792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=13 name=(null) inode=18795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=14 name=(null) inode=18792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=15 name=(null) inode=18796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=16 name=(null) inode=18792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=17 name=(null) inode=18797 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=18 name=(null) inode=18789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=19 name=(null) inode=18798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=20 name=(null) inode=18798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=21 name=(null) inode=18799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=22 name=(null) inode=18798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=23 name=(null) inode=18800 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=24 name=(null) inode=18798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=25 name=(null) inode=18801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=26 name=(null) inode=18798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=27 name=(null) inode=18802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=28 name=(null) inode=18798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=29 name=(null) inode=18803 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=30 name=(null) inode=18789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=31 name=(null) inode=18804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=32 name=(null) inode=18804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=33 name=(null) inode=18805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=34 name=(null) inode=18804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=35 name=(null) inode=18806 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=36 name=(null) inode=18804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=37 name=(null) inode=18807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=38 name=(null) inode=18804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=39 name=(null) inode=18808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=40 name=(null) inode=18804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PATH item=41 name=(null) inode=18809 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:36:36.992000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:36:37.009498 kernel: IPMI message handler: version 39.2 Nov 1 00:36:37.009529 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 00:36:37.009546 kernel: ACPI: button: Power Button [PWRF] Nov 1 00:36:37.021980 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:36:37.062400 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Nov 1 00:36:37.093887 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Nov 1 00:36:37.111355 kernel: ipmi device interface Nov 1 00:36:37.111387 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Nov 1 00:36:37.160989 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Nov 1 00:36:37.161093 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Nov 1 00:36:37.161194 kernel: ipmi_si: IPMI System Interface driver Nov 1 00:36:37.191165 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Nov 1 00:36:37.208212 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Nov 1 00:36:37.208228 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Nov 1 00:36:37.208239 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Nov 1 00:36:37.339875 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Nov 1 00:36:37.339971 kernel: iTCO_vendor_support: vendor-support=0 Nov 1 00:36:37.340000 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Nov 1 00:36:37.340109 kernel: ipmi_si: Adding ACPI-specified kcs state machine Nov 1 00:36:37.340124 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Nov 1 00:36:37.340136 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Nov 1 00:36:37.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:37.194680 systemd[1]: Started systemd-userdbd.service. Nov 1 00:36:37.341643 systemd-networkd[1291]: bond0: netdev ready Nov 1 00:36:37.344281 systemd-networkd[1291]: lo: Link UP Nov 1 00:36:37.344283 systemd-networkd[1291]: lo: Gained carrier Nov 1 00:36:37.344815 systemd-networkd[1291]: Enumeration completed Nov 1 00:36:37.344905 systemd[1]: Started systemd-networkd.service. Nov 1 00:36:37.345141 systemd-networkd[1291]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Nov 1 00:36:37.345986 systemd-networkd[1291]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:a3:c9.network. Nov 1 00:36:37.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:37.393151 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:36:37.432922 kernel: intel_rapl_common: Found RAPL domain package Nov 1 00:36:37.432965 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Nov 1 00:36:37.433053 kernel: intel_rapl_common: Found RAPL domain core Nov 1 00:36:37.449354 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Nov 1 00:36:37.449442 kernel: intel_rapl_common: Found RAPL domain uncore Nov 1 00:36:37.449455 kernel: intel_rapl_common: Found RAPL domain dram Nov 1 00:36:37.572362 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Nov 1 00:36:37.572683 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Nov 1 00:36:37.588354 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Nov 1 00:36:37.606808 systemd-networkd[1291]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:a3:c8.network. Nov 1 00:36:37.625375 kernel: ipmi_ssif: IPMI SSIF Interface driver Nov 1 00:36:37.684411 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Nov 1 00:36:37.801408 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Nov 1 00:36:37.801882 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Nov 1 00:36:37.822395 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Nov 1 00:36:37.861443 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Nov 1 00:36:37.871683 systemd-networkd[1291]: bond0: Link UP Nov 1 00:36:37.871881 systemd-networkd[1291]: enp2s0f1np1: Link UP Nov 1 00:36:37.872006 systemd-networkd[1291]: enp2s0f1np1: Gained carrier Nov 1 00:36:37.873023 systemd-networkd[1291]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:a3:c8.network. Nov 1 00:36:37.912354 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:37.916632 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:36:37.933351 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:37.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:37.949162 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:36:37.955385 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:37.965291 lvm[1357]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:36:37.977414 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:37.998364 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.017398 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.037397 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.037782 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:36:38.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.053502 systemd[1]: Reached target cryptsetup.target. Nov 1 00:36:38.058407 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.074032 systemd[1]: Starting lvm2-activation.service... Nov 1 00:36:38.076188 lvm[1358]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:36:38.078388 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.097414 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.116414 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.135365 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.152389 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.152775 systemd[1]: Finished lvm2-activation.service. Nov 1 00:36:38.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.169438 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:36:38.171266 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.171286 kernel: kauditd_printk_skb: 112 callbacks suppressed Nov 1 00:36:38.171298 kernel: audit: type=1130 audit(1761957398.168:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.185353 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.257445 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:36:38.257461 systemd[1]: Reached target local-fs.target. Nov 1 00:36:38.263352 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.278468 systemd[1]: Reached target machines.target. Nov 1 00:36:38.281437 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.297101 systemd[1]: Starting ldconfig.service... Nov 1 00:36:38.300406 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.314948 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:36:38.315016 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:36:38.315574 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:36:38.318352 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.334017 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:36:38.337396 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.337749 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:36:38.337861 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Nov 1 00:36:38.337925 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Nov 1 00:36:38.338939 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:36:38.356374 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.361261 systemd-tmpfiles[1364]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:36:38.362415 systemd-tmpfiles[1364]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:36:38.363467 systemd-tmpfiles[1364]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:36:38.373352 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.374283 systemd-networkd[1291]: enp2s0f0np0: Link UP Nov 1 00:36:38.374505 systemd-networkd[1291]: bond0: Gained carrier Nov 1 00:36:38.374636 systemd-networkd[1291]: enp2s0f0np0: Gained carrier Nov 1 00:36:38.390243 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:36:38.390650 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:36:38.407241 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Nov 1 00:36:38.407270 kernel: bond0: (slave enp2s0f1np1): link status definitely down, disabling slave Nov 1 00:36:38.407286 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Nov 1 00:36:38.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.416420 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:36:38.424442 kernel: audit: type=1130 audit(1761957398.415:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.474426 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Nov 1 00:36:38.491385 kernel: bond0: active interface up! Nov 1 00:36:38.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.503452 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1360 (bootctl) Nov 1 00:36:38.503537 systemd-networkd[1291]: enp2s0f1np1: Link DOWN Nov 1 00:36:38.503540 systemd-networkd[1291]: enp2s0f1np1: Lost carrier Nov 1 00:36:38.504153 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:36:38.504372 kernel: audit: type=1130 audit(1761957398.503:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.614217 systemd-fsck[1369]: fsck.fat 4.2 (2021-01-31) Nov 1 00:36:38.614217 systemd-fsck[1369]: /dev/sda1: 790 files, 120773/258078 clusters Nov 1 00:36:38.615070 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:36:38.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.626272 systemd[1]: Mounting boot.mount... Nov 1 00:36:38.664102 ldconfig[1359]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:36:38.678407 kernel: audit: type=1130 audit(1761957398.624:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.685431 systemd[1]: Finished ldconfig.service. Nov 1 00:36:38.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.692454 systemd[1]: Mounted boot.mount. Nov 1 00:36:38.734353 kernel: audit: type=1130 audit(1761957398.692:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.734378 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Nov 1 00:36:38.753186 systemd-networkd[1291]: enp2s0f1np1: Link UP Nov 1 00:36:38.753368 systemd-networkd[1291]: enp2s0f1np1: Gained carrier Nov 1 00:36:38.766855 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:36:38.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.799639 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:36:38.819351 kernel: audit: type=1130 audit(1761957398.775:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.819377 kernel: bond0: (slave enp2s0f1np1): link status up, enabling it in 200 ms Nov 1 00:36:38.837350 kernel: bond0: (slave enp2s0f1np1): invalid new link 3 on slave Nov 1 00:36:38.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.864129 systemd[1]: Starting audit-rules.service... Nov 1 00:36:38.880257 augenrules[1387]: No rules Nov 1 00:36:38.879000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:36:38.919359 kernel: audit: type=1130 audit(1761957398.862:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:38.919381 kernel: audit: type=1305 audit(1761957398.879:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:36:38.919395 kernel: audit: type=1300 audit(1761957398.879:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3c999330 a2=420 a3=0 items=0 ppid=1372 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:38.919407 kernel: audit: type=1327 audit(1761957398.879:166): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:36:38.879000 audit[1387]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3c999330 a2=420 a3=0 items=0 ppid=1372 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:38.879000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:36:39.087045 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:36:39.093350 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Nov 1 00:36:39.101992 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:36:39.111339 systemd[1]: Starting systemd-resolved.service... Nov 1 00:36:39.120286 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:36:39.128928 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:36:39.136693 systemd[1]: Finished audit-rules.service. Nov 1 00:36:39.143565 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:36:39.151509 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:36:39.163136 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:36:39.172947 systemd[1]: Starting systemd-update-done.service... Nov 1 00:36:39.180396 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:36:39.180610 systemd[1]: Finished systemd-update-done.service. Nov 1 00:36:39.189444 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:36:39.191354 systemd-resolved[1394]: Positive Trust Anchors: Nov 1 00:36:39.191360 systemd-resolved[1394]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:36:39.191379 systemd-resolved[1394]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:36:39.195498 systemd-resolved[1394]: Using system hostname 'ci-3510.3.8-n-4851ae666d'. Nov 1 00:36:39.198445 systemd[1]: Started systemd-resolved.service. Nov 1 00:36:39.207413 systemd[1]: Reached target network.target. Nov 1 00:36:39.216377 systemd[1]: Reached target nss-lookup.target. Nov 1 00:36:39.225380 systemd[1]: Reached target sysinit.target. Nov 1 00:36:39.234418 systemd[1]: Started motdgen.path. Nov 1 00:36:39.242395 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:36:39.253385 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:36:39.261381 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:36:39.261397 systemd[1]: Reached target paths.target. Nov 1 00:36:39.268376 systemd[1]: Reached target time-set.target. Nov 1 00:36:39.277448 systemd[1]: Started logrotate.timer. Nov 1 00:36:39.284413 systemd[1]: Started mdadm.timer. Nov 1 00:36:39.291376 systemd[1]: Reached target timers.target. Nov 1 00:36:39.299504 systemd[1]: Listening on dbus.socket. Nov 1 00:36:39.306921 systemd[1]: Starting docker.socket... Nov 1 00:36:39.314747 systemd[1]: Listening on sshd.socket. Nov 1 00:36:39.321437 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:36:39.321654 systemd[1]: Listening on docker.socket. Nov 1 00:36:39.328422 systemd[1]: Reached target sockets.target. Nov 1 00:36:39.336378 systemd[1]: Reached target basic.target. Nov 1 00:36:39.343533 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:36:39.343546 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:36:39.344008 systemd[1]: Starting containerd.service... Nov 1 00:36:39.350931 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 00:36:39.360904 systemd[1]: Starting coreos-metadata.service... Nov 1 00:36:39.368926 systemd[1]: Starting dbus.service... Nov 1 00:36:39.375921 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:36:39.380867 jq[1409]: false Nov 1 00:36:39.381514 coreos-metadata[1402]: Nov 01 00:36:39.381 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Nov 1 00:36:39.382887 systemd[1]: Starting extend-filesystems.service... Nov 1 00:36:39.387155 dbus-daemon[1408]: [system] SELinux support is enabled Nov 1 00:36:39.390428 systemd-networkd[1291]: bond0: Gained IPv6LL Nov 1 00:36:39.390445 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:36:39.390760 extend-filesystems[1411]: Found sda Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda1 Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda2 Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda3 Nov 1 00:36:39.397502 extend-filesystems[1411]: Found usr Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda4 Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda6 Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda7 Nov 1 00:36:39.397502 extend-filesystems[1411]: Found sda9 Nov 1 00:36:39.397502 extend-filesystems[1411]: Checking size of /dev/sda9 Nov 1 00:36:39.397502 extend-filesystems[1411]: Resized partition /dev/sda9 Nov 1 00:36:39.536433 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Nov 1 00:36:39.391135 systemd[1]: Starting motdgen.service... Nov 1 00:36:39.536512 coreos-metadata[1405]: Nov 01 00:36:39.392 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Nov 1 00:36:39.536635 extend-filesystems[1423]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 00:36:39.413134 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:36:39.436007 systemd[1]: Starting sshd-keygen.service... Nov 1 00:36:39.450729 systemd[1]: Starting systemd-logind.service... Nov 1 00:36:39.464400 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:36:39.464937 systemd[1]: Starting tcsd.service... Nov 1 00:36:39.551799 update_engine[1438]: I1101 00:36:39.524345 1438 main.cc:92] Flatcar Update Engine starting Nov 1 00:36:39.551799 update_engine[1438]: I1101 00:36:39.527760 1438 update_check_scheduler.cc:74] Next update check in 10m41s Nov 1 00:36:39.474444 systemd-logind[1436]: Watching system buttons on /dev/input/event3 (Power Button) Nov 1 00:36:39.552030 jq[1439]: true Nov 1 00:36:39.474454 systemd-logind[1436]: Watching system buttons on /dev/input/event2 (Sleep Button) Nov 1 00:36:39.474465 systemd-logind[1436]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Nov 1 00:36:39.474608 systemd-logind[1436]: New seat seat0. Nov 1 00:36:39.476655 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:36:39.477118 systemd[1]: Starting update-engine.service... Nov 1 00:36:39.490964 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:36:39.509712 systemd[1]: Started dbus.service. Nov 1 00:36:39.530059 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:36:39.530151 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:36:39.530307 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:36:39.530392 systemd[1]: Finished motdgen.service. Nov 1 00:36:39.543579 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:36:39.543658 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:36:39.562256 jq[1441]: true Nov 1 00:36:39.562910 dbus-daemon[1408]: [system] Successfully activated service 'org.freedesktop.systemd1' Nov 1 00:36:39.566330 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Nov 1 00:36:39.566440 systemd[1]: Condition check resulted in tcsd.service being skipped. Nov 1 00:36:39.569183 systemd[1]: Started systemd-logind.service. Nov 1 00:36:39.571439 env[1442]: time="2025-11-01T00:36:39.571416201Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:36:39.579889 env[1442]: time="2025-11-01T00:36:39.579872915Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:36:39.580468 systemd[1]: Started update-engine.service. Nov 1 00:36:39.583600 env[1442]: time="2025-11-01T00:36:39.583588928Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:36:39.584224 env[1442]: time="2025-11-01T00:36:39.584179340Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:36:39.584224 env[1442]: time="2025-11-01T00:36:39.584194856Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:36:39.585714 env[1442]: time="2025-11-01T00:36:39.585702252Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:36:39.585714 env[1442]: time="2025-11-01T00:36:39.585713395Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:36:39.585767 env[1442]: time="2025-11-01T00:36:39.585720864Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:36:39.585767 env[1442]: time="2025-11-01T00:36:39.585726339Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:36:39.585800 env[1442]: time="2025-11-01T00:36:39.585767472Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:36:39.587908 env[1442]: time="2025-11-01T00:36:39.587896383Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:36:39.587979 env[1442]: time="2025-11-01T00:36:39.587968463Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:36:39.588005 env[1442]: time="2025-11-01T00:36:39.587979411Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:36:39.588026 env[1442]: time="2025-11-01T00:36:39.588007496Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:36:39.588026 env[1442]: time="2025-11-01T00:36:39.588015406Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:36:39.590715 systemd[1]: Started locksmithd.service. Nov 1 00:36:39.592499 bash[1469]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:36:39.597526 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:36:39.597665 systemd[1]: Reached target system-config.target. Nov 1 00:36:39.600179 env[1442]: time="2025-11-01T00:36:39.600142372Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:36:39.600179 env[1442]: time="2025-11-01T00:36:39.600159252Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:36:39.600179 env[1442]: time="2025-11-01T00:36:39.600167299Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:36:39.600234 env[1442]: time="2025-11-01T00:36:39.600185131Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600234 env[1442]: time="2025-11-01T00:36:39.600197169Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600234 env[1442]: time="2025-11-01T00:36:39.600206222Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600234 env[1442]: time="2025-11-01T00:36:39.600213100Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600234 env[1442]: time="2025-11-01T00:36:39.600220520Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600234 env[1442]: time="2025-11-01T00:36:39.600227759Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600323 env[1442]: time="2025-11-01T00:36:39.600234674Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600323 env[1442]: time="2025-11-01T00:36:39.600241954Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600323 env[1442]: time="2025-11-01T00:36:39.600253111Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:36:39.600323 env[1442]: time="2025-11-01T00:36:39.600304258Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:36:39.600453 env[1442]: time="2025-11-01T00:36:39.600423169Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:36:39.600764 env[1442]: time="2025-11-01T00:36:39.600746518Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:36:39.600807 env[1442]: time="2025-11-01T00:36:39.600777168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.600807 env[1442]: time="2025-11-01T00:36:39.600790485Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:36:39.600901 env[1442]: time="2025-11-01T00:36:39.600888678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.600921 env[1442]: time="2025-11-01T00:36:39.600909765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.600963 env[1442]: time="2025-11-01T00:36:39.600933918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.600981 env[1442]: time="2025-11-01T00:36:39.600970599Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601064 env[1442]: time="2025-11-01T00:36:39.601053049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601082 env[1442]: time="2025-11-01T00:36:39.601073026Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601101 env[1442]: time="2025-11-01T00:36:39.601081906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601101 env[1442]: time="2025-11-01T00:36:39.601088880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601101 env[1442]: time="2025-11-01T00:36:39.601096967Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:36:39.601171 env[1442]: time="2025-11-01T00:36:39.601163146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601202 env[1442]: time="2025-11-01T00:36:39.601173004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601202 env[1442]: time="2025-11-01T00:36:39.601179887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601202 env[1442]: time="2025-11-01T00:36:39.601186198Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:36:39.601202 env[1442]: time="2025-11-01T00:36:39.601194461Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:36:39.601202 env[1442]: time="2025-11-01T00:36:39.601201769Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:36:39.601280 env[1442]: time="2025-11-01T00:36:39.601211867Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:36:39.601280 env[1442]: time="2025-11-01T00:36:39.601232068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:36:39.601382 env[1442]: time="2025-11-01T00:36:39.601356600Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601388798Z" level=info msg="Connect containerd service" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601405983Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601669541Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601759012Z" level=info msg="Start subscribing containerd event" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601788116Z" level=info msg="Start recovering state" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601821528Z" level=info msg="Start event monitor" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601830533Z" level=info msg="Start snapshots syncer" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601833761Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601835795Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601844224Z" level=info msg="Start streaming server" Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601877069Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:36:39.603051 env[1442]: time="2025-11-01T00:36:39.601901551Z" level=info msg="containerd successfully booted in 0.030811s" Nov 1 00:36:39.605461 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:36:39.605566 systemd[1]: Reached target user-config.target. Nov 1 00:36:39.614875 systemd[1]: Started containerd.service. Nov 1 00:36:39.621653 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:36:39.652251 locksmithd[1475]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:36:39.908446 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Nov 1 00:36:39.940388 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Nov 1 00:36:39.969953 extend-filesystems[1423]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Nov 1 00:36:39.969953 extend-filesystems[1423]: old_desc_blocks = 1, new_desc_blocks = 56 Nov 1 00:36:39.969953 extend-filesystems[1423]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Nov 1 00:36:40.009427 extend-filesystems[1411]: Resized filesystem in /dev/sda9 Nov 1 00:36:40.009427 extend-filesystems[1411]: Found sdb Nov 1 00:36:39.970439 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:36:39.970541 systemd[1]: Finished extend-filesystems.service. Nov 1 00:36:40.098677 sshd_keygen[1435]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:36:40.110554 systemd[1]: Finished sshd-keygen.service. Nov 1 00:36:40.118404 systemd[1]: Starting issuegen.service... Nov 1 00:36:40.126615 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:36:40.126688 systemd[1]: Finished issuegen.service. Nov 1 00:36:40.134179 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:36:40.143666 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:36:40.152459 systemd[1]: Started getty@tty1.service. Nov 1 00:36:40.160432 systemd[1]: Started serial-getty@ttyS1.service. Nov 1 00:36:40.168569 systemd[1]: Reached target getty.target. Nov 1 00:36:40.483949 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:36:40.494758 systemd[1]: Reached target network-online.target. Nov 1 00:36:44.636641 coreos-metadata[1405]: Nov 01 00:36:44.636 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Nov 1 00:36:44.637489 coreos-metadata[1402]: Nov 01 00:36:44.636 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Nov 1 00:36:45.180234 login[1504]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Nov 1 00:36:45.188594 systemd-logind[1436]: New session 1 of user core. Nov 1 00:36:45.189073 systemd[1]: Created slice user-500.slice. Nov 1 00:36:45.189188 login[1503]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Nov 1 00:36:45.189688 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:36:45.191853 systemd-logind[1436]: New session 2 of user core. Nov 1 00:36:45.194743 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:36:45.195478 systemd[1]: Starting user@500.service... Nov 1 00:36:45.197275 (systemd)[1507]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:45.274074 systemd[1507]: Queued start job for default target default.target. Nov 1 00:36:45.274310 systemd[1507]: Reached target paths.target. Nov 1 00:36:45.274321 systemd[1507]: Reached target sockets.target. Nov 1 00:36:45.274329 systemd[1507]: Reached target timers.target. Nov 1 00:36:45.274336 systemd[1507]: Reached target basic.target. Nov 1 00:36:45.274377 systemd[1507]: Reached target default.target. Nov 1 00:36:45.274393 systemd[1507]: Startup finished in 73ms. Nov 1 00:36:45.274423 systemd[1]: Started user@500.service. Nov 1 00:36:45.275002 systemd[1]: Started session-1.scope. Nov 1 00:36:45.275408 systemd[1]: Started session-2.scope. Nov 1 00:36:45.636903 coreos-metadata[1405]: Nov 01 00:36:45.636 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Nov 1 00:36:45.637695 coreos-metadata[1402]: Nov 01 00:36:45.636 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Nov 1 00:36:45.641818 coreos-metadata[1405]: Nov 01 00:36:45.641 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Nov 1 00:36:45.643350 coreos-metadata[1402]: Nov 01 00:36:45.643 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Nov 1 00:36:46.004400 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Nov 1 00:36:46.011385 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Nov 1 00:36:47.642014 coreos-metadata[1405]: Nov 01 00:36:47.641 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Nov 1 00:36:47.643602 coreos-metadata[1402]: Nov 01 00:36:47.643 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Nov 1 00:36:48.581906 systemd[1]: Created slice system-sshd.slice. Nov 1 00:36:48.582454 systemd[1]: Started sshd@0-145.40.82.39:22-147.75.109.163:46902.service. Nov 1 00:36:48.630965 sshd[1528]: Accepted publickey for core from 147.75.109.163 port 46902 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:48.632450 sshd[1528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:48.637324 systemd-logind[1436]: New session 3 of user core. Nov 1 00:36:48.638677 systemd[1]: Started session-3.scope. Nov 1 00:36:48.701445 systemd[1]: Started sshd@1-145.40.82.39:22-147.75.109.163:46908.service. Nov 1 00:36:48.738811 sshd[1533]: Accepted publickey for core from 147.75.109.163 port 46908 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:48.739493 sshd[1533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:48.741616 systemd-logind[1436]: New session 4 of user core. Nov 1 00:36:48.742136 systemd[1]: Started session-4.scope. Nov 1 00:36:48.795476 sshd[1533]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:48.797009 systemd[1]: sshd@1-145.40.82.39:22-147.75.109.163:46908.service: Deactivated successfully. Nov 1 00:36:48.797308 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:36:48.797654 systemd-logind[1436]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:36:48.798149 systemd[1]: Started sshd@2-145.40.82.39:22-147.75.109.163:46914.service. Nov 1 00:36:48.798611 systemd-logind[1436]: Removed session 4. Nov 1 00:36:48.835856 sshd[1539]: Accepted publickey for core from 147.75.109.163 port 46914 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:48.836961 sshd[1539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:48.840854 systemd-logind[1436]: New session 5 of user core. Nov 1 00:36:48.841849 systemd[1]: Started session-5.scope. Nov 1 00:36:48.912251 sshd[1539]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:48.917955 systemd[1]: sshd@2-145.40.82.39:22-147.75.109.163:46914.service: Deactivated successfully. Nov 1 00:36:48.919733 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:36:48.921518 systemd-logind[1436]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:36:48.923841 systemd-logind[1436]: Removed session 5. Nov 1 00:36:49.023067 coreos-metadata[1405]: Nov 01 00:36:49.022 INFO Fetch successful Nov 1 00:36:49.103499 systemd[1]: Finished coreos-metadata.service. Nov 1 00:36:49.104266 systemd[1]: Starting etcd-member.service... Nov 1 00:36:49.104882 systemd[1]: Started packet-phone-home.service. Nov 1 00:36:49.110055 curl[1547]: % Total % Received % Xferd Average Speed Time Time Time Current Nov 1 00:36:49.110190 curl[1547]: Dload Upload Total Spent Left Speed Nov 1 00:36:49.120809 systemd[1]: Starting docker.service... Nov 1 00:36:49.137915 env[1561]: time="2025-11-01T00:36:49.137887427Z" level=info msg="Starting up" Nov 1 00:36:49.138654 env[1561]: time="2025-11-01T00:36:49.138640452Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 1 00:36:49.138654 env[1561]: time="2025-11-01T00:36:49.138652272Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 1 00:36:49.138705 env[1561]: time="2025-11-01T00:36:49.138664950Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Nov 1 00:36:49.138705 env[1561]: time="2025-11-01T00:36:49.138671004Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 1 00:36:49.139655 env[1561]: time="2025-11-01T00:36:49.139616865Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 1 00:36:49.139655 env[1561]: time="2025-11-01T00:36:49.139623506Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 1 00:36:49.139655 env[1561]: time="2025-11-01T00:36:49.139630037Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Nov 1 00:36:49.139655 env[1561]: time="2025-11-01T00:36:49.139635380Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 1 00:36:49.153482 env[1561]: time="2025-11-01T00:36:49.153439058Z" level=info msg="Loading containers: start." Nov 1 00:36:49.312449 kernel: Initializing XFRM netlink socket Nov 1 00:36:49.382185 env[1561]: time="2025-11-01T00:36:49.382125388Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Nov 1 00:36:49.383415 systemd-timesyncd[1395]: Network configuration changed, trying to establish connection. Nov 1 00:36:49.472299 systemd-networkd[1291]: docker0: Link UP Nov 1 00:36:49.495548 env[1561]: time="2025-11-01T00:36:49.495456756Z" level=info msg="Loading containers: done." Nov 1 00:36:49.513965 env[1561]: time="2025-11-01T00:36:49.513854098Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Nov 1 00:36:49.514286 env[1561]: time="2025-11-01T00:36:49.514226214Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Nov 1 00:36:49.514542 env[1561]: time="2025-11-01T00:36:49.514452822Z" level=info msg="Daemon has completed initialization" Nov 1 00:36:49.518074 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck288062228-merged.mount: Deactivated successfully. Nov 1 00:36:49.538200 systemd[1]: Started docker.service. Nov 1 00:36:49.552902 env[1561]: time="2025-11-01T00:36:49.552768483Z" level=info msg="API listen on /run/docker.sock" Nov 1 00:36:49.554889 etcd-wrapper[1551]: Error response from daemon: No such container: etcd-member Nov 1 00:36:49.596200 etcd-wrapper[1684]: Error: No such container: etcd-member Nov 1 00:36:49.640787 etcd-wrapper[1706]: Unable to find image 'quay.io/coreos/etcd:v3.5.22' locally Nov 1 00:36:49.655263 coreos-metadata[1402]: Nov 01 00:36:49.655 INFO Fetch successful Nov 1 00:36:49.656025 systemd-timesyncd[1395]: Contacted time server [2600:3c00:e000:318::1]:123 (2.flatcar.pool.ntp.org). Nov 1 00:36:49.656090 systemd-timesyncd[1395]: Initial clock synchronization to Sat 2025-11-01 00:36:49.514010 UTC. Nov 1 00:36:49.719641 unknown[1402]: wrote ssh authorized keys file for user: core Nov 1 00:36:49.732579 update-ssh-keys[1717]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:36:49.732802 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 00:36:50.751828 etcd-wrapper[1706]: v3.5.22: Pulling from coreos/etcd Nov 1 00:36:51.042590 etcd-wrapper[1706]: f5083dc2076d: Pulling fs layer Nov 1 00:36:51.042590 etcd-wrapper[1706]: 2ae710cd8bfe: Pulling fs layer Nov 1 00:36:51.042590 etcd-wrapper[1706]: d462aa345367: Pulling fs layer Nov 1 00:36:51.042590 etcd-wrapper[1706]: 0f8b424aa0b9: Pulling fs layer Nov 1 00:36:51.042590 etcd-wrapper[1706]: d557676654e5: Pulling fs layer Nov 1 00:36:51.042590 etcd-wrapper[1706]: c8022d07192e: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: d858cbc252ad: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 1069fc2daed1: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: b40161cd83fc: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 5318d93a3a65: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 307c1adadb60: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 60a82e1b19c6: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 6f77055ebb6e: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 67f98bbc9874: Pulling fs layer Nov 1 00:36:51.043518 etcd-wrapper[1706]: 1069fc2daed1: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: b40161cd83fc: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: 5318d93a3a65: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: 307c1adadb60: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: 67f98bbc9874: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: d557676654e5: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: 0f8b424aa0b9: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: d858cbc252ad: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: 60a82e1b19c6: Waiting Nov 1 00:36:51.043518 etcd-wrapper[1706]: 6f77055ebb6e: Waiting Nov 1 00:36:51.385207 etcd-wrapper[1706]: 2ae710cd8bfe: Verifying Checksum Nov 1 00:36:51.385207 etcd-wrapper[1706]: 2ae710cd8bfe: Download complete Nov 1 00:36:51.397506 etcd-wrapper[1706]: f5083dc2076d: Verifying Checksum Nov 1 00:36:51.397506 etcd-wrapper[1706]: f5083dc2076d: Download complete Nov 1 00:36:51.401121 etcd-wrapper[1706]: d462aa345367: Verifying Checksum Nov 1 00:36:51.401121 etcd-wrapper[1706]: d462aa345367: Download complete Nov 1 00:36:51.422230 etcd-wrapper[1706]: f5083dc2076d: Pull complete Nov 1 00:36:51.442418 systemd[1]: var-lib-docker-overlay2-211eda7507971869b70c3e80e4d5d3ae2f6afce1df54c8a11d9de94a4945584f-merged.mount: Deactivated successfully. Nov 1 00:36:51.449540 etcd-wrapper[1706]: 2ae710cd8bfe: Pull complete Nov 1 00:36:51.541501 systemd[1]: var-lib-docker-overlay2-67a334aba69ef0f36b4e4e233ec0aa03258680ba264d2693a18b9c97bce2323e-merged.mount: Deactivated successfully. Nov 1 00:36:51.596999 etcd-wrapper[1706]: d462aa345367: Pull complete Nov 1 00:36:51.610988 etcd-wrapper[1706]: c8022d07192e: Verifying Checksum Nov 1 00:36:51.611596 etcd-wrapper[1706]: c8022d07192e: Download complete Nov 1 00:36:51.626376 etcd-wrapper[1706]: 0f8b424aa0b9: Download complete Nov 1 00:36:51.699708 etcd-wrapper[1706]: 0f8b424aa0b9: Pull complete Nov 1 00:36:51.716539 etcd-wrapper[1706]: d557676654e5: Verifying Checksum Nov 1 00:36:51.716539 etcd-wrapper[1706]: d557676654e5: Download complete Nov 1 00:36:51.789627 etcd-wrapper[1706]: d557676654e5: Pull complete Nov 1 00:36:51.827618 etcd-wrapper[1706]: d858cbc252ad: Verifying Checksum Nov 1 00:36:51.827618 etcd-wrapper[1706]: d858cbc252ad: Download complete Nov 1 00:36:51.845669 etcd-wrapper[1706]: c8022d07192e: Pull complete Nov 1 00:36:51.858757 etcd-wrapper[1706]: 1069fc2daed1: Download complete Nov 1 00:36:51.870128 etcd-wrapper[1706]: d858cbc252ad: Pull complete Nov 1 00:36:51.894452 etcd-wrapper[1706]: 1069fc2daed1: Pull complete Nov 1 00:36:51.947180 etcd-wrapper[1706]: b40161cd83fc: Verifying Checksum Nov 1 00:36:51.947180 etcd-wrapper[1706]: b40161cd83fc: Download complete Nov 1 00:36:52.020144 etcd-wrapper[1706]: b40161cd83fc: Pull complete Nov 1 00:36:52.043479 etcd-wrapper[1706]: 5318d93a3a65: Verifying Checksum Nov 1 00:36:52.043647 etcd-wrapper[1706]: 5318d93a3a65: Download complete Nov 1 00:36:52.094777 etcd-wrapper[1706]: 5318d93a3a65: Pull complete Nov 1 00:36:52.164045 etcd-wrapper[1706]: 307c1adadb60: Verifying Checksum Nov 1 00:36:52.164045 etcd-wrapper[1706]: 307c1adadb60: Download complete Nov 1 00:36:52.236745 etcd-wrapper[1706]: 307c1adadb60: Pull complete Nov 1 00:36:52.249304 etcd-wrapper[1706]: 60a82e1b19c6: Verifying Checksum Nov 1 00:36:52.249304 etcd-wrapper[1706]: 60a82e1b19c6: Download complete Nov 1 00:36:52.341774 etcd-wrapper[1706]: 6f77055ebb6e: Verifying Checksum Nov 1 00:36:52.341774 etcd-wrapper[1706]: 6f77055ebb6e: Download complete Nov 1 00:36:52.424851 systemd[1]: var-lib-docker-overlay2-52649e6585016ae31bfc83466cc78c3677ad732ca6dafb6a6702255caf7559ad-merged.mount: Deactivated successfully. Nov 1 00:36:52.439446 etcd-wrapper[1706]: 67f98bbc9874: Verifying Checksum Nov 1 00:36:52.439446 etcd-wrapper[1706]: 67f98bbc9874: Download complete Nov 1 00:36:52.542582 systemd[1]: var-lib-docker-overlay2-a30c860c24a338ace574fce5cf621b6aabb1c86e052b83ce4ac0d5d3c350fb24-merged.mount: Deactivated successfully. Nov 1 00:36:52.631373 etcd-wrapper[1706]: 60a82e1b19c6: Pull complete Nov 1 00:36:52.816031 systemd[1]: var-lib-docker-overlay2-b8d3371125accabc8b3429fe4dd4a75c9eaf7470b52e51941d3cedb0e4399a6a-merged.mount: Deactivated successfully. Nov 1 00:36:52.823857 curl[1547]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0 Nov 1 00:36:52.824448 systemd[1]: packet-phone-home.service: Deactivated successfully. Nov 1 00:36:52.863987 etcd-wrapper[1706]: 6f77055ebb6e: Pull complete Nov 1 00:36:53.049960 etcd-wrapper[1706]: 67f98bbc9874: Pull complete Nov 1 00:36:53.052975 etcd-wrapper[1706]: Digest: sha256:51efcfc4f3a863c072ebe745942f790878c2a268e713a6d140c4f2593271adc6 Nov 1 00:36:53.053978 etcd-wrapper[1706]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.22 Nov 1 00:36:53.172697 env[1442]: time="2025-11-01T00:36:53.172507962Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:36:53.172697 env[1442]: time="2025-11-01T00:36:53.172592376Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:36:53.172697 env[1442]: time="2025-11-01T00:36:53.172624560Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:36:53.173674 env[1442]: time="2025-11-01T00:36:53.172974386Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/8d8c3b01db52adf39cf04831e53d77b72e5c5ac0c7bb69848f9052d851313bc4 pid=2023 runtime=io.containerd.runc.v2 Nov 1 00:36:53.195445 systemd[1]: Started docker-8d8c3b01db52adf39cf04831e53d77b72e5c5ac0c7bb69848f9052d851313bc4.scope. Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.253444Z","caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.253542Z","caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"02541aa27b524b038fc3dedc9121a61b"} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.253562Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.253571Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.22"} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.253575Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.253578Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.253613Z","caller":"embed/config.go:689","msg":"Running http and grpc server on single port. This is not recommended for production."} Nov 1 00:36:53.253670 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.253624Z","caller":"etcdmain/etcd.go:73","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.27:2379"]} Nov 1 00:36:53.253909 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.253669Z","caller":"embed/config.go:689","msg":"Running http and grpc server on single port. This is not recommended for production."} Nov 1 00:36:53.253909 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.253679Z","caller":"embed/etcd.go:140","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Nov 1 00:36:53.254238 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.254134Z","caller":"embed/etcd.go:148","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Nov 1 00:36:53.254314 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.254246Z","caller":"embed/etcd.go:323","msg":"starting an etcd server","etcd-version":"3.5.22","git-sha":"7862c85","go-version":"go1.23.11","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"02541aa27b524b038fc3dedc9121a61b","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"max-wals":5,"max-snapshots":5,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.27:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"02541aa27b524b038fc3dedc9121a61b=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-backend-bytes":2147483648,"max-request-bytes":1572864,"max-concurrent-streams":4294967295,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","compact-check-time-enabled":false,"compact-check-time-interval":"1m0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Nov 1 00:36:53.255152 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255041Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"617.446µs"} Nov 1 00:36:53.255950 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255870Z","caller":"etcdserver/raft.go:507","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Nov 1 00:36:53.255950 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255898Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Nov 1 00:36:53.255950 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255916Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Nov 1 00:36:53.256043 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255924Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Nov 1 00:36:53.256043 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255932Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Nov 1 00:36:53.256043 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.255961Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Nov 1 00:36:53.256888 etcd-wrapper[1706]: {"level":"warn","ts":"2025-11-01T00:36:53.256788Z","caller":"auth/store.go:1241","msg":"simple token is not cryptographically signed"} Nov 1 00:36:53.257654 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.257539Z","caller":"mvcc/kvstore.go:425","msg":"kvstore restored","current-rev":1} Nov 1 00:36:53.257654 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.257561Z","caller":"etcdserver/server.go:628","msg":"restore consistentIndex","index":0} Nov 1 00:36:53.257909 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.257799Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Nov 1 00:36:53.258187 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258118Z","caller":"etcdserver/server.go:875","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.22","cluster-version":"to_be_decided"} Nov 1 00:36:53.258289 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258233Z","caller":"etcdserver/server.go:759","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Nov 1 00:36:53.258333 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258266Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} Nov 1 00:36:53.258376 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258290Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/snap","suffix":"snap.db","max":5,"interval":"30s"} Nov 1 00:36:53.258376 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258328Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/snap","suffix":"snap","max":5,"interval":"30s"} Nov 1 00:36:53.258448 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258346Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/wal","suffix":"wal","max":5,"interval":"30s"} Nov 1 00:36:53.258490 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258444Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Nov 1 00:36:53.258536 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.258500Z","caller":"membership/cluster.go:421","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"],"added-peer-is-learner":false} Nov 1 00:36:53.259483 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.259432Z","caller":"embed/etcd.go:633","msg":"serving peer traffic","address":"127.0.0.1:2380"} Nov 1 00:36:53.259483 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.259434Z","caller":"embed/etcd.go:292","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.27:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Nov 1 00:36:53.259483 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.259442Z","caller":"embed/etcd.go:603","msg":"cmux::serve","address":"127.0.0.1:2380"} Nov 1 00:36:53.429196 systemd[1]: var-lib-docker-overlay2-125d01d0715a21f1432c4ed38690053b78b90498cf1c2339079ebe54d84910d5-merged.mount: Deactivated successfully. Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.856885Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.857036Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.857100Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.857142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.857244Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.857290Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Nov 1 00:36:53.857521 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.857328Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Nov 1 00:36:53.863617 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.863162Z","caller":"etcdserver/server.go:2697","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Nov 1 00:36:53.864243 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.863817Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} Nov 1 00:36:53.864243 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.863852Z","caller":"etcdserver/server.go:2144","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:02541aa27b524b038fc3dedc9121a61b ClientURLs:[http://10.67.80.27:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Nov 1 00:36:53.865177 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.864222Z","caller":"membership/cluster.go:587","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Nov 1 00:36:53.865177 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.864286Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} Nov 1 00:36:53.865177 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.864417Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Nov 1 00:36:53.865177 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.864523Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} Nov 1 00:36:53.865177 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.864505Z","caller":"etcdserver/server.go:2721","msg":"cluster version is updated","cluster-version":"3.5"} Nov 1 00:36:53.864866 systemd[1]: Started etcd-member.service. Nov 1 00:36:53.866189 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.865280Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} Nov 1 00:36:53.865878 systemd[1]: Reached target multi-user.target. Nov 1 00:36:53.867000 etcd-wrapper[1706]: {"level":"info","ts":"2025-11-01T00:36:53.866591Z","caller":"embed/serve.go:210","msg":"serving client traffic insecurely; this is strongly discouraged!","traffic":"grpc+http","address":"[::]:2379"} Nov 1 00:36:53.869536 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:36:53.873718 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:36:53.873826 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:36:53.873985 systemd[1]: Startup finished in 2.038s (kernel) + 25.591s (initrd) + 21.443s (userspace) = 49.073s. Nov 1 00:36:58.821201 systemd[1]: Started sshd@3-145.40.82.39:22-147.75.109.163:33016.service. Nov 1 00:36:58.858358 sshd[2072]: Accepted publickey for core from 147.75.109.163 port 33016 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:58.859314 sshd[2072]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:58.862491 systemd-logind[1436]: New session 6 of user core. Nov 1 00:36:58.863306 systemd[1]: Started session-6.scope. Nov 1 00:36:58.919904 sshd[2072]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:58.921557 systemd[1]: sshd@3-145.40.82.39:22-147.75.109.163:33016.service: Deactivated successfully. Nov 1 00:36:58.921882 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:36:58.922195 systemd-logind[1436]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:36:58.922742 systemd[1]: Started sshd@4-145.40.82.39:22-147.75.109.163:33026.service. Nov 1 00:36:58.923139 systemd-logind[1436]: Removed session 6. Nov 1 00:36:58.960185 sshd[2078]: Accepted publickey for core from 147.75.109.163 port 33026 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:58.961486 sshd[2078]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:58.965485 systemd-logind[1436]: New session 7 of user core. Nov 1 00:36:58.966682 systemd[1]: Started session-7.scope. Nov 1 00:36:59.022850 sshd[2078]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:59.024463 systemd[1]: sshd@4-145.40.82.39:22-147.75.109.163:33026.service: Deactivated successfully. Nov 1 00:36:59.024767 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:36:59.025037 systemd-logind[1436]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:36:59.025551 systemd[1]: Started sshd@5-145.40.82.39:22-147.75.109.163:33040.service. Nov 1 00:36:59.025908 systemd-logind[1436]: Removed session 7. Nov 1 00:36:59.063006 sshd[2084]: Accepted publickey for core from 147.75.109.163 port 33040 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:59.064262 sshd[2084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:59.068688 systemd-logind[1436]: New session 8 of user core. Nov 1 00:36:59.069711 systemd[1]: Started session-8.scope. Nov 1 00:36:59.128782 sshd[2084]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:59.130288 systemd[1]: sshd@5-145.40.82.39:22-147.75.109.163:33040.service: Deactivated successfully. Nov 1 00:36:59.130605 systemd[1]: session-8.scope: Deactivated successfully. Nov 1 00:36:59.130921 systemd-logind[1436]: Session 8 logged out. Waiting for processes to exit. Nov 1 00:36:59.131467 systemd[1]: Started sshd@6-145.40.82.39:22-147.75.109.163:33050.service. Nov 1 00:36:59.131880 systemd-logind[1436]: Removed session 8. Nov 1 00:36:59.169084 sshd[2090]: Accepted publickey for core from 147.75.109.163 port 33050 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:59.170468 sshd[2090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:59.174704 systemd-logind[1436]: New session 9 of user core. Nov 1 00:36:59.175875 systemd[1]: Started session-9.scope. Nov 1 00:36:59.263496 sudo[2093]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:36:59.264056 sudo[2093]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:36:59.283767 dbus-daemon[1408]: Эo\xba\xd4U: received setenforce notice (enforcing=-1303757936) Nov 1 00:36:59.288223 sudo[2093]: pam_unix(sudo:session): session closed for user root Nov 1 00:36:59.292805 sshd[2090]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:59.299357 systemd[1]: sshd@6-145.40.82.39:22-147.75.109.163:33050.service: Deactivated successfully. Nov 1 00:36:59.300887 systemd[1]: session-9.scope: Deactivated successfully. Nov 1 00:36:59.302420 systemd-logind[1436]: Session 9 logged out. Waiting for processes to exit. Nov 1 00:36:59.304972 systemd[1]: Started sshd@7-145.40.82.39:22-147.75.109.163:33060.service. Nov 1 00:36:59.307067 systemd-logind[1436]: Removed session 9. Nov 1 00:36:59.365326 sshd[2097]: Accepted publickey for core from 147.75.109.163 port 33060 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:59.366109 sshd[2097]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:59.368353 systemd-logind[1436]: New session 10 of user core. Nov 1 00:36:59.368908 systemd[1]: Started session-10.scope. Nov 1 00:36:59.422971 sudo[2101]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:36:59.423081 sudo[2101]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:36:59.424728 sudo[2101]: pam_unix(sudo:session): session closed for user root Nov 1 00:36:59.427063 sudo[2100]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:36:59.427171 sudo[2100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:36:59.432163 systemd[1]: Stopping audit-rules.service... Nov 1 00:36:59.432000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:36:59.433016 auditctl[2104]: No rules Nov 1 00:36:59.433376 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:36:59.433567 systemd[1]: Stopped audit-rules.service. Nov 1 00:36:59.435243 systemd[1]: Starting audit-rules.service... Nov 1 00:36:59.446004 augenrules[2121]: No rules Nov 1 00:36:59.446500 systemd[1]: Finished audit-rules.service. Nov 1 00:36:59.447067 sudo[2100]: pam_unix(sudo:session): session closed for user root Nov 1 00:36:59.432000 audit[2104]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe09d4d640 a2=420 a3=0 items=0 ppid=1 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:59.448034 sshd[2097]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:59.450818 systemd[1]: sshd@7-145.40.82.39:22-147.75.109.163:33060.service: Deactivated successfully. Nov 1 00:36:59.451460 systemd[1]: session-10.scope: Deactivated successfully. Nov 1 00:36:59.452011 systemd-logind[1436]: Session 10 logged out. Waiting for processes to exit. Nov 1 00:36:59.453255 systemd[1]: Started sshd@8-145.40.82.39:22-147.75.109.163:33076.service. Nov 1 00:36:59.454002 systemd-logind[1436]: Removed session 10. Nov 1 00:36:59.479305 kernel: audit: type=1305 audit(1761957419.432:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:36:59.479393 kernel: audit: type=1300 audit(1761957419.432:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe09d4d640 a2=420 a3=0 items=0 ppid=1 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:59.479410 kernel: audit: type=1327 audit(1761957419.432:167): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:36:59.432000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:36:59.488840 kernel: audit: type=1131 audit(1761957419.433:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.511154 kernel: audit: type=1130 audit(1761957419.446:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.520230 sshd[2127]: Accepted publickey for core from 147.75.109.163 port 33076 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:59.523662 sshd[2127]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:59.526175 systemd-logind[1436]: New session 11 of user core. Nov 1 00:36:59.527270 systemd[1]: Started session-11.scope. Nov 1 00:36:59.533520 kernel: audit: type=1106 audit(1761957419.446:170): pid=2100 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.446000 audit[2100]: USER_END pid=2100 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.559504 kernel: audit: type=1104 audit(1761957419.446:171): pid=2100 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.446000 audit[2100]: CRED_DISP pid=2100 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.573072 sshd[2127]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:59.575519 systemd[1]: sshd@8-145.40.82.39:22-147.75.109.163:33076.service: Deactivated successfully. Nov 1 00:36:59.576049 systemd[1]: session-11.scope: Deactivated successfully. Nov 1 00:36:59.576517 systemd-logind[1436]: Session 11 logged out. Waiting for processes to exit. Nov 1 00:36:59.577587 systemd[1]: Started sshd@9-145.40.82.39:22-147.75.109.163:33090.service. Nov 1 00:36:59.578194 systemd-logind[1436]: Removed session 11. Nov 1 00:36:59.582995 kernel: audit: type=1106 audit(1761957419.448:172): pid=2097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.448000 audit[2097]: USER_END pid=2097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.615166 kernel: audit: type=1104 audit(1761957419.448:173): pid=2097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.448000 audit[2097]: CRED_DISP pid=2097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.641043 kernel: audit: type=1131 audit(1761957419.450:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.82.39:22-147.75.109.163:33060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.82.39:22-147.75.109.163:33060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.646412 sshd[2135]: Accepted publickey for core from 147.75.109.163 port 33090 ssh2: RSA SHA256:LGZ+c0Hq+wiF6pI4hwBSHaiZcbAeE7k627fjfDIAcNQ Nov 1 00:36:59.647628 sshd[2135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:36:59.650044 systemd-logind[1436]: New session 12 of user core. Nov 1 00:36:59.651056 systemd[1]: Started session-12.scope. Nov 1 00:36:59.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.82.39:22-147.75.109.163:33076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.518000 audit[2127]: USER_ACCT pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.522000 audit[2127]: CRED_ACQ pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.522000 audit[2127]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91c42a50 a2=3 a3=0 items=0 ppid=1 pid=2127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:59.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:36:59.528000 audit[2127]: USER_START pid=2127 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.529000 audit[2129]: CRED_ACQ pid=2129 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.572000 audit[2127]: USER_END pid=2127 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.572000 audit[2127]: CRED_DISP pid=2127 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.82.39:22-147.75.109.163:33076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.82.39:22-147.75.109.163:33090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:36:59.645000 audit[2135]: USER_ACCT pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.647000 audit[2135]: CRED_ACQ pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.647000 audit[2135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffda26f040 a2=3 a3=0 items=0 ppid=1 pid=2135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:36:59.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:36:59.653000 audit[2135]: USER_START pid=2135 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.653000 audit[2137]: CRED_ACQ pid=2137 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.993925 sshd[2135]: pam_unix(sshd:session): session closed for user core Nov 1 00:36:59.995000 audit[2135]: USER_END pid=2135 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.996000 audit[2135]: CRED_DISP pid=2135 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:36:59.999204 systemd[1]: sshd@9-145.40.82.39:22-147.75.109.163:33090.service: Deactivated successfully. Nov 1 00:36:59.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.82.39:22-147.75.109.163:33090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:37:00.000813 systemd[1]: session-12.scope: Deactivated successfully. Nov 1 00:37:00.002392 systemd-logind[1436]: Session 12 logged out. Waiting for processes to exit. Nov 1 00:37:00.004272 systemd-logind[1436]: Removed session 12. Nov 1 00:37:24.826604 update_engine[1438]: I1101 00:37:24.826474 1438 update_attempter.cc:509] Updating boot flags... Nov 1 00:42:35.649538 systemd[1]: Started sshd@10-145.40.82.39:22-36.92.84.132:42532.service. Nov 1 00:42:35.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.39:22-36.92.84.132:42532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:35.655157 kernel: kauditd_printk_skb: 22 callbacks suppressed Nov 1 00:42:35.655263 kernel: audit: type=1130 audit(1761957755.649:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.39:22-36.92.84.132:42532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:36.621462 sshd[2189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:42:36.621000 audit[2189]: USER_AUTH pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:36.698543 kernel: audit: type=1100 audit(1761957756.621:194): pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:38.746824 sshd[2189]: Failed password for root from 36.92.84.132 port 42532 ssh2 Nov 1 00:42:39.155977 sshd[2189]: Connection closed by authenticating user root 36.92.84.132 port 42532 [preauth] Nov 1 00:42:39.158564 systemd[1]: sshd@10-145.40.82.39:22-36.92.84.132:42532.service: Deactivated successfully. Nov 1 00:42:39.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.39:22-36.92.84.132:42532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:39.238428 kernel: audit: type=1131 audit(1761957759.158:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.39:22-36.92.84.132:42532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:39.357883 systemd[1]: Started sshd@11-145.40.82.39:22-36.92.84.132:42548.service. Nov 1 00:42:39.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.82.39:22-36.92.84.132:42548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:39.440549 kernel: audit: type=1130 audit(1761957759.357:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.82.39:22-36.92.84.132:42548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:40.362559 sshd[2195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:42:40.362000 audit[2195]: USER_AUTH pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:40.448534 kernel: audit: type=1100 audit(1761957760.362:197): pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:42.372395 sshd[2195]: Failed password for root from 36.92.84.132 port 42548 ssh2 Nov 1 00:42:42.904059 sshd[2195]: Connection closed by authenticating user root 36.92.84.132 port 42548 [preauth] Nov 1 00:42:42.906656 systemd[1]: sshd@11-145.40.82.39:22-36.92.84.132:42548.service: Deactivated successfully. Nov 1 00:42:42.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.82.39:22-36.92.84.132:42548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:42.995540 kernel: audit: type=1131 audit(1761957762.906:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.82.39:22-36.92.84.132:42548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:43.089763 systemd[1]: Started sshd@12-145.40.82.39:22-36.92.84.132:42558.service. Nov 1 00:42:43.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.39:22-36.92.84.132:42558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:43.180548 kernel: audit: type=1130 audit(1761957763.089:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.39:22-36.92.84.132:42558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:44.051952 sshd[2199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:42:44.051000 audit[2199]: USER_AUTH pid=2199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:44.143540 kernel: audit: type=1100 audit(1761957764.051:200): pid=2199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:46.277496 sshd[2199]: Failed password for root from 36.92.84.132 port 42558 ssh2 Nov 1 00:42:46.584851 sshd[2199]: Connection closed by authenticating user root 36.92.84.132 port 42558 [preauth] Nov 1 00:42:46.587427 systemd[1]: sshd@12-145.40.82.39:22-36.92.84.132:42558.service: Deactivated successfully. Nov 1 00:42:46.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.39:22-36.92.84.132:42558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:46.679544 kernel: audit: type=1131 audit(1761957766.587:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.39:22-36.92.84.132:42558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:46.779784 systemd[1]: Started sshd@13-145.40.82.39:22-36.92.84.132:51318.service. Nov 1 00:42:46.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.39:22-36.92.84.132:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:46.872462 kernel: audit: type=1130 audit(1761957766.779:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.39:22-36.92.84.132:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:47.753830 sshd[2203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:42:47.753000 audit[2203]: USER_AUTH pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:47.845533 kernel: audit: type=1100 audit(1761957767.753:203): pid=2203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:49.723583 sshd[2203]: Failed password for root from 36.92.84.132 port 51318 ssh2 Nov 1 00:42:50.288803 sshd[2203]: Connection closed by authenticating user root 36.92.84.132 port 51318 [preauth] Nov 1 00:42:50.291393 systemd[1]: sshd@13-145.40.82.39:22-36.92.84.132:51318.service: Deactivated successfully. Nov 1 00:42:50.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.39:22-36.92.84.132:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:50.382542 kernel: audit: type=1131 audit(1761957770.291:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.39:22-36.92.84.132:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:50.485757 systemd[1]: Started sshd@14-145.40.82.39:22-36.92.84.132:51322.service. Nov 1 00:42:50.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.39:22-36.92.84.132:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:50.577560 kernel: audit: type=1130 audit(1761957770.485:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.39:22-36.92.84.132:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:51.472277 sshd[2208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:42:51.472000 audit[2208]: ANOM_LOGIN_FAILURES pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:51.472571 sshd[2208]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Nov 1 00:42:51.472000 audit[2208]: USER_AUTH pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:51.626519 kernel: audit: type=2100 audit(1761957771.472:206): pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:51.626551 kernel: audit: type=1100 audit(1761957771.472:207): pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:53.993834 sshd[2208]: Failed password for root from 36.92.84.132 port 51322 ssh2 Nov 1 00:42:56.356304 sshd[2208]: Connection closed by authenticating user root 36.92.84.132 port 51322 [preauth] Nov 1 00:42:56.359015 systemd[1]: sshd@14-145.40.82.39:22-36.92.84.132:51322.service: Deactivated successfully. Nov 1 00:42:56.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.39:22-36.92.84.132:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:56.450544 kernel: audit: type=1131 audit(1761957776.359:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.39:22-36.92.84.132:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:56.541870 systemd[1]: Started sshd@15-145.40.82.39:22-36.92.84.132:52390.service. Nov 1 00:42:56.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.39:22-36.92.84.132:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:56.634356 kernel: audit: type=1130 audit(1761957776.541:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.39:22-36.92.84.132:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:57.499580 sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:42:57.499000 audit[2212]: USER_AUTH pid=2212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:57.591537 kernel: audit: type=1100 audit(1761957777.499:210): pid=2212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:42:59.509433 sshd[2212]: Failed password for root from 36.92.84.132 port 52390 ssh2 Nov 1 00:43:00.031123 sshd[2212]: Connection closed by authenticating user root 36.92.84.132 port 52390 [preauth] Nov 1 00:43:00.033764 systemd[1]: sshd@15-145.40.82.39:22-36.92.84.132:52390.service: Deactivated successfully. Nov 1 00:43:00.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.39:22-36.92.84.132:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:00.126544 kernel: audit: type=1131 audit(1761957780.033:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.39:22-36.92.84.132:52390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:00.232780 systemd[1]: Started sshd@16-145.40.82.39:22-36.92.84.132:52392.service. Nov 1 00:43:00.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.39:22-36.92.84.132:52392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:00.325355 kernel: audit: type=1130 audit(1761957780.232:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.39:22-36.92.84.132:52392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:01.242135 sshd[2216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:01.242000 audit[2216]: USER_AUTH pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:01.334403 kernel: audit: type=1100 audit(1761957781.242:213): pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:03.467753 sshd[2216]: Failed password for root from 36.92.84.132 port 52392 ssh2 Nov 1 00:43:03.783097 sshd[2216]: Connection closed by authenticating user root 36.92.84.132 port 52392 [preauth] Nov 1 00:43:03.785606 systemd[1]: sshd@16-145.40.82.39:22-36.92.84.132:52392.service: Deactivated successfully. Nov 1 00:43:03.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.39:22-36.92.84.132:52392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:03.878546 kernel: audit: type=1131 audit(1761957783.785:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.39:22-36.92.84.132:52392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:03.989546 systemd[1]: Started sshd@17-145.40.82.39:22-36.92.84.132:52408.service. Nov 1 00:43:03.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.39:22-36.92.84.132:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:04.080393 kernel: audit: type=1130 audit(1761957783.989:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.39:22-36.92.84.132:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:05.012385 sshd[2220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:05.012000 audit[2220]: USER_AUTH pid=2220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:05.104535 kernel: audit: type=1100 audit(1761957785.012:216): pid=2220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:06.786409 sshd[2220]: Failed password for root from 36.92.84.132 port 52408 ssh2 Nov 1 00:43:07.555887 sshd[2220]: Connection closed by authenticating user root 36.92.84.132 port 52408 [preauth] Nov 1 00:43:07.558508 systemd[1]: sshd@17-145.40.82.39:22-36.92.84.132:52408.service: Deactivated successfully. Nov 1 00:43:07.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.39:22-36.92.84.132:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:07.651680 kernel: audit: type=1131 audit(1761957787.557:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.39:22-36.92.84.132:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:07.744600 systemd[1]: Started sshd@18-145.40.82.39:22-36.92.84.132:42230.service. Nov 1 00:43:07.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.39:22-36.92.84.132:42230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:07.836381 kernel: audit: type=1130 audit(1761957787.743:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.39:22-36.92.84.132:42230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:08.726449 sshd[2224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:08.725000 audit[2224]: USER_AUTH pid=2224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:08.818405 kernel: audit: type=1100 audit(1761957788.725:219): pid=2224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:10.912090 sshd[2224]: Failed password for root from 36.92.84.132 port 42230 ssh2 Nov 1 00:43:11.262977 sshd[2224]: Connection closed by authenticating user root 36.92.84.132 port 42230 [preauth] Nov 1 00:43:11.265508 systemd[1]: sshd@18-145.40.82.39:22-36.92.84.132:42230.service: Deactivated successfully. Nov 1 00:43:11.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.39:22-36.92.84.132:42230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:11.358549 kernel: audit: type=1131 audit(1761957791.264:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.39:22-36.92.84.132:42230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:11.458670 systemd[1]: Started sshd@19-145.40.82.39:22-36.92.84.132:42246.service. Nov 1 00:43:11.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.39:22-36.92.84.132:42246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:11.551553 kernel: audit: type=1130 audit(1761957791.457:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.39:22-36.92.84.132:42246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:12.462894 sshd[2230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:12.461000 audit[2230]: USER_AUTH pid=2230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:12.554406 kernel: audit: type=1100 audit(1761957792.461:222): pid=2230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:14.532816 sshd[2230]: Failed password for root from 36.92.84.132 port 42246 ssh2 Nov 1 00:43:15.002226 sshd[2230]: Connection closed by authenticating user root 36.92.84.132 port 42246 [preauth] Nov 1 00:43:15.004820 systemd[1]: sshd@19-145.40.82.39:22-36.92.84.132:42246.service: Deactivated successfully. Nov 1 00:43:15.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.39:22-36.92.84.132:42246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:15.097546 kernel: audit: type=1131 audit(1761957795.003:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.39:22-36.92.84.132:42246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:15.196583 systemd[1]: Started sshd@20-145.40.82.39:22-36.92.84.132:51400.service. Nov 1 00:43:15.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.39:22-36.92.84.132:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:15.288547 kernel: audit: type=1130 audit(1761957795.195:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.39:22-36.92.84.132:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:16.186756 sshd[2236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:16.185000 audit[2236]: USER_AUTH pid=2236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:16.279680 kernel: audit: type=1100 audit(1761957796.185:225): pid=2236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:17.805147 sshd[2236]: Failed password for root from 36.92.84.132 port 51400 ssh2 Nov 1 00:43:18.724681 sshd[2236]: Connection closed by authenticating user root 36.92.84.132 port 51400 [preauth] Nov 1 00:43:18.727290 systemd[1]: sshd@20-145.40.82.39:22-36.92.84.132:51400.service: Deactivated successfully. Nov 1 00:43:18.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.39:22-36.92.84.132:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:18.820542 kernel: audit: type=1131 audit(1761957798.726:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.39:22-36.92.84.132:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:18.916678 systemd[1]: Started sshd@21-145.40.82.39:22-36.92.84.132:51402.service. Nov 1 00:43:18.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.82.39:22-36.92.84.132:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:19.009438 kernel: audit: type=1130 audit(1761957798.915:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.82.39:22-36.92.84.132:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:19.867438 sshd[2242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:19.866000 audit[2242]: USER_AUTH pid=2242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:19.959535 kernel: audit: type=1100 audit(1761957799.866:228): pid=2242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:21.897384 sshd[2242]: Failed password for root from 36.92.84.132 port 51402 ssh2 Nov 1 00:43:22.397194 sshd[2242]: Connection closed by authenticating user root 36.92.84.132 port 51402 [preauth] Nov 1 00:43:22.399833 systemd[1]: sshd@21-145.40.82.39:22-36.92.84.132:51402.service: Deactivated successfully. Nov 1 00:43:22.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.82.39:22-36.92.84.132:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:22.493535 kernel: audit: type=1131 audit(1761957802.398:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.82.39:22-36.92.84.132:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:22.602216 systemd[1]: Started sshd@22-145.40.82.39:22-36.92.84.132:51406.service. Nov 1 00:43:22.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.39:22-36.92.84.132:51406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:22.694386 kernel: audit: type=1130 audit(1761957802.601:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.39:22-36.92.84.132:51406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:23.606961 sshd[2246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:23.605000 audit[2246]: USER_AUTH pid=2246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:23.699535 kernel: audit: type=1100 audit(1761957803.605:231): pid=2246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:25.521183 sshd[2246]: Failed password for root from 36.92.84.132 port 51406 ssh2 Nov 1 00:43:26.147415 sshd[2246]: Connection closed by authenticating user root 36.92.84.132 port 51406 [preauth] Nov 1 00:43:26.150022 systemd[1]: sshd@22-145.40.82.39:22-36.92.84.132:51406.service: Deactivated successfully. Nov 1 00:43:26.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.39:22-36.92.84.132:51406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:26.242403 kernel: audit: type=1131 audit(1761957806.149:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.39:22-36.92.84.132:51406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:26.341041 systemd[1]: Started sshd@23-145.40.82.39:22-36.92.84.132:56144.service. Nov 1 00:43:26.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.39:22-36.92.84.132:56144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:26.433545 kernel: audit: type=1130 audit(1761957806.339:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.39:22-36.92.84.132:56144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:27.335202 sshd[2250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:27.334000 audit[2250]: USER_AUTH pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:27.427534 kernel: audit: type=1100 audit(1761957807.334:234): pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:29.796752 sshd[2250]: Failed password for root from 36.92.84.132 port 56144 ssh2 Nov 1 00:43:32.220850 sshd[2250]: Connection closed by authenticating user root 36.92.84.132 port 56144 [preauth] Nov 1 00:43:32.223458 systemd[1]: sshd@23-145.40.82.39:22-36.92.84.132:56144.service: Deactivated successfully. Nov 1 00:43:32.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.39:22-36.92.84.132:56144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:32.316442 kernel: audit: type=1131 audit(1761957812.222:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.39:22-36.92.84.132:56144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:32.417139 systemd[1]: Started sshd@24-145.40.82.39:22-36.92.84.132:56148.service. Nov 1 00:43:32.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.39:22-36.92.84.132:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:32.509353 kernel: audit: type=1130 audit(1761957812.415:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.39:22-36.92.84.132:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:33.391648 sshd[2255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:33.390000 audit[2255]: USER_AUTH pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:33.483536 kernel: audit: type=1100 audit(1761957813.390:237): pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:35.340628 sshd[2255]: Failed password for root from 36.92.84.132 port 56148 ssh2 Nov 1 00:43:35.926176 sshd[2255]: Connection closed by authenticating user root 36.92.84.132 port 56148 [preauth] Nov 1 00:43:35.928774 systemd[1]: sshd@24-145.40.82.39:22-36.92.84.132:56148.service: Deactivated successfully. Nov 1 00:43:35.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.39:22-36.92.84.132:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:36.021538 kernel: audit: type=1131 audit(1761957815.927:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.39:22-36.92.84.132:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:36.113538 systemd[1]: Started sshd@25-145.40.82.39:22-36.92.84.132:50292.service. Nov 1 00:43:36.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.82.39:22-36.92.84.132:50292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:36.205394 kernel: audit: type=1130 audit(1761957816.112:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.82.39:22-36.92.84.132:50292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:37.077712 sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:37.076000 audit[2260]: USER_AUTH pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:37.169532 kernel: audit: type=1100 audit(1761957817.076:240): pid=2260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:39.578626 sshd[2260]: Failed password for root from 36.92.84.132 port 50292 ssh2 Nov 1 00:43:41.956974 sshd[2260]: Connection closed by authenticating user root 36.92.84.132 port 50292 [preauth] Nov 1 00:43:41.959623 systemd[1]: sshd@25-145.40.82.39:22-36.92.84.132:50292.service: Deactivated successfully. Nov 1 00:43:41.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.82.39:22-36.92.84.132:50292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:42.052464 kernel: audit: type=1131 audit(1761957821.958:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.82.39:22-36.92.84.132:50292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:42.156565 systemd[1]: Started sshd@26-145.40.82.39:22-36.92.84.132:50300.service. Nov 1 00:43:42.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.82.39:22-36.92.84.132:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:42.248353 kernel: audit: type=1130 audit(1761957822.155:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.82.39:22-36.92.84.132:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:43.152343 sshd[2264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:43.151000 audit[2264]: USER_AUTH pid=2264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:43.244534 kernel: audit: type=1100 audit(1761957823.151:243): pid=2264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:45.142384 sshd[2264]: Failed password for root from 36.92.84.132 port 50300 ssh2 Nov 1 00:43:45.691125 sshd[2264]: Connection closed by authenticating user root 36.92.84.132 port 50300 [preauth] Nov 1 00:43:45.693731 systemd[1]: sshd@26-145.40.82.39:22-36.92.84.132:50300.service: Deactivated successfully. Nov 1 00:43:45.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.82.39:22-36.92.84.132:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.791549 kernel: audit: type=1131 audit(1761957825.692:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.82.39:22-36.92.84.132:50300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.878090 systemd[1]: Started sshd@27-145.40.82.39:22-36.92.84.132:44204.service. Nov 1 00:43:45.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.39:22-36.92.84.132:44204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:45.970354 kernel: audit: type=1130 audit(1761957825.876:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.39:22-36.92.84.132:44204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:46.828946 sshd[2271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:46.827000 audit[2271]: USER_AUTH pid=2271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:46.922388 kernel: audit: type=1100 audit(1761957826.827:246): pid=2271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:48.898765 sshd[2271]: Failed password for root from 36.92.84.132 port 44204 ssh2 Nov 1 00:43:49.358959 sshd[2271]: Connection closed by authenticating user root 36.92.84.132 port 44204 [preauth] Nov 1 00:43:49.361573 systemd[1]: sshd@27-145.40.82.39:22-36.92.84.132:44204.service: Deactivated successfully. Nov 1 00:43:49.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.39:22-36.92.84.132:44204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:49.454558 kernel: audit: type=1131 audit(1761957829.360:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.39:22-36.92.84.132:44204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:49.556345 systemd[1]: Started sshd@28-145.40.82.39:22-36.92.84.132:44212.service. Nov 1 00:43:49.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.82.39:22-36.92.84.132:44212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:49.649552 kernel: audit: type=1130 audit(1761957829.555:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.82.39:22-36.92.84.132:44212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:50.533884 sshd[2275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:50.532000 audit[2275]: USER_AUTH pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:50.625408 kernel: audit: type=1100 audit(1761957830.532:249): pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:52.819726 sshd[2275]: Failed password for root from 36.92.84.132 port 44212 ssh2 Nov 1 00:43:53.068831 sshd[2275]: Connection closed by authenticating user root 36.92.84.132 port 44212 [preauth] Nov 1 00:43:53.071488 systemd[1]: sshd@28-145.40.82.39:22-36.92.84.132:44212.service: Deactivated successfully. Nov 1 00:43:53.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.82.39:22-36.92.84.132:44212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:53.164561 kernel: audit: type=1131 audit(1761957833.070:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.82.39:22-36.92.84.132:44212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:53.268650 systemd[1]: Started sshd@29-145.40.82.39:22-36.92.84.132:44218.service. Nov 1 00:43:53.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.82.39:22-36.92.84.132:44218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:53.361354 kernel: audit: type=1130 audit(1761957833.267:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.82.39:22-36.92.84.132:44218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:54.243826 sshd[2280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:54.242000 audit[2280]: USER_AUTH pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:54.335523 kernel: audit: type=1100 audit(1761957834.242:252): pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:56.077995 sshd[2280]: Failed password for root from 36.92.84.132 port 44218 ssh2 Nov 1 00:43:56.778746 sshd[2280]: Connection closed by authenticating user root 36.92.84.132 port 44218 [preauth] Nov 1 00:43:56.782151 systemd[1]: sshd@29-145.40.82.39:22-36.92.84.132:44218.service: Deactivated successfully. Nov 1 00:43:56.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.82.39:22-36.92.84.132:44218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:56.875443 kernel: audit: type=1131 audit(1761957836.781:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.82.39:22-36.92.84.132:44218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:56.965874 systemd[1]: Started sshd@30-145.40.82.39:22-36.92.84.132:35680.service. Nov 1 00:43:56.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.82.39:22-36.92.84.132:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:57.058462 kernel: audit: type=1130 audit(1761957836.964:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.82.39:22-36.92.84.132:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:43:57.943591 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:43:57.942000 audit[2286]: USER_AUTH pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:43:58.036537 kernel: audit: type=1100 audit(1761957837.942:255): pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:00.525277 sshd[2286]: Failed password for root from 36.92.84.132 port 35680 ssh2 Nov 1 00:44:02.826693 sshd[2286]: Connection closed by authenticating user root 36.92.84.132 port 35680 [preauth] Nov 1 00:44:02.829283 systemd[1]: sshd@30-145.40.82.39:22-36.92.84.132:35680.service: Deactivated successfully. Nov 1 00:44:02.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.82.39:22-36.92.84.132:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:02.922534 kernel: audit: type=1131 audit(1761957842.828:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.82.39:22-36.92.84.132:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:03.020946 systemd[1]: Started sshd@31-145.40.82.39:22-36.92.84.132:35692.service. Nov 1 00:44:03.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.82.39:22-36.92.84.132:35692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:03.114556 kernel: audit: type=1130 audit(1761957843.019:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.82.39:22-36.92.84.132:35692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:04.002083 sshd[2290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:04.001000 audit[2290]: USER_AUTH pid=2290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:04.094534 kernel: audit: type=1100 audit(1761957844.001:258): pid=2290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:05.875542 sshd[2290]: Failed password for root from 36.92.84.132 port 35692 ssh2 Nov 1 00:44:06.537637 sshd[2290]: Connection closed by authenticating user root 36.92.84.132 port 35692 [preauth] Nov 1 00:44:06.540292 systemd[1]: sshd@31-145.40.82.39:22-36.92.84.132:35692.service: Deactivated successfully. Nov 1 00:44:06.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.82.39:22-36.92.84.132:35692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:06.633549 kernel: audit: type=1131 audit(1761957846.539:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.82.39:22-36.92.84.132:35692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:06.738491 systemd[1]: Started sshd@32-145.40.82.39:22-36.92.84.132:41624.service. Nov 1 00:44:06.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.82.39:22-36.92.84.132:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:06.831553 kernel: audit: type=1130 audit(1761957846.737:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.82.39:22-36.92.84.132:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:07.731124 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:07.730000 audit[2294]: USER_AUTH pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:07.823527 kernel: audit: type=1100 audit(1761957847.730:261): pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:10.352690 sshd[2294]: Failed password for root from 36.92.84.132 port 41624 ssh2 Nov 1 00:44:12.615901 sshd[2294]: Connection closed by authenticating user root 36.92.84.132 port 41624 [preauth] Nov 1 00:44:12.618492 systemd[1]: sshd@32-145.40.82.39:22-36.92.84.132:41624.service: Deactivated successfully. Nov 1 00:44:12.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.82.39:22-36.92.84.132:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:12.711548 kernel: audit: type=1131 audit(1761957852.617:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.82.39:22-36.92.84.132:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:12.825860 systemd[1]: Started sshd@33-145.40.82.39:22-36.92.84.132:41634.service. Nov 1 00:44:12.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.82.39:22-36.92.84.132:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:12.918394 kernel: audit: type=1130 audit(1761957852.824:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.82.39:22-36.92.84.132:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:13.840995 sshd[2299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:13.839000 audit[2299]: USER_AUTH pid=2299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:13.933529 kernel: audit: type=1100 audit(1761957853.839:264): pid=2299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:15.951162 sshd[2299]: Failed password for root from 36.92.84.132 port 41634 ssh2 Nov 1 00:44:16.384215 sshd[2299]: Connection closed by authenticating user root 36.92.84.132 port 41634 [preauth] Nov 1 00:44:16.386839 systemd[1]: sshd@33-145.40.82.39:22-36.92.84.132:41634.service: Deactivated successfully. Nov 1 00:44:16.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.82.39:22-36.92.84.132:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:16.479389 kernel: audit: type=1131 audit(1761957856.385:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.82.39:22-36.92.84.132:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:16.589794 systemd[1]: Started sshd@34-145.40.82.39:22-36.92.84.132:55026.service. Nov 1 00:44:16.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.82.39:22-36.92.84.132:55026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:16.682446 kernel: audit: type=1130 audit(1761957856.588:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.82.39:22-36.92.84.132:55026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:17.601093 sshd[2303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:17.600000 audit[2303]: USER_AUTH pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:17.693519 kernel: audit: type=1100 audit(1761957857.600:267): pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:19.259542 sshd[2303]: Failed password for root from 36.92.84.132 port 55026 ssh2 Nov 1 00:44:20.146687 sshd[2303]: Connection closed by authenticating user root 36.92.84.132 port 55026 [preauth] Nov 1 00:44:20.149302 systemd[1]: sshd@34-145.40.82.39:22-36.92.84.132:55026.service: Deactivated successfully. Nov 1 00:44:20.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.82.39:22-36.92.84.132:55026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:20.242546 kernel: audit: type=1131 audit(1761957860.148:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.82.39:22-36.92.84.132:55026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:20.347834 systemd[1]: Started sshd@35-145.40.82.39:22-36.92.84.132:55036.service. Nov 1 00:44:20.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.82.39:22-36.92.84.132:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:20.441559 kernel: audit: type=1130 audit(1761957860.346:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.82.39:22-36.92.84.132:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:21.356963 sshd[2307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:21.355000 audit[2307]: USER_AUTH pid=2307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:21.449544 kernel: audit: type=1100 audit(1761957861.355:270): pid=2307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:23.898508 sshd[2307]: Failed password for root from 36.92.84.132 port 55036 ssh2 Nov 1 00:44:26.245955 sshd[2307]: Connection closed by authenticating user root 36.92.84.132 port 55036 [preauth] Nov 1 00:44:26.248548 systemd[1]: sshd@35-145.40.82.39:22-36.92.84.132:55036.service: Deactivated successfully. Nov 1 00:44:26.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.82.39:22-36.92.84.132:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:26.341528 kernel: audit: type=1131 audit(1761957866.247:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.82.39:22-36.92.84.132:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:26.435914 systemd[1]: Started sshd@36-145.40.82.39:22-36.92.84.132:38210.service. Nov 1 00:44:26.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.82.39:22-36.92.84.132:38210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:26.528546 kernel: audit: type=1130 audit(1761957866.434:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.82.39:22-36.92.84.132:38210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:27.386235 sshd[2312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:27.385000 audit[2312]: USER_AUTH pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:27.478536 kernel: audit: type=1100 audit(1761957867.385:273): pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:29.416452 sshd[2312]: Failed password for root from 36.92.84.132 port 38210 ssh2 Nov 1 00:44:29.916021 sshd[2312]: Connection closed by authenticating user root 36.92.84.132 port 38210 [preauth] Nov 1 00:44:29.918640 systemd[1]: sshd@36-145.40.82.39:22-36.92.84.132:38210.service: Deactivated successfully. Nov 1 00:44:29.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.82.39:22-36.92.84.132:38210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:30.011553 kernel: audit: type=1131 audit(1761957869.917:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.82.39:22-36.92.84.132:38210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:30.109840 systemd[1]: Started sshd@37-145.40.82.39:22-36.92.84.132:38226.service. Nov 1 00:44:30.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.82.39:22-36.92.84.132:38226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:30.202353 kernel: audit: type=1130 audit(1761957870.108:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.82.39:22-36.92.84.132:38226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:31.090080 sshd[2317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:31.089000 audit[2317]: USER_AUTH pid=2317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:31.182536 kernel: audit: type=1100 audit(1761957871.089:276): pid=2317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:33.671924 sshd[2317]: Failed password for root from 36.92.84.132 port 38226 ssh2 Nov 1 00:44:35.973542 sshd[2317]: Connection closed by authenticating user root 36.92.84.132 port 38226 [preauth] Nov 1 00:44:35.976206 systemd[1]: sshd@37-145.40.82.39:22-36.92.84.132:38226.service: Deactivated successfully. Nov 1 00:44:35.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.82.39:22-36.92.84.132:38226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:36.069527 kernel: audit: type=1131 audit(1761957875.975:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.82.39:22-36.92.84.132:38226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:36.172581 systemd[1]: Started sshd@38-145.40.82.39:22-36.92.84.132:43836.service. Nov 1 00:44:36.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.82.39:22-36.92.84.132:43836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:36.265450 kernel: audit: type=1130 audit(1761957876.171:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.82.39:22-36.92.84.132:43836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:37.145948 sshd[2321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:37.144000 audit[2321]: USER_AUTH pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:37.238538 kernel: audit: type=1100 audit(1761957877.144:279): pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:39.216172 sshd[2321]: Failed password for root from 36.92.84.132 port 43836 ssh2 Nov 1 00:44:39.680328 sshd[2321]: Connection closed by authenticating user root 36.92.84.132 port 43836 [preauth] Nov 1 00:44:39.682916 systemd[1]: sshd@38-145.40.82.39:22-36.92.84.132:43836.service: Deactivated successfully. Nov 1 00:44:39.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.82.39:22-36.92.84.132:43836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:39.775422 kernel: audit: type=1131 audit(1761957879.682:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.82.39:22-36.92.84.132:43836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:39.865913 systemd[1]: Started sshd@39-145.40.82.39:22-36.92.84.132:43850.service. Nov 1 00:44:39.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.82.39:22-36.92.84.132:43850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:39.958552 kernel: audit: type=1130 audit(1761957879.864:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.82.39:22-36.92.84.132:43850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:40.819406 sshd[2325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:40.818000 audit[2325]: USER_AUTH pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:40.911394 kernel: audit: type=1100 audit(1761957880.818:282): pid=2325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:42.969699 sshd[2325]: Failed password for root from 36.92.84.132 port 43850 ssh2 Nov 1 00:44:43.349900 sshd[2325]: Connection closed by authenticating user root 36.92.84.132 port 43850 [preauth] Nov 1 00:44:43.352573 systemd[1]: sshd@39-145.40.82.39:22-36.92.84.132:43850.service: Deactivated successfully. Nov 1 00:44:43.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.82.39:22-36.92.84.132:43850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:43.445535 kernel: audit: type=1131 audit(1761957883.351:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.82.39:22-36.92.84.132:43850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:43.542463 systemd[1]: Started sshd@40-145.40.82.39:22-36.92.84.132:43858.service. Nov 1 00:44:43.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.82.39:22-36.92.84.132:43858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:43.635548 kernel: audit: type=1130 audit(1761957883.541:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.82.39:22-36.92.84.132:43858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:44.513334 sshd[2330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:44.512000 audit[2330]: USER_AUTH pid=2330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:44.605410 kernel: audit: type=1100 audit(1761957884.512:285): pid=2330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:46.879423 sshd[2330]: Failed password for root from 36.92.84.132 port 43858 ssh2 Nov 1 00:44:49.394369 sshd[2330]: Connection closed by authenticating user root 36.92.84.132 port 43858 [preauth] Nov 1 00:44:49.396967 systemd[1]: sshd@40-145.40.82.39:22-36.92.84.132:43858.service: Deactivated successfully. Nov 1 00:44:49.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.82.39:22-36.92.84.132:43858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:49.490550 kernel: audit: type=1131 audit(1761957889.396:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.82.39:22-36.92.84.132:43858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:49.589056 systemd[1]: Started sshd@41-145.40.82.39:22-36.92.84.132:49548.service. Nov 1 00:44:49.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.82.39:22-36.92.84.132:49548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:49.682458 kernel: audit: type=1130 audit(1761957889.587:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.82.39:22-36.92.84.132:49548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:50.588043 sshd[2336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:50.586000 audit[2336]: USER_AUTH pid=2336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:50.680549 kernel: audit: type=1100 audit(1761957890.586:288): pid=2336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:53.109869 sshd[2336]: Failed password for root from 36.92.84.132 port 49548 ssh2 Nov 1 00:44:55.474393 sshd[2336]: Connection closed by authenticating user root 36.92.84.132 port 49548 [preauth] Nov 1 00:44:55.476978 systemd[1]: sshd@41-145.40.82.39:22-36.92.84.132:49548.service: Deactivated successfully. Nov 1 00:44:55.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.82.39:22-36.92.84.132:49548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:55.569354 kernel: audit: type=1131 audit(1761957895.476:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.82.39:22-36.92.84.132:49548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:55.677791 systemd[1]: Started sshd@42-145.40.82.39:22-36.92.84.132:40188.service. Nov 1 00:44:55.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.82.39:22-36.92.84.132:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:55.768355 kernel: audit: type=1130 audit(1761957895.676:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.82.39:22-36.92.84.132:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:56.673811 sshd[2341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:44:56.672000 audit[2341]: USER_AUTH pid=2341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:56.766538 kernel: audit: type=1100 audit(1761957896.672:291): pid=2341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:44:59.019957 sshd[2341]: Failed password for root from 36.92.84.132 port 40188 ssh2 Nov 1 00:44:59.213389 sshd[2341]: Connection closed by authenticating user root 36.92.84.132 port 40188 [preauth] Nov 1 00:44:59.216011 systemd[1]: sshd@42-145.40.82.39:22-36.92.84.132:40188.service: Deactivated successfully. Nov 1 00:44:59.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.82.39:22-36.92.84.132:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:59.309530 kernel: audit: type=1131 audit(1761957899.215:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.82.39:22-36.92.84.132:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:59.396212 systemd[1]: Started sshd@43-145.40.82.39:22-36.92.84.132:40200.service. Nov 1 00:44:59.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.82.39:22-36.92.84.132:40200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:44:59.488406 kernel: audit: type=1130 audit(1761957899.395:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.82.39:22-36.92.84.132:40200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:00.343584 sshd[2345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:00.342000 audit[2345]: USER_AUTH pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:00.436526 kernel: audit: type=1100 audit(1761957900.342:294): pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:02.237826 sshd[2345]: Failed password for root from 36.92.84.132 port 40200 ssh2 Nov 1 00:45:02.873146 sshd[2345]: Connection closed by authenticating user root 36.92.84.132 port 40200 [preauth] Nov 1 00:45:02.875774 systemd[1]: sshd@43-145.40.82.39:22-36.92.84.132:40200.service: Deactivated successfully. Nov 1 00:45:02.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.82.39:22-36.92.84.132:40200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:02.968543 kernel: audit: type=1131 audit(1761957902.875:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.82.39:22-36.92.84.132:40200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:03.079380 systemd[1]: Started sshd@44-145.40.82.39:22-36.92.84.132:40204.service. Nov 1 00:45:03.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.82.39:22-36.92.84.132:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:03.170397 kernel: audit: type=1130 audit(1761957903.078:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.82.39:22-36.92.84.132:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:04.091651 sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:04.090000 audit[2349]: USER_AUTH pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:04.183541 kernel: audit: type=1100 audit(1761957904.090:297): pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:05.870313 sshd[2349]: Failed password for root from 36.92.84.132 port 40204 ssh2 Nov 1 00:45:06.633297 sshd[2349]: Connection closed by authenticating user root 36.92.84.132 port 40204 [preauth] Nov 1 00:45:06.635991 systemd[1]: sshd@44-145.40.82.39:22-36.92.84.132:40204.service: Deactivated successfully. Nov 1 00:45:06.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.82.39:22-36.92.84.132:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:06.728552 kernel: audit: type=1131 audit(1761957906.635:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.82.39:22-36.92.84.132:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:06.822867 systemd[1]: Started sshd@45-145.40.82.39:22-36.92.84.132:34000.service. Nov 1 00:45:06.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.82.39:22-36.92.84.132:34000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:06.915353 kernel: audit: type=1130 audit(1761957906.821:299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.82.39:22-36.92.84.132:34000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:07.800140 sshd[2355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:07.799000 audit[2355]: USER_AUTH pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:07.892535 kernel: audit: type=1100 audit(1761957907.799:300): pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:09.990601 sshd[2355]: Failed password for root from 36.92.84.132 port 34000 ssh2 Nov 1 00:45:10.336016 sshd[2355]: Connection closed by authenticating user root 36.92.84.132 port 34000 [preauth] Nov 1 00:45:10.338506 systemd[1]: sshd@45-145.40.82.39:22-36.92.84.132:34000.service: Deactivated successfully. Nov 1 00:45:10.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.82.39:22-36.92.84.132:34000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:10.431543 kernel: audit: type=1131 audit(1761957910.337:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.82.39:22-36.92.84.132:34000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:10.540421 systemd[1]: Started sshd@46-145.40.82.39:22-36.92.84.132:34010.service. Nov 1 00:45:10.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.82.39:22-36.92.84.132:34010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:10.633353 kernel: audit: type=1130 audit(1761957910.539:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.82.39:22-36.92.84.132:34010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:11.538895 sshd[2359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:11.537000 audit[2359]: USER_AUTH pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:11.631433 kernel: audit: type=1100 audit(1761957911.537:303): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:13.608768 sshd[2359]: Failed password for root from 36.92.84.132 port 34010 ssh2 Nov 1 00:45:14.078509 sshd[2359]: Connection closed by authenticating user root 36.92.84.132 port 34010 [preauth] Nov 1 00:45:14.081031 systemd[1]: sshd@46-145.40.82.39:22-36.92.84.132:34010.service: Deactivated successfully. Nov 1 00:45:14.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.82.39:22-36.92.84.132:34010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:14.173524 kernel: audit: type=1131 audit(1761957914.080:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.82.39:22-36.92.84.132:34010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:14.272069 systemd[1]: Started sshd@47-145.40.82.39:22-36.92.84.132:34016.service. Nov 1 00:45:14.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.82.39:22-36.92.84.132:34016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:14.364353 kernel: audit: type=1130 audit(1761957914.271:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.82.39:22-36.92.84.132:34016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:15.249194 sshd[2363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:15.248000 audit[2363]: USER_AUTH pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:15.341384 kernel: audit: type=1100 audit(1761957915.248:306): pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:17.871227 sshd[2363]: Failed password for root from 36.92.84.132 port 34016 ssh2 Nov 1 00:45:20.131591 sshd[2363]: Connection closed by authenticating user root 36.92.84.132 port 34016 [preauth] Nov 1 00:45:20.134159 systemd[1]: sshd@47-145.40.82.39:22-36.92.84.132:34016.service: Deactivated successfully. Nov 1 00:45:20.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.82.39:22-36.92.84.132:34016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:20.227488 kernel: audit: type=1131 audit(1761957920.133:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.82.39:22-36.92.84.132:34016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:20.338287 systemd[1]: Started sshd@48-145.40.82.39:22-36.92.84.132:36068.service. Nov 1 00:45:20.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.82.39:22-36.92.84.132:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:20.431552 kernel: audit: type=1130 audit(1761957920.337:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.82.39:22-36.92.84.132:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:21.349229 sshd[2367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:21.348000 audit[2367]: USER_AUTH pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:21.441544 kernel: audit: type=1100 audit(1761957921.348:309): pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:24.127054 sshd[2367]: Failed password for root from 36.92.84.132 port 36068 ssh2 Nov 1 00:45:26.237829 sshd[2367]: Connection closed by authenticating user root 36.92.84.132 port 36068 [preauth] Nov 1 00:45:26.240447 systemd[1]: sshd@48-145.40.82.39:22-36.92.84.132:36068.service: Deactivated successfully. Nov 1 00:45:26.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.82.39:22-36.92.84.132:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:26.333530 kernel: audit: type=1131 audit(1761957926.239:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.82.39:22-36.92.84.132:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:26.427131 systemd[1]: Started sshd@49-145.40.82.39:22-36.92.84.132:39648.service. Nov 1 00:45:26.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.82.39:22-36.92.84.132:39648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:26.519420 kernel: audit: type=1130 audit(1761957926.426:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.82.39:22-36.92.84.132:39648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:27.389793 sshd[2371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:27.388000 audit[2371]: USER_AUTH pid=2371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:27.482537 kernel: audit: type=1100 audit(1761957927.388:312): pid=2371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:29.991765 sshd[2371]: Failed password for root from 36.92.84.132 port 39648 ssh2 Nov 1 00:45:32.269104 sshd[2371]: Connection closed by authenticating user root 36.92.84.132 port 39648 [preauth] Nov 1 00:45:32.271713 systemd[1]: sshd@49-145.40.82.39:22-36.92.84.132:39648.service: Deactivated successfully. Nov 1 00:45:32.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.82.39:22-36.92.84.132:39648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:32.364426 kernel: audit: type=1131 audit(1761957932.270:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.82.39:22-36.92.84.132:39648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:32.471847 systemd[1]: Started sshd@50-145.40.82.39:22-36.92.84.132:39652.service. Nov 1 00:45:32.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.82.39:22-36.92.84.132:39652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:32.563412 kernel: audit: type=1130 audit(1761957932.470:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.82.39:22-36.92.84.132:39652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:33.468805 sshd[2375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:33.467000 audit[2375]: USER_AUTH pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:33.560382 kernel: audit: type=1100 audit(1761957933.467:315): pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:35.895107 sshd[2375]: Failed password for root from 36.92.84.132 port 39652 ssh2 Nov 1 00:45:38.354775 sshd[2375]: Connection closed by authenticating user root 36.92.84.132 port 39652 [preauth] Nov 1 00:45:38.357364 systemd[1]: sshd@50-145.40.82.39:22-36.92.84.132:39652.service: Deactivated successfully. Nov 1 00:45:38.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.82.39:22-36.92.84.132:39652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:38.450551 kernel: audit: type=1131 audit(1761957938.356:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.82.39:22-36.92.84.132:39652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:38.542929 systemd[1]: Started sshd@51-145.40.82.39:22-36.92.84.132:44478.service. Nov 1 00:45:38.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.82.39:22-36.92.84.132:44478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:38.635402 kernel: audit: type=1130 audit(1761957938.541:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.82.39:22-36.92.84.132:44478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:39.496421 sshd[2379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:39.495000 audit[2379]: USER_AUTH pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:39.588534 kernel: audit: type=1100 audit(1761957939.495:318): pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:42.414099 sshd[2379]: Failed password for root from 36.92.84.132 port 44478 ssh2 Nov 1 00:45:44.372424 sshd[2379]: Connection closed by authenticating user root 36.92.84.132 port 44478 [preauth] Nov 1 00:45:44.375051 systemd[1]: sshd@51-145.40.82.39:22-36.92.84.132:44478.service: Deactivated successfully. Nov 1 00:45:44.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.82.39:22-36.92.84.132:44478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:44.467414 kernel: audit: type=1131 audit(1761957944.374:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.82.39:22-36.92.84.132:44478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:44.560008 systemd[1]: Started sshd@52-145.40.82.39:22-36.92.84.132:44490.service. Nov 1 00:45:44.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.82.39:22-36.92.84.132:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:44.652354 kernel: audit: type=1130 audit(1761957944.558:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.82.39:22-36.92.84.132:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:45.508863 sshd[2383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:45.507000 audit[2383]: USER_AUTH pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:45.600415 kernel: audit: type=1100 audit(1761957945.507:321): pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:47.915112 sshd[2383]: Failed password for root from 36.92.84.132 port 44490 ssh2 Nov 1 00:45:50.385901 sshd[2383]: Connection closed by authenticating user root 36.92.84.132 port 44490 [preauth] Nov 1 00:45:50.388589 systemd[1]: sshd@52-145.40.82.39:22-36.92.84.132:44490.service: Deactivated successfully. Nov 1 00:45:50.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.82.39:22-36.92.84.132:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:50.481550 kernel: audit: type=1131 audit(1761957950.387:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.82.39:22-36.92.84.132:44490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:50.589957 systemd[1]: Started sshd@53-145.40.82.39:22-36.92.84.132:45836.service. Nov 1 00:45:50.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.82.39:22-36.92.84.132:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:50.681544 kernel: audit: type=1130 audit(1761957950.588:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.82.39:22-36.92.84.132:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:51.576839 sshd[2387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:51.575000 audit[2387]: USER_AUTH pid=2387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:51.668534 kernel: audit: type=1100 audit(1761957951.575:324): pid=2387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:54.474737 sshd[2387]: Failed password for root from 36.92.84.132 port 45836 ssh2 Nov 1 00:45:56.460967 sshd[2387]: Connection closed by authenticating user root 36.92.84.132 port 45836 [preauth] Nov 1 00:45:56.463589 systemd[1]: sshd@53-145.40.82.39:22-36.92.84.132:45836.service: Deactivated successfully. Nov 1 00:45:56.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.82.39:22-36.92.84.132:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:56.555412 kernel: audit: type=1131 audit(1761957956.462:325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.82.39:22-36.92.84.132:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:56.642800 systemd[1]: Started sshd@54-145.40.82.39:22-36.92.84.132:53024.service. Nov 1 00:45:56.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.82.39:22-36.92.84.132:53024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:56.735555 kernel: audit: type=1130 audit(1761957956.641:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.82.39:22-36.92.84.132:53024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:45:57.593303 sshd[2391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:45:57.592000 audit[2391]: USER_AUTH pid=2391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:57.685524 kernel: audit: type=1100 audit(1761957957.592:327): pid=2391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:45:59.647980 sshd[2391]: Failed password for root from 36.92.84.132 port 53024 ssh2 Nov 1 00:46:00.123164 sshd[2391]: Connection closed by authenticating user root 36.92.84.132 port 53024 [preauth] Nov 1 00:46:00.125759 systemd[1]: sshd@54-145.40.82.39:22-36.92.84.132:53024.service: Deactivated successfully. Nov 1 00:46:00.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.82.39:22-36.92.84.132:53024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:00.218523 kernel: audit: type=1131 audit(1761957960.124:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.82.39:22-36.92.84.132:53024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:00.314988 systemd[1]: Started sshd@55-145.40.82.39:22-36.92.84.132:53036.service. Nov 1 00:46:00.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.82.39:22-36.92.84.132:53036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:00.407410 kernel: audit: type=1130 audit(1761957960.314:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.82.39:22-36.92.84.132:53036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:01.264283 sshd[2395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:01.263000 audit[2395]: USER_AUTH pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:01.356374 kernel: audit: type=1100 audit(1761957961.263:330): pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:02.867405 sshd[2395]: Failed password for root from 36.92.84.132 port 53036 ssh2 Nov 1 00:46:03.793862 sshd[2395]: Connection closed by authenticating user root 36.92.84.132 port 53036 [preauth] Nov 1 00:46:03.796500 systemd[1]: sshd@55-145.40.82.39:22-36.92.84.132:53036.service: Deactivated successfully. Nov 1 00:46:03.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.82.39:22-36.92.84.132:53036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:03.888412 kernel: audit: type=1131 audit(1761957963.795:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.82.39:22-36.92.84.132:53036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:03.990183 systemd[1]: Started sshd@56-145.40.82.39:22-36.92.84.132:53048.service. Nov 1 00:46:03.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.82.39:22-36.92.84.132:53048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:04.081353 kernel: audit: type=1130 audit(1761957963.989:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.82.39:22-36.92.84.132:53048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:04.966393 sshd[2399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:04.965000 audit[2399]: USER_AUTH pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:05.057398 kernel: audit: type=1100 audit(1761957964.965:333): pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:06.981285 sshd[2399]: Failed password for root from 36.92.84.132 port 53048 ssh2 Nov 1 00:46:07.501396 sshd[2399]: Connection closed by authenticating user root 36.92.84.132 port 53048 [preauth] Nov 1 00:46:07.504054 systemd[1]: sshd@56-145.40.82.39:22-36.92.84.132:53048.service: Deactivated successfully. Nov 1 00:46:07.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.82.39:22-36.92.84.132:53048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:07.596552 kernel: audit: type=1131 audit(1761957967.503:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.82.39:22-36.92.84.132:53048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:07.700634 systemd[1]: Started sshd@57-145.40.82.39:22-36.92.84.132:37656.service. Nov 1 00:46:07.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.82.39:22-36.92.84.132:37656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:07.793546 kernel: audit: type=1130 audit(1761957967.699:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.82.39:22-36.92.84.132:37656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:08.673967 sshd[2403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:08.672000 audit[2403]: USER_AUTH pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:08.765518 kernel: audit: type=1100 audit(1761957968.672:336): pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:10.573151 sshd[2403]: Failed password for root from 36.92.84.132 port 37656 ssh2 Nov 1 00:46:11.208687 sshd[2403]: Connection closed by authenticating user root 36.92.84.132 port 37656 [preauth] Nov 1 00:46:11.211238 systemd[1]: sshd@57-145.40.82.39:22-36.92.84.132:37656.service: Deactivated successfully. Nov 1 00:46:11.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.82.39:22-36.92.84.132:37656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:11.303528 kernel: audit: type=1131 audit(1761957971.210:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.82.39:22-36.92.84.132:37656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:11.401839 systemd[1]: Started sshd@58-145.40.82.39:22-36.92.84.132:37668.service. Nov 1 00:46:11.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.82.39:22-36.92.84.132:37668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:11.494354 kernel: audit: type=1130 audit(1761957971.400:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.82.39:22-36.92.84.132:37668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:12.398488 sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:12.397000 audit[2408]: USER_AUTH pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:12.490387 kernel: audit: type=1100 audit(1761957972.397:339): pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:14.177593 sshd[2408]: Failed password for root from 36.92.84.132 port 37668 ssh2 Nov 1 00:46:14.937506 sshd[2408]: Connection closed by authenticating user root 36.92.84.132 port 37668 [preauth] Nov 1 00:46:14.940102 systemd[1]: sshd@58-145.40.82.39:22-36.92.84.132:37668.service: Deactivated successfully. Nov 1 00:46:14.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.82.39:22-36.92.84.132:37668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:15.032354 kernel: audit: type=1131 audit(1761957974.939:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.82.39:22-36.92.84.132:37668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:15.132437 systemd[1]: Started sshd@59-145.40.82.39:22-36.92.84.132:33056.service. Nov 1 00:46:15.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.82.39:22-36.92.84.132:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:15.224352 kernel: audit: type=1130 audit(1761957975.131:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.82.39:22-36.92.84.132:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:16.094622 sshd[2412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:16.093000 audit[2412]: USER_AUTH pid=2412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:16.186413 kernel: audit: type=1100 audit(1761957976.093:342): pid=2412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:18.089461 sshd[2412]: Failed password for root from 36.92.84.132 port 33056 ssh2 Nov 1 00:46:18.627081 sshd[2412]: Connection closed by authenticating user root 36.92.84.132 port 33056 [preauth] Nov 1 00:46:18.629724 systemd[1]: sshd@59-145.40.82.39:22-36.92.84.132:33056.service: Deactivated successfully. Nov 1 00:46:18.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.82.39:22-36.92.84.132:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:18.722550 kernel: audit: type=1131 audit(1761957978.628:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.82.39:22-36.92.84.132:33056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:18.836767 systemd[1]: Started sshd@60-145.40.82.39:22-36.92.84.132:33064.service. Nov 1 00:46:18.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.82.39:22-36.92.84.132:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:18.929546 kernel: audit: type=1130 audit(1761957978.835:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.82.39:22-36.92.84.132:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:19.857724 sshd[2416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:19.856000 audit[2416]: USER_AUTH pid=2416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:19.949510 kernel: audit: type=1100 audit(1761957979.856:345): pid=2416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:21.932417 sshd[2416]: Failed password for root from 36.92.84.132 port 33064 ssh2 Nov 1 00:46:22.402097 sshd[2416]: Connection closed by authenticating user root 36.92.84.132 port 33064 [preauth] Nov 1 00:46:22.404744 systemd[1]: sshd@60-145.40.82.39:22-36.92.84.132:33064.service: Deactivated successfully. Nov 1 00:46:22.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.82.39:22-36.92.84.132:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:22.497545 kernel: audit: type=1131 audit(1761957982.403:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.82.39:22-36.92.84.132:33064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:22.589972 systemd[1]: Started sshd@61-145.40.82.39:22-36.92.84.132:33068.service. Nov 1 00:46:22.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.82.39:22-36.92.84.132:33068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:22.682526 kernel: audit: type=1130 audit(1761957982.589:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.82.39:22-36.92.84.132:33068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:23.540917 sshd[2420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:23.539000 audit[2420]: USER_AUTH pid=2420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:23.633532 kernel: audit: type=1100 audit(1761957983.539:348): pid=2420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:25.164270 sshd[2420]: Failed password for root from 36.92.84.132 port 33068 ssh2 Nov 1 00:46:26.071188 sshd[2420]: Connection closed by authenticating user root 36.92.84.132 port 33068 [preauth] Nov 1 00:46:26.073803 systemd[1]: sshd@61-145.40.82.39:22-36.92.84.132:33068.service: Deactivated successfully. Nov 1 00:46:26.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.82.39:22-36.92.84.132:33068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:26.165520 kernel: audit: type=1131 audit(1761957986.072:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.82.39:22-36.92.84.132:33068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:26.278312 systemd[1]: Started sshd@62-145.40.82.39:22-36.92.84.132:57546.service. Nov 1 00:46:26.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.82.39:22-36.92.84.132:57546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:26.370544 kernel: audit: type=1130 audit(1761957986.277:350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.82.39:22-36.92.84.132:57546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:27.301872 sshd[2424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:27.300000 audit[2424]: USER_AUTH pid=2424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:27.392353 kernel: audit: type=1100 audit(1761957987.300:351): pid=2424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:29.808223 sshd[2424]: Failed password for root from 36.92.84.132 port 57546 ssh2 Nov 1 00:46:32.191423 sshd[2424]: Connection closed by authenticating user root 36.92.84.132 port 57546 [preauth] Nov 1 00:46:32.194073 systemd[1]: sshd@62-145.40.82.39:22-36.92.84.132:57546.service: Deactivated successfully. Nov 1 00:46:32.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.82.39:22-36.92.84.132:57546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:32.287527 kernel: audit: type=1131 audit(1761957992.193:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.82.39:22-36.92.84.132:57546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:32.382155 systemd[1]: Started sshd@63-145.40.82.39:22-36.92.84.132:57556.service. Nov 1 00:46:32.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.82.39:22-36.92.84.132:57556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:32.473524 kernel: audit: type=1130 audit(1761957992.381:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.82.39:22-36.92.84.132:57556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:33.348523 sshd[2428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:33.347000 audit[2428]: USER_AUTH pid=2428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:33.440510 kernel: audit: type=1100 audit(1761957993.347:354): pid=2428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:35.679298 sshd[2428]: Failed password for root from 36.92.84.132 port 57556 ssh2 Nov 1 00:46:35.880985 sshd[2428]: Connection closed by authenticating user root 36.92.84.132 port 57556 [preauth] Nov 1 00:46:35.883583 systemd[1]: sshd@63-145.40.82.39:22-36.92.84.132:57556.service: Deactivated successfully. Nov 1 00:46:35.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.82.39:22-36.92.84.132:57556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:35.976547 kernel: audit: type=1131 audit(1761957995.882:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.82.39:22-36.92.84.132:57556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:36.068645 systemd[1]: Started sshd@64-145.40.82.39:22-36.92.84.132:58628.service. Nov 1 00:46:36.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.82.39:22-36.92.84.132:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:36.160353 kernel: audit: type=1130 audit(1761957996.067:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.82.39:22-36.92.84.132:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:37.028525 sshd[2432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:37.027000 audit[2432]: USER_AUTH pid=2432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:37.120410 kernel: audit: type=1100 audit(1761957997.027:357): pid=2432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:39.239275 sshd[2432]: Failed password for root from 36.92.84.132 port 58628 ssh2 Nov 1 00:46:39.560643 sshd[2432]: Connection closed by authenticating user root 36.92.84.132 port 58628 [preauth] Nov 1 00:46:39.563084 systemd[1]: sshd@64-145.40.82.39:22-36.92.84.132:58628.service: Deactivated successfully. Nov 1 00:46:39.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.82.39:22-36.92.84.132:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:39.655428 kernel: audit: type=1131 audit(1761957999.562:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.82.39:22-36.92.84.132:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:39.763789 systemd[1]: Started sshd@65-145.40.82.39:22-36.92.84.132:58634.service. Nov 1 00:46:39.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.82.39:22-36.92.84.132:58634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:39.856421 kernel: audit: type=1130 audit(1761957999.762:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.82.39:22-36.92.84.132:58634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:40.753270 sshd[2436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:40.752000 audit[2436]: USER_AUTH pid=2436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:40.845394 kernel: audit: type=1100 audit(1761958000.752:360): pid=2436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:42.708239 sshd[2436]: Failed password for root from 36.92.84.132 port 58634 ssh2 Nov 1 00:46:43.290949 sshd[2436]: Connection closed by authenticating user root 36.92.84.132 port 58634 [preauth] Nov 1 00:46:43.293538 systemd[1]: sshd@65-145.40.82.39:22-36.92.84.132:58634.service: Deactivated successfully. Nov 1 00:46:43.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.82.39:22-36.92.84.132:58634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:43.386569 kernel: audit: type=1131 audit(1761958003.292:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.82.39:22-36.92.84.132:58634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:43.472732 systemd[1]: Started sshd@66-145.40.82.39:22-36.92.84.132:58642.service. Nov 1 00:46:43.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.82.39:22-36.92.84.132:58642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:43.564372 kernel: audit: type=1130 audit(1761958003.471:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.82.39:22-36.92.84.132:58642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:44.422026 sshd[2440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:44.420000 audit[2440]: USER_AUTH pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:44.512541 kernel: audit: type=1100 audit(1761958004.420:363): pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:46.260629 sshd[2440]: Failed password for root from 36.92.84.132 port 58642 ssh2 Nov 1 00:46:46.951278 sshd[2440]: Connection closed by authenticating user root 36.92.84.132 port 58642 [preauth] Nov 1 00:46:46.953892 systemd[1]: sshd@66-145.40.82.39:22-36.92.84.132:58642.service: Deactivated successfully. Nov 1 00:46:46.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.82.39:22-36.92.84.132:58642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:47.046383 kernel: audit: type=1131 audit(1761958006.953:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.82.39:22-36.92.84.132:58642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:47.147443 systemd[1]: Started sshd@67-145.40.82.39:22-36.92.84.132:53696.service. Nov 1 00:46:47.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.82.39:22-36.92.84.132:53696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:47.240417 kernel: audit: type=1130 audit(1761958007.146:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.82.39:22-36.92.84.132:53696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:48.141626 sshd[2444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:48.140000 audit[2444]: USER_AUTH pid=2444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:48.233526 kernel: audit: type=1100 audit(1761958008.140:366): pid=2444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:49.529333 sshd[2444]: Failed password for root from 36.92.84.132 port 53696 ssh2 Nov 1 00:46:50.680024 sshd[2444]: Connection closed by authenticating user root 36.92.84.132 port 53696 [preauth] Nov 1 00:46:50.682657 systemd[1]: sshd@67-145.40.82.39:22-36.92.84.132:53696.service: Deactivated successfully. Nov 1 00:46:50.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.82.39:22-36.92.84.132:53696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:50.775568 kernel: audit: type=1131 audit(1761958010.681:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.82.39:22-36.92.84.132:53696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:50.883048 systemd[1]: Started sshd@68-145.40.82.39:22-36.92.84.132:53704.service. Nov 1 00:46:50.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.82.39:22-36.92.84.132:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:50.975353 kernel: audit: type=1130 audit(1761958010.882:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.82.39:22-36.92.84.132:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:51.875590 sshd[2449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:51.874000 audit[2449]: USER_AUTH pid=2449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:51.967353 kernel: audit: type=1100 audit(1761958011.874:369): pid=2449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:54.341346 sshd[2449]: Failed password for root from 36.92.84.132 port 53704 ssh2 Nov 1 00:46:56.760826 sshd[2449]: Connection closed by authenticating user root 36.92.84.132 port 53704 [preauth] Nov 1 00:46:56.763441 systemd[1]: sshd@68-145.40.82.39:22-36.92.84.132:53704.service: Deactivated successfully. Nov 1 00:46:56.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.82.39:22-36.92.84.132:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:56.856426 kernel: audit: type=1131 audit(1761958016.762:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.82.39:22-36.92.84.132:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:56.958546 systemd[1]: Started sshd@69-145.40.82.39:22-36.92.84.132:45140.service. Nov 1 00:46:56.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.82.39:22-36.92.84.132:45140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:57.051402 kernel: audit: type=1130 audit(1761958016.957:371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.82.39:22-36.92.84.132:45140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:46:57.945427 sshd[2454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:46:57.944000 audit[2454]: USER_AUTH pid=2454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:46:58.037519 kernel: audit: type=1100 audit(1761958017.944:372): pid=2454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:00.236299 sshd[2454]: Failed password for root from 36.92.84.132 port 45140 ssh2 Nov 1 00:47:00.482492 sshd[2454]: Connection closed by authenticating user root 36.92.84.132 port 45140 [preauth] Nov 1 00:47:00.485226 systemd[1]: sshd@69-145.40.82.39:22-36.92.84.132:45140.service: Deactivated successfully. Nov 1 00:47:00.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.82.39:22-36.92.84.132:45140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:00.578550 kernel: audit: type=1131 audit(1761958020.484:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.82.39:22-36.92.84.132:45140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:00.678777 systemd[1]: Started sshd@70-145.40.82.39:22-36.92.84.132:45150.service. Nov 1 00:47:00.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.82.39:22-36.92.84.132:45150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:00.771552 kernel: audit: type=1130 audit(1761958020.677:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.82.39:22-36.92.84.132:45150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:01.641598 sshd[2458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:01.640000 audit[2458]: USER_AUTH pid=2458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:01.733429 kernel: audit: type=1100 audit(1761958021.640:375): pid=2458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:04.148259 sshd[2458]: Failed password for root from 36.92.84.132 port 45150 ssh2 Nov 1 00:47:06.520493 sshd[2458]: Connection closed by authenticating user root 36.92.84.132 port 45150 [preauth] Nov 1 00:47:06.522985 systemd[1]: sshd@70-145.40.82.39:22-36.92.84.132:45150.service: Deactivated successfully. Nov 1 00:47:06.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.82.39:22-36.92.84.132:45150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:06.616549 kernel: audit: type=1131 audit(1761958026.522:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.82.39:22-36.92.84.132:45150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:06.726761 systemd[1]: Started sshd@71-145.40.82.39:22-36.92.84.132:41112.service. Nov 1 00:47:06.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.82.39:22-36.92.84.132:41112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:06.819547 kernel: audit: type=1130 audit(1761958026.725:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.82.39:22-36.92.84.132:41112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:07.751792 sshd[2465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:07.750000 audit[2465]: USER_AUTH pid=2465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:07.843533 kernel: audit: type=1100 audit(1761958027.750:378): pid=2465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:09.415148 sshd[2465]: Failed password for root from 36.92.84.132 port 41112 ssh2 Nov 1 00:47:10.296054 sshd[2465]: Connection closed by authenticating user root 36.92.84.132 port 41112 [preauth] Nov 1 00:47:10.298589 systemd[1]: sshd@71-145.40.82.39:22-36.92.84.132:41112.service: Deactivated successfully. Nov 1 00:47:10.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.82.39:22-36.92.84.132:41112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:10.391542 kernel: audit: type=1131 audit(1761958030.297:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.82.39:22-36.92.84.132:41112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:10.490404 systemd[1]: Started sshd@72-145.40.82.39:22-36.92.84.132:41128.service. Nov 1 00:47:10.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.82.39:22-36.92.84.132:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:10.583554 kernel: audit: type=1130 audit(1761958030.489:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.82.39:22-36.92.84.132:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:11.475512 sshd[2469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:11.474000 audit[2469]: USER_AUTH pid=2469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:11.567534 kernel: audit: type=1100 audit(1761958031.474:381): pid=2469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:12.687411 sshd[2469]: Failed password for root from 36.92.84.132 port 41128 ssh2 Nov 1 00:47:14.013023 sshd[2469]: Connection closed by authenticating user root 36.92.84.132 port 41128 [preauth] Nov 1 00:47:14.015686 systemd[1]: sshd@72-145.40.82.39:22-36.92.84.132:41128.service: Deactivated successfully. Nov 1 00:47:14.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.82.39:22-36.92.84.132:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:14.108409 kernel: audit: type=1131 audit(1761958034.014:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.82.39:22-36.92.84.132:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:14.207509 systemd[1]: Started sshd@73-145.40.82.39:22-36.92.84.132:41140.service. Nov 1 00:47:14.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.82.39:22-36.92.84.132:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:14.299408 kernel: audit: type=1130 audit(1761958034.206:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.82.39:22-36.92.84.132:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:15.210788 sshd[2473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:15.209000 audit[2473]: USER_AUTH pid=2473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:15.301354 kernel: audit: type=1100 audit(1761958035.209:384): pid=2473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:17.305937 sshd[2473]: Failed password for root from 36.92.84.132 port 41140 ssh2 Nov 1 00:47:17.751040 sshd[2473]: Connection closed by authenticating user root 36.92.84.132 port 41140 [preauth] Nov 1 00:47:17.753694 systemd[1]: sshd@73-145.40.82.39:22-36.92.84.132:41140.service: Deactivated successfully. Nov 1 00:47:17.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.82.39:22-36.92.84.132:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:17.846353 kernel: audit: type=1131 audit(1761958037.752:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.82.39:22-36.92.84.132:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:17.940401 systemd[1]: Started sshd@74-145.40.82.39:22-36.92.84.132:60134.service. Nov 1 00:47:17.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.82.39:22-36.92.84.132:60134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:18.032401 kernel: audit: type=1130 audit(1761958037.939:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.82.39:22-36.92.84.132:60134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:18.902946 sshd[2477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:18.901000 audit[2477]: USER_AUTH pid=2477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:18.994354 kernel: audit: type=1100 audit(1761958038.901:387): pid=2477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:20.742196 sshd[2477]: Failed password for root from 36.92.84.132 port 60134 ssh2 Nov 1 00:47:20.901479 update_engine[1438]: I1101 00:47:20.901325 1438 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Nov 1 00:47:20.901479 update_engine[1438]: I1101 00:47:20.901436 1438 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Nov 1 00:47:20.902824 update_engine[1438]: I1101 00:47:20.902748 1438 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Nov 1 00:47:20.903876 update_engine[1438]: I1101 00:47:20.903801 1438 omaha_request_params.cc:62] Current group set to lts Nov 1 00:47:20.904142 update_engine[1438]: I1101 00:47:20.904099 1438 update_attempter.cc:499] Already updated boot flags. Skipping. Nov 1 00:47:20.904142 update_engine[1438]: I1101 00:47:20.904120 1438 update_attempter.cc:643] Scheduling an action processor start. Nov 1 00:47:20.904392 update_engine[1438]: I1101 00:47:20.904153 1438 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Nov 1 00:47:20.904392 update_engine[1438]: I1101 00:47:20.904218 1438 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Nov 1 00:47:20.904392 update_engine[1438]: I1101 00:47:20.904381 1438 omaha_request_action.cc:270] Posting an Omaha request to disabled Nov 1 00:47:20.904710 update_engine[1438]: I1101 00:47:20.904402 1438 omaha_request_action.cc:271] Request: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: Nov 1 00:47:20.904710 update_engine[1438]: I1101 00:47:20.904417 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Nov 1 00:47:20.905594 locksmithd[1475]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Nov 1 00:47:20.907900 update_engine[1438]: I1101 00:47:20.907824 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Nov 1 00:47:20.908121 update_engine[1438]: E1101 00:47:20.908088 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Nov 1 00:47:20.908280 update_engine[1438]: I1101 00:47:20.908252 1438 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Nov 1 00:47:21.434422 sshd[2477]: Connection closed by authenticating user root 36.92.84.132 port 60134 [preauth] Nov 1 00:47:21.437055 systemd[1]: sshd@74-145.40.82.39:22-36.92.84.132:60134.service: Deactivated successfully. Nov 1 00:47:21.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.82.39:22-36.92.84.132:60134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:21.529538 kernel: audit: type=1131 audit(1761958041.436:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.82.39:22-36.92.84.132:60134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:21.627846 systemd[1]: Started sshd@75-145.40.82.39:22-36.92.84.132:60136.service. Nov 1 00:47:21.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.82.39:22-36.92.84.132:60136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:21.719548 kernel: audit: type=1130 audit(1761958041.626:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.82.39:22-36.92.84.132:60136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:22.590272 sshd[2482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:22.589000 audit[2482]: USER_AUTH pid=2482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:22.682535 kernel: audit: type=1100 audit(1761958042.589:390): pid=2482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:23.978126 sshd[2482]: Failed password for root from 36.92.84.132 port 60136 ssh2 Nov 1 00:47:25.122508 sshd[2482]: Connection closed by authenticating user root 36.92.84.132 port 60136 [preauth] Nov 1 00:47:25.125108 systemd[1]: sshd@75-145.40.82.39:22-36.92.84.132:60136.service: Deactivated successfully. Nov 1 00:47:25.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.82.39:22-36.92.84.132:60136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:25.217356 kernel: audit: type=1131 audit(1761958045.124:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.82.39:22-36.92.84.132:60136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:25.321556 systemd[1]: Started sshd@76-145.40.82.39:22-36.92.84.132:56674.service. Nov 1 00:47:25.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.82.39:22-36.92.84.132:56674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:25.414354 kernel: audit: type=1130 audit(1761958045.320:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.82.39:22-36.92.84.132:56674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:26.292527 sshd[2486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:26.291000 audit[2486]: USER_AUTH pid=2486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:26.384537 kernel: audit: type=1100 audit(1761958046.291:393): pid=2486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:28.231994 sshd[2486]: Failed password for root from 36.92.84.132 port 56674 ssh2 Nov 1 00:47:28.826609 sshd[2486]: Connection closed by authenticating user root 36.92.84.132 port 56674 [preauth] Nov 1 00:47:28.829248 systemd[1]: sshd@76-145.40.82.39:22-36.92.84.132:56674.service: Deactivated successfully. Nov 1 00:47:28.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.82.39:22-36.92.84.132:56674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:28.921515 kernel: audit: type=1131 audit(1761958048.828:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.82.39:22-36.92.84.132:56674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:29.025320 systemd[1]: Started sshd@77-145.40.82.39:22-36.92.84.132:56686.service. Nov 1 00:47:29.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.82.39:22-36.92.84.132:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:29.117352 kernel: audit: type=1130 audit(1761958049.024:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.82.39:22-36.92.84.132:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:30.014635 sshd[2490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:30.013000 audit[2490]: USER_AUTH pid=2490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:30.106527 kernel: audit: type=1100 audit(1761958050.013:396): pid=2490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:30.811613 update_engine[1438]: I1101 00:47:30.811498 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Nov 1 00:47:30.812476 update_engine[1438]: I1101 00:47:30.811978 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Nov 1 00:47:30.812476 update_engine[1438]: E1101 00:47:30.812182 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Nov 1 00:47:30.812476 update_engine[1438]: I1101 00:47:30.812392 1438 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Nov 1 00:47:31.501834 sshd[2490]: Failed password for root from 36.92.84.132 port 56686 ssh2 Nov 1 00:47:32.552339 sshd[2490]: Connection closed by authenticating user root 36.92.84.132 port 56686 [preauth] Nov 1 00:47:32.554956 systemd[1]: sshd@77-145.40.82.39:22-36.92.84.132:56686.service: Deactivated successfully. Nov 1 00:47:32.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.82.39:22-36.92.84.132:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:32.647541 kernel: audit: type=1131 audit(1761958052.554:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.82.39:22-36.92.84.132:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:32.733687 systemd[1]: Started sshd@78-145.40.82.39:22-36.92.84.132:56694.service. Nov 1 00:47:32.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.82.39:22-36.92.84.132:56694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:32.825354 kernel: audit: type=1130 audit(1761958052.732:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.82.39:22-36.92.84.132:56694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:33.682885 sshd[2494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:33.681000 audit[2494]: USER_AUTH pid=2494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:33.773353 kernel: audit: type=1100 audit(1761958053.681:399): pid=2494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:35.582107 sshd[2494]: Failed password for root from 36.92.84.132 port 56694 ssh2 Nov 1 00:47:36.212627 sshd[2494]: Connection closed by authenticating user root 36.92.84.132 port 56694 [preauth] Nov 1 00:47:36.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.82.39:22-36.92.84.132:56694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:36.215230 systemd[1]: sshd@78-145.40.82.39:22-36.92.84.132:56694.service: Deactivated successfully. Nov 1 00:47:36.307535 kernel: audit: type=1131 audit(1761958056.214:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.82.39:22-36.92.84.132:56694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:36.410844 systemd[1]: Started sshd@79-145.40.82.39:22-36.92.84.132:57486.service. Nov 1 00:47:36.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.82.39:22-36.92.84.132:57486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:36.503354 kernel: audit: type=1130 audit(1761958056.409:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.82.39:22-36.92.84.132:57486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:37.381533 sshd[2499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:37.380000 audit[2499]: USER_AUTH pid=2499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:37.473409 kernel: audit: type=1100 audit(1761958057.380:402): pid=2499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:39.496736 sshd[2499]: Failed password for root from 36.92.84.132 port 57486 ssh2 Nov 1 00:47:39.916242 sshd[2499]: Connection closed by authenticating user root 36.92.84.132 port 57486 [preauth] Nov 1 00:47:39.918843 systemd[1]: sshd@79-145.40.82.39:22-36.92.84.132:57486.service: Deactivated successfully. Nov 1 00:47:39.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.82.39:22-36.92.84.132:57486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:40.011354 kernel: audit: type=1131 audit(1761958059.918:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.82.39:22-36.92.84.132:57486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:40.123829 systemd[1]: Started sshd@80-145.40.82.39:22-36.92.84.132:57502.service. Nov 1 00:47:40.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.82.39:22-36.92.84.132:57502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:40.216547 kernel: audit: type=1130 audit(1761958060.122:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.82.39:22-36.92.84.132:57502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:40.810640 update_engine[1438]: I1101 00:47:40.810523 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Nov 1 00:47:40.811488 update_engine[1438]: I1101 00:47:40.811008 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Nov 1 00:47:40.811488 update_engine[1438]: E1101 00:47:40.811218 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Nov 1 00:47:40.811488 update_engine[1438]: I1101 00:47:40.811424 1438 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Nov 1 00:47:41.143026 sshd[2503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:41.141000 audit[2503]: USER_AUTH pid=2503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:41.235532 kernel: audit: type=1100 audit(1761958061.141:405): pid=2503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:42.806768 sshd[2503]: Failed password for root from 36.92.84.132 port 57502 ssh2 Nov 1 00:47:43.687038 sshd[2503]: Connection closed by authenticating user root 36.92.84.132 port 57502 [preauth] Nov 1 00:47:43.689698 systemd[1]: sshd@80-145.40.82.39:22-36.92.84.132:57502.service: Deactivated successfully. Nov 1 00:47:43.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.82.39:22-36.92.84.132:57502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:43.781367 kernel: audit: type=1131 audit(1761958063.688:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.82.39:22-36.92.84.132:57502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:43.880964 systemd[1]: Started sshd@81-145.40.82.39:22-36.92.84.132:57506.service. Nov 1 00:47:43.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.82.39:22-36.92.84.132:57506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:43.973537 kernel: audit: type=1130 audit(1761958063.879:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.82.39:22-36.92.84.132:57506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:44.853257 sshd[2507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:44.852000 audit[2507]: USER_AUTH pid=2507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:44.945536 kernel: audit: type=1100 audit(1761958064.852:408): pid=2507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:46.928572 sshd[2507]: Failed password for root from 36.92.84.132 port 57506 ssh2 Nov 1 00:47:47.386916 sshd[2507]: Connection closed by authenticating user root 36.92.84.132 port 57506 [preauth] Nov 1 00:47:47.389550 systemd[1]: sshd@81-145.40.82.39:22-36.92.84.132:57506.service: Deactivated successfully. Nov 1 00:47:47.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.82.39:22-36.92.84.132:57506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:47.482354 kernel: audit: type=1131 audit(1761958067.388:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.82.39:22-36.92.84.132:57506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:47.584531 systemd[1]: Started sshd@82-145.40.82.39:22-36.92.84.132:40146.service. Nov 1 00:47:47.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.82.39:22-36.92.84.132:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:47.676352 kernel: audit: type=1130 audit(1761958067.583:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.82.39:22-36.92.84.132:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:48.557658 sshd[2511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:48.556000 audit[2511]: USER_AUTH pid=2511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:48.649354 kernel: audit: type=1100 audit(1761958068.556:411): pid=2511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:50.517105 sshd[2511]: Failed password for root from 36.92.84.132 port 40146 ssh2 Nov 1 00:47:50.810793 update_engine[1438]: I1101 00:47:50.810560 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Nov 1 00:47:50.811605 update_engine[1438]: I1101 00:47:50.811040 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Nov 1 00:47:50.811605 update_engine[1438]: E1101 00:47:50.811264 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Nov 1 00:47:50.811605 update_engine[1438]: I1101 00:47:50.811568 1438 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Nov 1 00:47:50.811605 update_engine[1438]: I1101 00:47:50.811595 1438 omaha_request_action.cc:621] Omaha request response: Nov 1 00:47:50.812023 update_engine[1438]: E1101 00:47:50.811741 1438 omaha_request_action.cc:640] Omaha request network transfer failed. Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811772 1438 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811782 1438 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811790 1438 update_attempter.cc:306] Processing Done. Nov 1 00:47:50.812023 update_engine[1438]: E1101 00:47:50.811815 1438 update_attempter.cc:619] Update failed. Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811825 1438 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811833 1438 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811843 1438 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Nov 1 00:47:50.812023 update_engine[1438]: I1101 00:47:50.811995 1438 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812047 1438 omaha_request_action.cc:270] Posting an Omaha request to disabled Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812058 1438 omaha_request_action.cc:271] Request: Nov 1 00:47:50.812895 update_engine[1438]: Nov 1 00:47:50.812895 update_engine[1438]: Nov 1 00:47:50.812895 update_engine[1438]: Nov 1 00:47:50.812895 update_engine[1438]: Nov 1 00:47:50.812895 update_engine[1438]: Nov 1 00:47:50.812895 update_engine[1438]: Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812068 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812398 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Nov 1 00:47:50.812895 update_engine[1438]: E1101 00:47:50.812585 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812724 1438 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812739 1438 omaha_request_action.cc:621] Omaha request response: Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812749 1438 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812757 1438 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812765 1438 update_attempter.cc:306] Processing Done. Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812773 1438 update_attempter.cc:310] Error event sent. Nov 1 00:47:50.812895 update_engine[1438]: I1101 00:47:50.812800 1438 update_check_scheduler.cc:74] Next update check in 46m46s Nov 1 00:47:50.814477 locksmithd[1475]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Nov 1 00:47:50.814477 locksmithd[1475]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Nov 1 00:47:51.091718 sshd[2511]: Connection closed by authenticating user root 36.92.84.132 port 40146 [preauth] Nov 1 00:47:51.094295 systemd[1]: sshd@82-145.40.82.39:22-36.92.84.132:40146.service: Deactivated successfully. Nov 1 00:47:51.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.82.39:22-36.92.84.132:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:51.186533 kernel: audit: type=1131 audit(1761958071.093:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.82.39:22-36.92.84.132:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:51.284713 systemd[1]: Started sshd@83-145.40.82.39:22-36.92.84.132:40154.service. Nov 1 00:47:51.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.82.39:22-36.92.84.132:40154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:51.376371 kernel: audit: type=1130 audit(1761958071.283:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.82.39:22-36.92.84.132:40154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:52.266118 sshd[2515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:52.265000 audit[2515]: USER_AUTH pid=2515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:52.358534 kernel: audit: type=1100 audit(1761958072.265:414): pid=2515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:53.774183 sshd[2515]: Failed password for root from 36.92.84.132 port 40154 ssh2 Nov 1 00:47:54.801651 sshd[2515]: Connection closed by authenticating user root 36.92.84.132 port 40154 [preauth] Nov 1 00:47:54.804418 systemd[1]: sshd@83-145.40.82.39:22-36.92.84.132:40154.service: Deactivated successfully. Nov 1 00:47:54.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.82.39:22-36.92.84.132:40154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:54.897547 kernel: audit: type=1131 audit(1761958074.803:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.82.39:22-36.92.84.132:40154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:55.002035 systemd[1]: Started sshd@84-145.40.82.39:22-36.92.84.132:34120.service. Nov 1 00:47:55.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.82.39:22-36.92.84.132:34120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:55.094408 kernel: audit: type=1130 audit(1761958075.001:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.82.39:22-36.92.84.132:34120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:55.994649 sshd[2519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:55.993000 audit[2519]: USER_AUTH pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:56.086536 kernel: audit: type=1100 audit(1761958075.993:417): pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:57.914204 sshd[2519]: Failed password for root from 36.92.84.132 port 34120 ssh2 Nov 1 00:47:58.532540 sshd[2519]: Connection closed by authenticating user root 36.92.84.132 port 34120 [preauth] Nov 1 00:47:58.535275 systemd[1]: sshd@84-145.40.82.39:22-36.92.84.132:34120.service: Deactivated successfully. Nov 1 00:47:58.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.82.39:22-36.92.84.132:34120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:58.628552 kernel: audit: type=1131 audit(1761958078.534:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.82.39:22-36.92.84.132:34120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:58.737265 systemd[1]: Started sshd@85-145.40.82.39:22-36.92.84.132:34126.service. Nov 1 00:47:58.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.82.39:22-36.92.84.132:34126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:58.830555 kernel: audit: type=1130 audit(1761958078.736:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.82.39:22-36.92.84.132:34126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:47:59.739992 sshd[2523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:47:59.738000 audit[2523]: USER_AUTH pid=2523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:47:59.832536 kernel: audit: type=1100 audit(1761958079.738:420): pid=2523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:48:01.543850 sshd[2523]: Failed password for root from 36.92.84.132 port 34126 ssh2 Nov 1 00:48:02.279863 sshd[2523]: Connection closed by authenticating user root 36.92.84.132 port 34126 [preauth] Nov 1 00:48:02.282467 systemd[1]: sshd@85-145.40.82.39:22-36.92.84.132:34126.service: Deactivated successfully. Nov 1 00:48:02.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.82.39:22-36.92.84.132:34126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:48:02.375547 kernel: audit: type=1131 audit(1761958082.281:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.82.39:22-36.92.84.132:34126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:48:02.471698 systemd[1]: Started sshd@86-145.40.82.39:22-36.92.84.132:34132.service. Nov 1 00:48:02.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.82.39:22-36.92.84.132:34132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:48:02.563544 kernel: audit: type=1130 audit(1761958082.470:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.82.39:22-36.92.84.132:34132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:48:03.431829 sshd[2527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.84.132 user=root Nov 1 00:48:03.430000 audit[2527]: USER_AUTH pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:48:03.523353 kernel: audit: type=1100 audit(1761958083.430:423): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=36.92.84.132 addr=36.92.84.132 terminal=ssh res=failed' Nov 1 00:48:05.782961 sshd[2527]: Failed password for root from 36.92.84.132 port 34132 ssh2 Nov 1 00:48:08.310676 sshd[2527]: Connection closed by authenticating user root 36.92.84.132 port 34132 [preauth] Nov 1 00:48:08.313294 systemd[1]: sshd@86-145.40.82.39:22-36.92.84.132:34132.service: Deactivated successfully. Nov 1 00:48:08.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.82.39:22-36.92.84.132:34132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:48:08.406428 kernel: audit: type=1131 audit(1761958088.312:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.82.39:22-36.92.84.132:34132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'