-- Logs begin at Mon 2019-11-25 09:12:11 UTC, end at Mon 2019-11-25 09:56:35 UTC. -- Nov 25 09:12:11 debian pmproxy[10690]: Waiting for pmproxy to terminate ... Nov 25 09:12:11 debian kernel: nfsd: last server has exited, flushing export cache Nov 25 09:12:11 debian rpc.mountd[1033]: Caught signal 15, un-registering and exiting. Nov 25 09:12:11 debian systemd[1]: pmproxy.service: Succeeded. Nov 25 09:12:11 debian dhclient[11285]: Killed old client process Nov 25 09:12:11 debian systemd[1]: Stopped LSB: Control pmproxy (the pmcd proxy daemon for PCP). Nov 25 09:12:11 debian systemd[1]: Stopped target Remote File Systems. Nov 25 09:12:11 debian systemd[1]: Stopped target Remote File Systems (Pre). Nov 25 09:12:11 debian systemd[1]: Stopped target NFS client services. Nov 25 09:12:11 debian ifdown[11276]: Killed old client process Nov 25 09:12:11 debian systemd[1]: Stopping NFS server and services... Nov 25 09:12:11 debian systemd[1]: Stopped target Network is Online. Nov 25 09:12:11 debian systemd[1]: NetworkManager-wait-online.service: Succeeded. Nov 25 09:12:11 debian systemd[1]: Stopped Network Manager Wait Online. Nov 25 09:12:11 debian systemd[1]: Stopped target System Time Synchronized. Nov 25 09:12:11 debian systemd[1]: nfs-server.service: Succeeded. Nov 25 09:12:11 debian systemd[1]: Stopped NFS server and services. Nov 25 09:12:11 debian systemd[1]: Stopping NFSv4 ID-name mapping service... Nov 25 09:12:11 debian systemd[1]: Stopping NFS Mount Daemon... Nov 25 09:12:11 debian systemd[1]: nfs-idmapd.service: Main process exited, code=killed, status=15/TERM Nov 25 09:12:11 debian systemd[1]: nfs-idmapd.service: Succeeded. Nov 25 09:12:11 debian systemd[1]: Stopped NFSv4 ID-name mapping service. Nov 25 09:12:11 debian systemd[1]: nfs-mountd.service: Succeeded. Nov 25 09:12:11 debian systemd[1]: Stopped NFS Mount Daemon. Nov 25 09:12:11 debian systemd[1]: Stopped target Network. Nov 25 09:12:11 debian systemd[1]: Stopping WPA supplicant... Nov 25 09:12:11 debian systemd[1]: Stopping Network Manager... Nov 25 09:12:11 debian NetworkManager[700]: [1574673131.5813] caught SIGTERM, shutting down normally. Nov 25 09:12:11 debian NetworkManager[700]: [1574673131.5857] device (virbr0-nic): released from master device virbr0 Nov 25 09:12:11 debian systemd[1]: Stopping Raise network interfaces... Nov 25 09:12:11 debian systemd[1]: Unmounting RPC Pipe File System... Nov 25 09:12:11 debian systemd[1]: wpa_supplicant.service: Succeeded. Nov 25 09:12:11 debian systemd[1]: Stopped WPA supplicant. Nov 25 09:12:11 debian systemd[1]: run-rpc_pipefs.mount: Succeeded. Nov 25 09:12:11 debian systemd[1]: Unmounted RPC Pipe File System. Nov 25 09:12:11 debian NetworkManager[700]: [1574673131.7872] exiting (success) Nov 25 09:12:11 debian systemd[1]: NetworkManager.service: Succeeded. Nov 25 09:12:11 debian systemd[1]: Stopped Network Manager. Nov 25 09:12:12 debian dhclient[11285]: Internet Systems Consortium DHCP Client 4.4.1 Nov 25 09:12:12 debian ifdown[11276]: Internet Systems Consortium DHCP Client 4.4.1 Nov 25 09:12:12 debian ifdown[11276]: Copyright 2004-2018 Internet Systems Consortium. Nov 25 09:12:12 debian ifdown[11276]: All rights reserved. Nov 25 09:12:12 debian ifdown[11276]: For info, please visit https://www.isc.org/software/dhcp/ Nov 25 09:12:12 debian dhclient[11285]: Copyright 2004-2018 Internet Systems Consortium. Nov 25 09:12:12 debian dhclient[11285]: All rights reserved. Nov 25 09:12:12 debian dhclient[11285]: For info, please visit https://www.isc.org/software/dhcp/ Nov 25 09:12:12 debian dhclient[11285]: Nov 25 09:12:12 debian dhclient[11285]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 25 09:12:12 debian ifdown[11276]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 25 09:12:12 debian ifdown[11276]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 25 09:12:12 debian ifdown[11276]: Sending on Socket/fallback Nov 25 09:12:12 debian dhclient[11285]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 25 09:12:12 debian dhclient[11285]: Sending on Socket/fallback Nov 25 09:12:12 debian dhclient[11285]: DHCPRELEASE of 172.27.0.15 on eth0 to 172.27.0.2 port 67 Nov 25 09:12:12 debian ifdown[11276]: DHCPRELEASE of 172.27.0.15 on eth0 to 172.27.0.2 port 67 Nov 25 09:12:12 debian systemd[1]: networking.service: Succeeded. Nov 25 09:12:12 debian systemd[1]: Stopped Raise network interfaces. Nov 25 09:12:12 debian systemd[1]: Stopped target Network (Pre). Nov 25 09:12:12 debian systemd[1]: Stopping firewalld - dynamic firewall daemon... Nov 25 09:12:12 debian firewalld[409]: ERROR: '/usr/sbin/iptables-restore -w -n' failed: iptables-restore v1.8.2 (nf_tables): line 4: RULE_REPLACE failed (No such file or directory): rule in chain INPUT line 4: RULE_REPLACE failed (No such file or directory): rule in chain OUTPUT Nov 25 09:12:12 debian firewalld[409]: ERROR: '/usr/sbin/ip6tables-restore -w -n' failed: ip6tables-restore v1.8.2 (nf_tables): line 4: RULE_REPLACE failed (No such file or directory): rule in chain INPUT line 4: RULE_REPLACE failed (No such file or directory): rule in chain OUTPUT Nov 25 09:12:13 debian firewalld[409]: ERROR: COMMAND_FAILED: '/usr/sbin/ip6tables-restore -w -n' failed: ip6tables-restore v1.8.2 (nf_tables): line 4: RULE_REPLACE failed (No such file or directory): rule in chain INPUT line 4: RULE_REPLACE failed (No such file or directory): rule in chain OUTPUT Nov 25 09:12:13 debian systemd[1]: firewalld.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped firewalld - dynamic firewall daemon. Nov 25 09:12:13 debian systemd[1]: Stopping Authorization Manager... Nov 25 09:12:13 debian systemd[1]: Stopping D-Bus System Message Bus... Nov 25 09:12:13 debian systemd[1]: dbus.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped D-Bus System Message Bus. Nov 25 09:12:13 debian systemd[1]: polkit.service: Main process exited, code=killed, status=15/TERM Nov 25 09:12:13 debian systemd[1]: polkit.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Authorization Manager. Nov 25 09:12:13 debian systemd[1]: Stopped target Basic System. Nov 25 09:12:13 debian systemd[1]: Stopped target Slices. Nov 25 09:12:13 debian systemd[1]: Removed slice User and Session Slice. Nov 25 09:12:13 debian systemd[1]: Stopped target Paths. Nov 25 09:12:13 debian systemd[1]: Stopped target Sockets. Nov 25 09:12:13 debian systemd[1]: Stopping Cockpit Web Service Socket. Nov 25 09:12:13 debian systemd[1]: virtlogd.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Virtual machine log manager socket. Nov 25 09:12:13 debian systemd[1]: virtlogd-admin.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Virtual machine log manager socket. Nov 25 09:12:13 debian systemd[1]: sssd-secrets.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed SSSD Secrets Service responder socket. Nov 25 09:12:13 debian systemd[1]: uuidd.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed UUID daemon activation socket. Nov 25 09:12:13 debian systemd[1]: syslog.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Syslog Socket. Nov 25 09:12:13 debian systemd[1]: dbus.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed D-Bus System Message Bus Socket. Nov 25 09:12:13 debian systemd[1]: virtlockd.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Virtual machine lock manager socket. Nov 25 09:12:13 debian systemd[1]: docker.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Docker Socket for the API. Nov 25 09:12:13 debian systemd[1]: virtlockd-admin.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Virtual machine lock manager admin socket. Nov 25 09:12:13 debian systemd[1]: cockpit.socket: Succeeded. Nov 25 09:12:13 debian systemd[1]: Closed Cockpit Web Service Socket. Nov 25 09:12:13 debian systemd[1]: Stopped target System Initialization. Nov 25 09:12:13 debian systemd[1]: Stopped target Local Encrypted Volumes. Nov 25 09:12:13 debian systemd[1]: systemd-ask-password-console.path: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Nov 25 09:12:13 debian systemd[1]: systemd-ask-password-wall.path: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Forward Password Requests to Wall Directory Watch. Nov 25 09:12:13 debian systemd[1]: Stopping Update UTMP about System Boot/Shutdown... Nov 25 09:12:13 debian systemd[1]: systemd-sysctl.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Apply Kernel Variables. Nov 25 09:12:13 debian systemd[1]: systemd-modules-load.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Load Kernel Modules. Nov 25 09:12:13 debian systemd[1]: Stopping Load/Save Random Seed... Nov 25 09:12:13 debian systemd[1]: Stopped target Swap. Nov 25 09:12:13 debian systemd[1]: systemd-update-utmp.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Update UTMP about System Boot/Shutdown. Nov 25 09:12:13 debian systemd[1]: systemd-tmpfiles-setup.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Create Volatile Files and Directories. Nov 25 09:12:13 debian systemd[1]: Stopped target Local File Systems. Nov 25 09:12:13 debian systemd[1]: Unmounting /boot/efi... Nov 25 09:12:13 debian systemd[1]: systemd-random-seed.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Load/Save Random Seed. Nov 25 09:12:13 debian systemd[1]: boot-efi.mount: Succeeded. Nov 25 09:12:13 debian systemd[1]: Unmounted /boot/efi. Nov 25 09:12:13 debian systemd[1]: Reached target Unmount All Filesystems. Nov 25 09:12:13 debian systemd[1]: Stopped target Local File Systems (Pre). Nov 25 09:12:13 debian systemd[1]: Stopping Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Nov 25 09:12:13 debian systemd[1]: systemd-tmpfiles-setup-dev.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Create Static Device Nodes in /dev. Nov 25 09:12:13 debian systemd[1]: systemd-sysusers.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Create System Users. Nov 25 09:12:13 debian systemd[1]: systemd-remount-fs.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Stopped Remount Root and Kernel File Systems. Nov 25 09:12:13 debian systemd[1]: Reached target Shutdown. Nov 25 09:12:13 debian systemd[1]: Reached target Final Step. Nov 25 09:12:13 debian systemd[1]: systemd-poweroff.service: Succeeded. Nov 25 09:12:13 debian systemd[1]: Started Power-Off. Nov 25 09:12:13 debian systemd[1]: Reached target Power-Off. Nov 25 09:12:13 debian systemd[1]: Shutting down. Nov 25 09:12:13 debian kernel: systemd-shutdow: 53 output lines suppressed due to ratelimiting Nov 25 09:12:13 debian systemd-shutdown[1]: Syncing filesystems and block devices. Nov 25 09:12:13 debian systemd-shutdown[1]: Sending SIGTERM to remaining processes... Nov 25 09:12:13 debian dnsmasq[3648]: exiting on receipt of SIGTERM Nov 25 09:12:13 debian systemd-journald[287]: Journal stopped -- Reboot -- Nov 25 09:50:56 debian kernel: Linux version 4.19.0-6-cloud-amd64 (debian-kernel@lists.debian.org) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.67-2+deb10u2 (2019-11-11) Nov 25 09:50:56 debian kernel: Command line: BOOT_IMAGE=/boot/vmlinuz-4.19.0-6-cloud-amd64 root=UUID=38ca74d0-013a-4237-b0f0-a54c22da0d9a ro console=tty0 console=ttyS0,115200 earlyprintk=ttyS0,115200 net.ifnames=0 biosdevname=0 elevator=noop scsi_mod.use_blk_mq=Y Nov 25 09:50:56 debian kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 25 09:50:56 debian kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 25 09:50:56 debian kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 25 09:50:56 debian kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 25 09:50:56 debian kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Nov 25 09:50:56 debian kernel: BIOS-provided physical RAM map: Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ffdbfff] usable Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x000000003ffdc000-0x000000003fffffff] reserved Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Nov 25 09:50:56 debian kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Nov 25 09:50:56 debian kernel: bootconsole [earlyser0] enabled Nov 25 09:50:56 debian kernel: NX (Execute Disable) protection: active Nov 25 09:50:56 debian kernel: SMBIOS 2.8 present. Nov 25 09:50:56 debian kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-2.fc30 04/01/2014 Nov 25 09:50:56 debian kernel: Hypervisor detected: KVM Nov 25 09:50:56 debian kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 25 09:50:56 debian kernel: kvm-clock: cpu 0, msr 11b3a001, primary cpu clock Nov 25 09:50:56 debian kernel: kvm-clock: using sched offset of 5183455372 cycles Nov 25 09:50:56 debian kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 25 09:50:56 debian kernel: tsc: Detected 2394.454 MHz processor Nov 25 09:50:56 debian kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 25 09:50:56 debian kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 25 09:50:56 debian kernel: last_pfn = 0x3ffdc max_arch_pfn = 0x400000000 Nov 25 09:50:56 debian kernel: MTRR default type: write-back Nov 25 09:50:56 debian kernel: MTRR fixed ranges enabled: Nov 25 09:50:56 debian kernel: 00000-9FFFF write-back Nov 25 09:50:56 debian kernel: A0000-BFFFF uncachable Nov 25 09:50:56 debian kernel: C0000-FFFFF write-protect Nov 25 09:50:56 debian kernel: MTRR variable ranges enabled: Nov 25 09:50:56 debian kernel: 0 base 0080000000 mask FF80000000 uncachable Nov 25 09:50:56 debian kernel: 1 disabled Nov 25 09:50:56 debian kernel: 2 disabled Nov 25 09:50:56 debian kernel: 3 disabled Nov 25 09:50:56 debian kernel: 4 disabled Nov 25 09:50:56 debian kernel: 5 disabled Nov 25 09:50:56 debian kernel: 6 disabled Nov 25 09:50:56 debian kernel: 7 disabled Nov 25 09:50:56 debian kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 25 09:50:56 debian kernel: Using GB pages for direct mapping Nov 25 09:50:56 debian kernel: BRK [0x11c01000, 0x11c01fff] PGTABLE Nov 25 09:50:56 debian kernel: BRK [0x11c02000, 0x11c02fff] PGTABLE Nov 25 09:50:56 debian kernel: BRK [0x11c03000, 0x11c03fff] PGTABLE Nov 25 09:50:56 debian kernel: BRK [0x11c04000, 0x11c04fff] PGTABLE Nov 25 09:50:56 debian kernel: BRK [0x11c05000, 0x11c05fff] PGTABLE Nov 25 09:50:56 debian kernel: RAMDISK: [mem 0x35d85000-0x36eb9fff] Nov 25 09:50:56 debian kernel: ACPI: Early table checksum verification disabled Nov 25 09:50:56 debian kernel: ACPI: RSDP 0x00000000000F5A60 000014 (v00 BOCHS ) Nov 25 09:50:56 debian kernel: ACPI: RSDT 0x000000003FFE1548 000030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) Nov 25 09:50:56 debian kernel: ACPI: FACP 0x000000003FFE1424 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) Nov 25 09:50:56 debian kernel: ACPI: DSDT 0x000000003FFE0040 0013E4 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) Nov 25 09:50:56 debian kernel: ACPI: FACS 0x000000003FFE0000 000040 Nov 25 09:50:56 debian kernel: ACPI: APIC 0x000000003FFE1498 000078 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) Nov 25 09:50:56 debian kernel: ACPI: HPET 0x000000003FFE1510 000038 (v01 BOCHS BXPCHPET 00000001 BXPC 00000001) Nov 25 09:50:56 debian kernel: ACPI: Local APIC address 0xfee00000 Nov 25 09:50:56 debian kernel: No NUMA configuration found Nov 25 09:50:56 debian kernel: Faking a node at [mem 0x0000000000000000-0x000000003ffdbfff] Nov 25 09:50:56 debian kernel: NODE_DATA(0) allocated [mem 0x3ffd7000-0x3ffdbfff] Nov 25 09:50:56 debian kernel: Zone ranges: Nov 25 09:50:56 debian kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 25 09:50:56 debian kernel: DMA32 [mem 0x0000000001000000-0x000000003ffdbfff] Nov 25 09:50:56 debian kernel: Normal empty Nov 25 09:50:56 debian kernel: Device empty Nov 25 09:50:56 debian kernel: Movable zone start for each node Nov 25 09:50:56 debian kernel: Early memory node ranges Nov 25 09:50:56 debian kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Nov 25 09:50:56 debian kernel: node 0: [mem 0x0000000000100000-0x000000003ffdbfff] Nov 25 09:50:56 debian kernel: Reserved but unavailable: 98 pages Nov 25 09:50:56 debian kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000003ffdbfff] Nov 25 09:50:56 debian kernel: On node 0 totalpages: 262010 Nov 25 09:50:56 debian kernel: DMA zone: 64 pages used for memmap Nov 25 09:50:56 debian kernel: DMA zone: 21 pages reserved Nov 25 09:50:56 debian kernel: DMA zone: 3998 pages, LIFO batch:0 Nov 25 09:50:56 debian kernel: DMA32 zone: 4032 pages used for memmap Nov 25 09:50:56 debian kernel: DMA32 zone: 258012 pages, LIFO batch:63 Nov 25 09:50:56 debian kernel: ACPI: PM-Timer IO Port: 0x608 Nov 25 09:50:56 debian kernel: ACPI: Local APIC address 0xfee00000 Nov 25 09:50:56 debian kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 25 09:50:56 debian kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 25 09:50:56 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 25 09:50:56 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 25 09:50:56 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 25 09:50:56 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 25 09:50:56 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 25 09:50:56 debian kernel: ACPI: IRQ0 used by override. Nov 25 09:50:56 debian kernel: ACPI: IRQ5 used by override. Nov 25 09:50:56 debian kernel: ACPI: IRQ9 used by override. Nov 25 09:50:56 debian kernel: ACPI: IRQ10 used by override. Nov 25 09:50:56 debian kernel: ACPI: IRQ11 used by override. Nov 25 09:50:56 debian kernel: Using ACPI (MADT) for SMP configuration information Nov 25 09:50:56 debian kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Nov 25 09:50:56 debian kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs Nov 25 09:50:56 debian kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff] Nov 25 09:50:56 debian kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Nov 25 09:50:56 debian kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] Nov 25 09:50:56 debian kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] Nov 25 09:50:56 debian kernel: [mem 0x40000000-0xfeffbfff] available for PCI devices Nov 25 09:50:56 debian kernel: Booting paravirtualized kernel on KVM Nov 25 09:50:56 debian kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Nov 25 09:50:56 debian kernel: random: get_random_bytes called from start_kernel+0x93/0x522 with crng_init=0 Nov 25 09:50:56 debian kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:1 nr_node_ids:1 Nov 25 09:50:56 debian kernel: percpu: Embedded 44 pages/cpu s141720 r8192 d30312 u2097152 Nov 25 09:50:56 debian kernel: pcpu-alloc: s141720 r8192 d30312 u2097152 alloc=1*2097152 Nov 25 09:50:56 debian kernel: pcpu-alloc: [0] 0 Nov 25 09:50:56 debian kernel: KVM setup async PF for cpu 0 Nov 25 09:50:56 debian kernel: kvm-stealtime: cpu 0, msr 3ea15f00 Nov 25 09:50:56 debian kernel: Built 1 zonelists, mobility grouping on. Total pages: 257893 Nov 25 09:50:56 debian kernel: Policy zone: DMA32 Nov 25 09:50:56 debian kernel: Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.19.0-6-cloud-amd64 root=UUID=38ca74d0-013a-4237-b0f0-a54c22da0d9a ro console=tty0 console=ttyS0,115200 earlyprintk=ttyS0,115200 net.ifnames=0 biosdevname=0 elevator=noop scsi_mod.use_blk_mq=Y Nov 25 09:50:56 debian kernel: Memory: 990940K/1048040K available (10252K kernel code, 1096K rwdata, 2732K rodata, 1468K init, 884K bss, 57100K reserved, 0K cma-reserved) Nov 25 09:50:56 debian kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 Nov 25 09:50:56 debian kernel: Kernel/User page tables isolation: enabled Nov 25 09:50:56 debian kernel: ftrace: allocating 27193 entries in 107 pages Nov 25 09:50:56 debian kernel: rcu: Hierarchical RCU implementation. Nov 25 09:50:56 debian kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=1. Nov 25 09:50:56 debian kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1 Nov 25 09:50:56 debian kernel: NR_IRQS: 33024, nr_irqs: 256, preallocated irqs: 16 Nov 25 09:50:56 debian kernel: Console: colour VGA+ 80x25 Nov 25 09:50:56 debian kernel: console [tty0] enabled Nov 25 09:50:56 debian kernel: console [ttyS0] enabled Nov 25 09:50:56 debian kernel: bootconsole [earlyser0] disabled Nov 25 09:50:56 debian kernel: ACPI: Core revision 20180810 Nov 25 09:50:56 debian kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Nov 25 09:50:56 debian kernel: hpet clockevent registered Nov 25 09:50:56 debian kernel: APIC: Switch to symmetric I/O mode setup Nov 25 09:50:56 debian kernel: x2apic enabled Nov 25 09:50:56 debian kernel: Switched APIC routing to physical x2apic. Nov 25 09:50:56 debian kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Nov 25 09:50:56 debian kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2283c0783fd, max_idle_ns: 440795301468 ns Nov 25 09:50:56 debian kernel: Calibrating delay loop (skipped) preset value.. 4788.90 BogoMIPS (lpj=9577816) Nov 25 09:50:56 debian kernel: pid_max: default: 32768 minimum: 301 Nov 25 09:50:56 debian kernel: Security Framework initialized Nov 25 09:50:56 debian kernel: Yama: disabled by default; enable with sysctl kernel.yama.* Nov 25 09:50:56 debian kernel: AppArmor: AppArmor initialized Nov 25 09:50:56 debian kernel: Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes) Nov 25 09:50:56 debian kernel: Inode-cache hash table entries: 65536 (order: 7, 524288 bytes) Nov 25 09:50:56 debian kernel: Mount-cache hash table entries: 2048 (order: 2, 16384 bytes) Nov 25 09:50:56 debian kernel: Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes) Nov 25 09:50:56 debian kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Nov 25 09:50:56 debian kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Nov 25 09:50:56 debian kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 25 09:50:56 debian kernel: Spectre V2 : Mitigation: Full generic retpoline Nov 25 09:50:56 debian kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Nov 25 09:50:56 debian kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Nov 25 09:50:56 debian kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 25 09:50:56 debian kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 25 09:50:56 debian kernel: MDS: Mitigation: Clear CPU buffers Nov 25 09:50:56 debian kernel: Freeing SMP alternatives memory: 20K Nov 25 09:50:56 debian kernel: TSC deadline timer enabled Nov 25 09:50:56 debian kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz (family: 0x6, model: 0x3f, stepping: 0x2) Nov 25 09:50:56 debian kernel: Performance Events: Haswell events, Intel PMU driver. Nov 25 09:50:56 debian kernel: ... version: 2 Nov 25 09:50:56 debian kernel: ... bit width: 48 Nov 25 09:50:56 debian kernel: ... generic registers: 4 Nov 25 09:50:56 debian kernel: ... value mask: 0000ffffffffffff Nov 25 09:50:56 debian kernel: ... max period: 000000007fffffff Nov 25 09:50:56 debian kernel: ... fixed-purpose events: 3 Nov 25 09:50:56 debian kernel: ... event mask: 000000070000000f Nov 25 09:50:56 debian kernel: rcu: Hierarchical SRCU implementation. Nov 25 09:50:56 debian kernel: random: crng done (trusting CPU's manufacturer) Nov 25 09:50:56 debian kernel: smp: Bringing up secondary CPUs ... Nov 25 09:50:56 debian kernel: smp: Brought up 1 node, 1 CPU Nov 25 09:50:56 debian kernel: smpboot: Max logical packages: 1 Nov 25 09:50:56 debian kernel: smpboot: Total of 1 processors activated (4788.90 BogoMIPS) Nov 25 09:50:56 debian kernel: devtmpfs: initialized Nov 25 09:50:56 debian kernel: x86/mm: Memory block size: 128MB Nov 25 09:50:56 debian kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Nov 25 09:50:56 debian kernel: futex hash table entries: 256 (order: 2, 16384 bytes) Nov 25 09:50:56 debian kernel: NET: Registered protocol family 16 Nov 25 09:50:56 debian kernel: audit: initializing netlink subsys (disabled) Nov 25 09:50:56 debian kernel: ACPI: bus type PCI registered Nov 25 09:50:56 debian kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 25 09:50:56 debian kernel: PCI: Using configuration type 1 for base access Nov 25 09:50:56 debian kernel: audit: type=2000 audit(1574675451.813:1): state=initialized audit_enabled=0 res=1 Nov 25 09:50:56 debian kernel: core: PMU erratum BJ122, BV98, HSD29 workaround disabled, HT off Nov 25 09:50:56 debian kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 25 09:50:56 debian kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 25 09:50:56 debian kernel: ACPI: Added _OSI(Module Device) Nov 25 09:50:56 debian kernel: ACPI: Added _OSI(Processor Device) Nov 25 09:50:56 debian kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Nov 25 09:50:56 debian kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 25 09:50:56 debian kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 25 09:50:56 debian kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 25 09:50:56 debian kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 25 09:50:56 debian kernel: ACPI: Interpreter enabled Nov 25 09:50:56 debian kernel: ACPI: (supports S0 S4 S5) Nov 25 09:50:56 debian kernel: ACPI: Using IOAPIC for interrupt routing Nov 25 09:50:56 debian kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 25 09:50:56 debian kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Nov 25 09:50:56 debian kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 25 09:50:56 debian kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] Nov 25 09:50:56 debian kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM Nov 25 09:50:56 debian kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Nov 25 09:50:56 debian kernel: acpiphp: Slot [2] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [3] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [4] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [5] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [6] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [7] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [8] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [9] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [10] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [11] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [12] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [13] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [14] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [15] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [16] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [17] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [18] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [19] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [20] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [21] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [22] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [23] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [24] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [25] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [26] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [27] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [28] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [29] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [30] registered Nov 25 09:50:56 debian kernel: acpiphp: Slot [31] registered Nov 25 09:50:56 debian kernel: PCI host bridge to bus 0000:00 Nov 25 09:50:56 debian kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: root bus resource [mem 0x40000000-0xfebfffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 25 09:50:56 debian kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Nov 25 09:50:56 debian kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Nov 25 09:50:56 debian kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Nov 25 09:50:56 debian kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Nov 25 09:50:56 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Nov 25 09:50:56 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Nov 25 09:50:56 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Nov 25 09:50:56 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Nov 25 09:50:56 debian kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Nov 25 09:50:56 debian kernel: pci 0000:00:01.2: reg 0x20: [io 0xc080-0xc09f] Nov 25 09:50:56 debian kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Nov 25 09:50:56 debian kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Nov 25 09:50:56 debian kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Nov 25 09:50:56 debian kernel: pci 0000:00:02.0: [1af4:1004] type 00 class 0x010000 Nov 25 09:50:56 debian kernel: pci 0000:00:02.0: reg 0x10: [io 0xc000-0xc03f] Nov 25 09:50:56 debian kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebc0000-0xfebc0fff] Nov 25 09:50:56 debian kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebe8000-0xfebebfff 64bit pref] Nov 25 09:50:56 debian kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Nov 25 09:50:56 debian kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Nov 25 09:50:56 debian kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebc1000-0xfebc1fff] Nov 25 09:50:56 debian kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfebec000-0xfebeffff 64bit pref] Nov 25 09:50:56 debian kernel: pci 0000:00:04.0: [1af4:1002] type 00 class 0x00ff00 Nov 25 09:50:56 debian kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0a0-0xc0bf] Nov 25 09:50:56 debian kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfebf0000-0xfebf3fff 64bit pref] Nov 25 09:50:56 debian kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Nov 25 09:50:56 debian kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0df] Nov 25 09:50:56 debian kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfebf4000-0xfebf7fff 64bit pref] Nov 25 09:50:56 debian kernel: pci 0000:00:0e.0: [1af4:1000] type 00 class 0x020000 Nov 25 09:50:56 debian kernel: pci 0000:00:0e.0: reg 0x10: [io 0xc0e0-0xc0ff] Nov 25 09:50:56 debian kernel: pci 0000:00:0e.0: reg 0x14: [mem 0xfebc2000-0xfebc2fff] Nov 25 09:50:56 debian kernel: pci 0000:00:0e.0: reg 0x20: [mem 0xfebf8000-0xfebfbfff 64bit pref] Nov 25 09:50:56 debian kernel: pci 0000:00:0e.0: reg 0x30: [mem 0xfeb40000-0xfeb7ffff pref] Nov 25 09:50:56 debian kernel: pci 0000:00:0f.0: [1af4:1000] type 00 class 0x020000 Nov 25 09:50:56 debian kernel: pci 0000:00:0f.0: reg 0x10: [io 0xc100-0xc11f] Nov 25 09:50:56 debian kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xfebc3000-0xfebc3fff] Nov 25 09:50:56 debian kernel: pci 0000:00:0f.0: reg 0x20: [mem 0xfebfc000-0xfebfffff 64bit pref] Nov 25 09:50:56 debian kernel: pci 0000:00:0f.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Nov 25 09:50:56 debian kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Nov 25 09:50:56 debian kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Nov 25 09:50:56 debian kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Nov 25 09:50:56 debian kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Nov 25 09:50:56 debian kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) Nov 25 09:50:56 debian kernel: vgaarb: loaded Nov 25 09:50:56 debian kernel: PCI: Using ACPI for IRQ routing Nov 25 09:50:56 debian kernel: PCI: pci_cache_line_size set to 64 bytes Nov 25 09:50:56 debian kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Nov 25 09:50:56 debian kernel: e820: reserve RAM buffer [mem 0x3ffdc000-0x3fffffff] Nov 25 09:50:56 debian kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Nov 25 09:50:56 debian kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Nov 25 09:50:56 debian kernel: clocksource: Switched to clocksource kvm-clock Nov 25 09:50:56 debian kernel: VFS: Disk quotas dquot_6.6.0 Nov 25 09:50:56 debian kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 25 09:50:56 debian kernel: AppArmor: AppArmor Filesystem Enabled Nov 25 09:50:56 debian kernel: pnp: PnP ACPI init Nov 25 09:50:56 debian kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0b00 (active) Nov 25 09:50:56 debian kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0303 (active) Nov 25 09:50:56 debian kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0f13 (active) Nov 25 09:50:56 debian kernel: pnp 00:03: [dma 2] Nov 25 09:50:56 debian kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0700 (active) Nov 25 09:50:56 debian kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0501 (active) Nov 25 09:50:56 debian kernel: pnp: PnP ACPI: found 5 devices Nov 25 09:50:56 debian kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 25 09:50:56 debian kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: resource 7 [mem 0x40000000-0xfebfffff window] Nov 25 09:50:56 debian kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Nov 25 09:50:56 debian kernel: NET: Registered protocol family 2 Nov 25 09:50:56 debian kernel: tcp_listen_portaddr_hash hash table entries: 512 (order: 1, 8192 bytes) Nov 25 09:50:56 debian kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes) Nov 25 09:50:56 debian kernel: TCP bind hash table entries: 8192 (order: 5, 131072 bytes) Nov 25 09:50:56 debian kernel: TCP: Hash tables configured (established 8192 bind 8192) Nov 25 09:50:56 debian kernel: UDP hash table entries: 512 (order: 2, 16384 bytes) Nov 25 09:50:56 debian kernel: UDP-Lite hash table entries: 512 (order: 2, 16384 bytes) Nov 25 09:50:56 debian kernel: NET: Registered protocol family 1 Nov 25 09:50:56 debian kernel: NET: Registered protocol family 44 Nov 25 09:50:56 debian kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Nov 25 09:50:56 debian kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 25 09:50:56 debian kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Nov 25 09:50:56 debian kernel: PCI: CLS 0 bytes, default 64 Nov 25 09:50:56 debian kernel: Unpacking initramfs... Nov 25 09:50:56 debian kernel: Freeing initrd memory: 17620K Nov 25 09:50:56 debian kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2283c0783fd, max_idle_ns: 440795301468 ns Nov 25 09:50:56 debian kernel: Initialise system trusted keyrings Nov 25 09:50:56 debian kernel: Key type blacklist registered Nov 25 09:50:56 debian kernel: workingset: timestamp_bits=40 max_order=18 bucket_order=0 Nov 25 09:50:56 debian kernel: zbud: loaded Nov 25 09:50:56 debian kernel: Key type asymmetric registered Nov 25 09:50:56 debian kernel: Asymmetric key parser 'x509' registered Nov 25 09:50:56 debian kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Nov 25 09:50:56 debian kernel: io scheduler noop registered (default) Nov 25 09:50:56 debian kernel: io scheduler deadline registered Nov 25 09:50:56 debian kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 25 09:50:56 debian kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 25 09:50:56 debian kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 25 09:50:56 debian kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 25 09:50:56 debian kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 25 09:50:56 debian kernel: mousedev: PS/2 mouse device common for all mice Nov 25 09:50:56 debian kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 25 09:50:56 debian kernel: NET: Registered protocol family 10 Nov 25 09:50:56 debian kernel: Segment Routing with IPv6 Nov 25 09:50:56 debian kernel: mip6: Mobile IPv6 Nov 25 09:50:56 debian kernel: NET: Registered protocol family 17 Nov 25 09:50:56 debian kernel: mpls_gso: MPLS GSO support Nov 25 09:50:56 debian kernel: sched_clock: Marking stable (1797414725, 51732936)->(1986785502, -137637841) Nov 25 09:50:56 debian kernel: registered taskstats version 1 Nov 25 09:50:56 debian kernel: Loading compiled-in X.509 certificates Nov 25 09:50:56 debian kernel: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' Nov 25 09:50:56 debian kernel: Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def' Nov 25 09:50:56 debian kernel: AppArmor: AppArmor sha1 policy hashing enabled Nov 25 09:50:56 debian kernel: Freeing unused kernel image memory: 1468K Nov 25 09:50:56 debian kernel: Write protecting the kernel read-only data: 16384k Nov 25 09:50:56 debian kernel: Freeing unused kernel image memory: 2028K Nov 25 09:50:56 debian kernel: Freeing unused kernel image memory: 1364K Nov 25 09:50:56 debian kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Nov 25 09:50:56 debian kernel: x86/mm: Checking user space page tables Nov 25 09:50:56 debian kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Nov 25 09:50:56 debian kernel: Run /init as init process Nov 25 09:50:56 debian kernel: cryptd: max_cpu_qlen set to 1000 Nov 25 09:50:56 debian kernel: SCSI subsystem initialized Nov 25 09:50:56 debian kernel: AVX2 version of gcm_enc/dec engaged. Nov 25 09:50:56 debian kernel: AES CTR mode by8 optimization enabled Nov 25 09:50:56 debian kernel: libata version 3.00 loaded. Nov 25 09:50:56 debian kernel: ata_piix 0000:00:01.1: version 2.13 Nov 25 09:50:56 debian kernel: PCI Interrupt Link [LNKB] enabled at IRQ 10 Nov 25 09:50:56 debian kernel: scsi host0: ata_piix Nov 25 09:50:56 debian kernel: scsi host1: ata_piix Nov 25 09:50:56 debian kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Nov 25 09:50:56 debian kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Nov 25 09:50:56 debian kernel: PCI Interrupt Link [LNKC] enabled at IRQ 11 Nov 25 09:50:56 debian kernel: PCI Interrupt Link [LNKD] enabled at IRQ 11 Nov 25 09:50:56 debian kernel: PCI Interrupt Link [LNKA] enabled at IRQ 10 Nov 25 09:50:56 debian kernel: ata1.01: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Nov 25 09:50:56 debian kernel: scsi 0:0:1:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Nov 25 09:50:56 debian kernel: sr 0:0:1:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Nov 25 09:50:56 debian kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Nov 25 09:50:56 debian kernel: sr 0:0:1:0: Attached scsi CD-ROM sr0 Nov 25 09:50:56 debian kernel: virtio_blk virtio1: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) Nov 25 09:50:56 debian kernel: scsi host2: Virtio SCSI HBA Nov 25 09:50:56 debian kernel: vda: vda1 vda14 vda15 Nov 25 09:50:56 debian kernel: raid6: sse2x1 gen() 4814 MB/s Nov 25 09:50:56 debian kernel: raid6: sse2x1 xor() 3556 MB/s Nov 25 09:50:56 debian kernel: raid6: sse2x2 gen() 6648 MB/s Nov 25 09:50:56 debian kernel: raid6: sse2x2 xor() 3947 MB/s Nov 25 09:50:56 debian kernel: raid6: sse2x4 gen() 7663 MB/s Nov 25 09:50:56 debian kernel: raid6: sse2x4 xor() 4314 MB/s Nov 25 09:50:56 debian kernel: raid6: avx2x1 gen() 11288 MB/s Nov 25 09:50:56 debian kernel: raid6: avx2x1 xor() 5561 MB/s Nov 25 09:50:56 debian kernel: raid6: avx2x2 gen() 12601 MB/s Nov 25 09:50:56 debian kernel: raid6: avx2x2 xor() 7866 MB/s Nov 25 09:50:56 debian kernel: raid6: avx2x4 gen() 14085 MB/s Nov 25 09:50:56 debian kernel: raid6: avx2x4 xor() 7218 MB/s Nov 25 09:50:56 debian kernel: raid6: using algorithm avx2x4 gen() 14085 MB/s Nov 25 09:50:56 debian kernel: raid6: .... xor() 7218 MB/s, rmw enabled Nov 25 09:50:56 debian kernel: raid6: using avx2x2 recovery algorithm Nov 25 09:50:56 debian kernel: xor: automatically using best checksumming function avx Nov 25 09:50:56 debian kernel: EXT4-fs (vda1): mounted filesystem with ordered data mode. Opts: (null) Nov 25 09:50:56 debian systemd[1]: Inserted module 'autofs4' Nov 25 09:50:56 debian systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2 default-hierarchy=hybrid) Nov 25 09:50:56 debian systemd[1]: Detected virtualization kvm. Nov 25 09:50:56 debian systemd[1]: Detected architecture x86-64. Nov 25 09:50:56 debian systemd[1]: Set hostname to . Nov 25 09:50:56 debian systemd[1]: Failed to bump fs.file-max, ignoring: Invalid argument Nov 25 09:50:56 debian systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:50:56 debian systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:50:56 debian systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:50:56 debian systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:50:56 debian systemd[1]: Listening on RPCbind Server Activation Socket. Nov 25 09:50:56 debian kernel: RPC: Registered named UNIX socket transport module. Nov 25 09:50:56 debian kernel: RPC: Registered udp transport module. Nov 25 09:50:56 debian kernel: RPC: Registered tcp transport module. Nov 25 09:50:56 debian kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 25 09:50:56 debian kernel: EXT4-fs (vda1): re-mounted. Opts: discard,errors=remount-ro Nov 25 09:50:56 debian kernel: Installing knfsd (copyright (C) 1996 okir@monad.swb.de). Nov 25 09:50:56 debian systemd-journald[251]: Journal started Nov 25 09:50:56 debian systemd-journald[251]: Runtime journal (/run/log/journal/b28e3418676c443984dc8bade4c268eb) is 1.2M, max 9.8M, 8.6M free. Nov 25 09:50:56 debian blkmapd[269]: open pipe file /run/rpc_pipefs/nfs/blocklayout failed: No such file or directory Nov 25 09:50:56 debian systemd-sysusers[270]: Failed to check if group sync already exists: Connection refused Nov 25 09:50:56 debian systemd-sysusers[270]: Failed to check if group nobody already exists: Connection refused Nov 25 09:50:56 debian systemd-tmpfiles[273]: [/usr/lib/tmpfiles.d/certmonger.conf:3] Line references path below legacy directory /var/run/, updating /var/run/certmonger → /run/certmonger; please update the tmpfiles.d/ drop-in file accordingly. Nov 25 09:50:56 debian systemd[1]: Starting Flush Journal to Persistent Storage... Nov 25 09:50:56 debian systemd[1]: Started Create Static Device Nodes in /dev. Nov 25 09:50:56 debian systemd[1]: Starting udev Kernel Device Manager... Nov 25 09:50:56 debian systemd[1]: Reached target Local File Systems (Pre). Nov 25 09:50:56 debian systemd-journald[251]: Time spent on flushing to /var is 59.605ms for 418 entries. Nov 25 09:50:56 debian systemd-journald[251]: System journal (/var/log/journal/b28e3418676c443984dc8bade4c268eb) is 8.0M, max 992.1M, 984.1M free. Nov 25 09:50:56 debian systemd-udevd[277]: Network interface NamePolicy= disabled on kernel command line, ignoring. Nov 25 09:50:57 debian systemd[1]: Started udev Kernel Device Manager. Nov 25 09:50:57 debian systemd[1]: Started Flush Journal to Persistent Storage. Nov 25 09:50:57 debian kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Nov 25 09:50:57 debian kernel: ACPI: Power Button [PWRF] Nov 25 09:50:57 debian kernel: sr 0:0:1:0: Attached scsi generic sg0 type 5 Nov 25 09:50:57 debian systemd-udevd[279]: Using default interface naming scheme 'v240'. Nov 25 09:50:57 debian systemd-udevd[283]: Using default interface naming scheme 'v240'. Nov 25 09:50:57 debian systemd-udevd[283]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 25 09:50:57 debian systemd-udevd[279]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 25 09:50:57 debian systemd[1]: Found device /dev/ttyS0. Nov 25 09:50:57 debian systemd-udevd[282]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 25 09:50:57 debian systemd[1]: Found device /dev/disk/by-uuid/0DD8-3CA1. Nov 25 09:50:57 debian systemd[1]: Mounting /boot/efi... Nov 25 09:50:57 debian systemd[1]: Mounted /boot/efi. Nov 25 09:50:57 debian systemd[1]: Reached target Local File Systems. Nov 25 09:50:57 debian systemd[1]: Condition check resulted in Mark the need to relabel after reboot being skipped. Nov 25 09:50:57 debian systemd[1]: Starting Set console font and keymap... Nov 25 09:50:57 debian systemd[1]: Starting Preprocess NFS configuration... Nov 25 09:50:57 debian systemd[1]: Starting Load AppArmor profiles... Nov 25 09:50:57 debian systemd[1]: Starting Create Volatile Files and Directories... Nov 25 09:50:57 debian systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. Nov 25 09:50:57 debian systemd[1]: nfs-config.service: Succeeded. Nov 25 09:50:57 debian systemd[1]: Started Preprocess NFS configuration. Nov 25 09:50:57 debian systemd[1]: Started Set console font and keymap. Nov 25 09:50:57 debian systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped. Nov 25 09:50:57 debian systemd[1]: Condition check resulted in RPC security service for NFS server being skipped. Nov 25 09:50:57 debian systemd[1]: Reached target NFS client services. Nov 25 09:50:57 debian systemd[1]: Starting NFSv4 ID-name mapping service... Nov 25 09:50:57 debian systemd-tmpfiles[320]: [/usr/lib/tmpfiles.d/certmonger.conf:3] Line references path below legacy directory /var/run/, updating /var/run/certmonger → /run/certmonger; please update the tmpfiles.d/ drop-in file accordingly. Nov 25 09:50:57 debian apparmor.systemd[319]: Restarting AppArmor Nov 25 09:50:57 debian apparmor.systemd[319]: Reloading AppArmor profiles Nov 25 09:50:57 debian systemd[1]: Started NFSv4 ID-name mapping service. Nov 25 09:50:57 debian systemd[1]: Started Create Volatile Files and Directories. Nov 25 09:50:57 debian systemd[1]: Starting Update UTMP about System Boot/Shutdown... Nov 25 09:50:58 debian systemd[1]: Starting RPC bind portmap service... Nov 25 09:50:58 debian systemd[1]: Started Update UTMP about System Boot/Shutdown. Nov 25 09:50:58 debian audit[332]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/chronyd" pid=332 comm="apparmor_parser" Nov 25 09:50:58 debian apparmor.systemd[319]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.061:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/chronyd" pid=332 comm="apparmor_parser" Nov 25 09:50:58 debian systemd[1]: Started RPC bind portmap service. Nov 25 09:50:58 debian systemd[1]: Reached target RPC Port Mapper. Nov 25 09:50:58 debian systemd[1]: Started Helper to synchronize boot up for ifupdown. Nov 25 09:50:58 debian audit[334]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=334 comm="apparmor_parser" Nov 25 09:50:58 debian apparmor.systemd[319]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 54): Warning failed to create cache: usr.sbin.sssd Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.317:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=334 comm="apparmor_parser" Nov 25 09:50:58 debian audit[344]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=344 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.337:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=344 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.337:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=344 comm="apparmor_parser" Nov 25 09:50:58 debian audit[344]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=344 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.337:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=344 comm="apparmor_parser" Nov 25 09:50:58 debian audit[344]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=344 comm="apparmor_parser" Nov 25 09:50:58 debian audit[345]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=345 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.365:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=345 comm="apparmor_parser" Nov 25 09:50:58 debian audit[346]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=346 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.377:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=346 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.377:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=346 comm="apparmor_parser" Nov 25 09:50:58 debian audit[346]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=346 comm="apparmor_parser" Nov 25 09:50:58 debian audit[347]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=347 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.397:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=347 comm="apparmor_parser" Nov 25 09:50:58 debian systemd[1]: Started Load AppArmor profiles. Nov 25 09:50:58 debian audit[348]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd" pid=348 comm="apparmor_parser" Nov 25 09:50:58 debian kernel: audit: type=1400 audit(1574675458.409:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd" pid=348 comm="apparmor_parser" Nov 25 09:50:58 debian systemd[1]: Reached target System Initialization. Nov 25 09:50:58 debian systemd[1]: Listening on Virtual machine log manager socket. Nov 25 09:50:58 debian audit[348]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd//qemu_bridge_helper" pid=348 comm="apparmor_parser" Nov 25 09:50:58 debian systemd[1]: Listening on UUID daemon activation socket. Nov 25 09:50:58 debian systemd[1]: Started Daily Cleanup of Temporary Directories. Nov 25 09:50:58 debian systemd[1]: Started Daily rotation of log files. Nov 25 09:50:58 debian systemd[1]: Starting Docker Socket for the API. Nov 25 09:50:58 debian systemd[1]: Started Daily man-db regeneration. Nov 25 09:50:58 debian systemd[1]: Reached target Timers. Nov 25 09:50:58 debian systemd[1]: Listening on Virtual machine log manager socket. Nov 25 09:50:58 debian systemd[1]: Listening on SSSD Secrets Service responder socket. Nov 25 09:50:58 debian systemd[1]: Listening on Virtual machine lock manager admin socket. Nov 25 09:50:58 debian systemd[1]: Listening on Virtual machine lock manager socket. Nov 25 09:50:58 debian systemd[1]: Listening on D-Bus System Message Bus Socket. Nov 25 09:50:58 debian systemd[1]: Listening on Docker Socket for the API. Nov 25 09:50:58 debian systemd[1]: Reached target Sockets. Nov 25 09:50:58 debian systemd[1]: Reached target Basic System. Nov 25 09:50:58 debian systemd[1]: Starting System Security Services Daemon... Nov 25 09:50:58 debian systemd[1]: Starting Modem Manager... Nov 25 09:50:58 debian systemd[1]: Started D-Bus System Message Bus. Nov 25 09:50:58 debian systemd[1]: Starting firewalld - dynamic firewall daemon... Nov 25 09:50:58 debian systemd[1]: Starting WPA supplicant... Nov 25 09:50:58 debian systemd[1]: Starting Disk Manager... Nov 25 09:50:58 debian systemd[1]: Starting Restore /etc/resolv.conf if the system crashed before the ppp link was shut down... Nov 25 09:50:58 debian systemd[1]: Condition check resulted in getty on tty2-tty6 if dbus and logind are not available being skipped. Nov 25 09:50:58 debian systemd[1]: Starting System Logging Service... Nov 25 09:50:58 debian rsyslogd[357]: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] Nov 25 09:50:58 debian rsyslogd[357]: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="357" x-info="https://www.rsyslog.com"] start Nov 25 09:50:58 debian udisksd[355]: udisks daemon version 2.8.1 starting Nov 25 09:50:58 debian ModemManager[351]: ModemManager (version 1.10.0) starting in system bus... Nov 25 09:50:58 debian systemd[1]: Started System Logging Service. Nov 25 09:50:58 debian systemd[1]: pppd-dns.service: Succeeded. Nov 25 09:50:58 debian systemd[1]: Started Restore /etc/resolv.conf if the system crashed before the ppp link was shut down. Nov 25 09:50:58 debian wpa_supplicant[354]: Successfully initialized wpa_supplicant Nov 25 09:50:58 debian systemd[1]: Started WPA supplicant. Nov 25 09:50:58 debian dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.2' (uid=0 pid=351 comm="/usr/sbin/ModemManager --filter-policy=strict ") Nov 25 09:50:58 debian systemd[1]: Starting Authorization Manager... Nov 25 09:50:59 debian polkitd[369]: started daemon version 0.105 using authority implementation `local' version `0.105' Nov 25 09:50:59 debian dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 25 09:50:59 debian systemd[1]: Started Authorization Manager. Nov 25 09:50:59 debian systemd[1]: Started Modem Manager. Nov 25 09:51:00 debian systemd[1]: Started Disk Manager. Nov 25 09:51:00 debian udisksd[355]: Acquired the name org.freedesktop.UDisks2 on the system message bus Nov 25 09:51:00 debian sssd[350]: Starting up Nov 25 09:51:01 debian sssd[be[381]: Starting up Nov 25 09:51:01 debian systemd[1]: Started firewalld - dynamic firewall daemon. Nov 25 09:51:01 debian systemd[1]: Reached target Network (Pre). Nov 25 09:51:01 debian systemd[1]: Starting Raise network interfaces... Nov 25 09:51:01 debian systemd[1]: Starting Network Manager... Nov 25 09:51:01 debian sssd[406]: Starting up Nov 25 09:51:01 debian audit[406]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=406 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:51:01 debian audit[406]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=406 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:51:01 debian NetworkManager[384]: [1574675461.8880] NetworkManager (version 1.14.6) is starting... (for the first time) Nov 25 09:51:01 debian NetworkManager[384]: [1574675461.8882] Read config: /etc/NetworkManager/NetworkManager.conf (lib: no-mac-addr-change.conf) (etc: noauto.conf) Nov 25 09:51:01 debian audit[406]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=406 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:51:01 debian systemd[1]: Started Network Manager. Nov 25 09:51:01 debian audit[406]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=406 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:51:01 debian systemd[1]: Starting Network Manager Wait Online... Nov 25 09:51:01 debian NetworkManager[384]: [1574675461.9417] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Nov 25 09:51:01 debian audit[406]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=406 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:51:01 debian audit[406]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=406 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:51:01 debian systemd[1]: Started System Security Services Daemon. Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.0001] manager[0x558f391bb030]: monitoring kernel firmware directory '/lib/firmware'. Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.0007] monitoring ifupdown state file '/run/network/ifstate'. Nov 25 09:51:02 debian systemd[1]: Reached target User and Group Name Lookups. Nov 25 09:51:02 debian systemd[1]: Starting Login Service... Nov 25 09:51:02 debian dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.6' (uid=0 pid=384 comm="/usr/sbin/NetworkManager --no-daemon ") Nov 25 09:51:02 debian systemd[1]: Starting Hostname Service... Nov 25 09:51:02 debian dhclient[427]: Internet Systems Consortium DHCP Client 4.4.1 Nov 25 09:51:02 debian ifup[383]: Internet Systems Consortium DHCP Client 4.4.1 Nov 25 09:51:02 debian dhclient[427]: Copyright 2004-2018 Internet Systems Consortium. Nov 25 09:51:02 debian ifup[383]: Copyright 2004-2018 Internet Systems Consortium. Nov 25 09:51:02 debian ifup[383]: All rights reserved. Nov 25 09:51:02 debian ifup[383]: For info, please visit https://www.isc.org/software/dhcp/ Nov 25 09:51:02 debian dhclient[427]: All rights reserved. Nov 25 09:51:02 debian dhclient[427]: For info, please visit https://www.isc.org/software/dhcp/ Nov 25 09:51:02 debian dhclient[427]: Nov 25 09:51:02 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0e.0/virtio4/net/eth0/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:02 debian systemd-logind[428]: Watching system buttons on /dev/input/event1 (Power Button) Nov 25 09:51:02 debian systemd-logind[428]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 25 09:51:02 debian systemd-logind[428]: New seat seat0. Nov 25 09:51:02 debian systemd[1]: Started Login Service. Nov 25 09:51:02 debian dhclient[427]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 25 09:51:02 debian ifup[383]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 25 09:51:02 debian ifup[383]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 25 09:51:02 debian ifup[383]: Sending on Socket/fallback Nov 25 09:51:02 debian ifup[383]: DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 8 Nov 25 09:51:02 debian dhclient[427]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 25 09:51:02 debian dhclient[427]: Sending on Socket/fallback Nov 25 09:51:02 debian dhclient[427]: DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 8 Nov 25 09:51:02 debian dhclient[427]: DHCPOFFER of 172.27.0.15 from 172.27.0.2 Nov 25 09:51:02 debian ifup[383]: DHCPOFFER of 172.27.0.15 from 172.27.0.2 Nov 25 09:51:02 debian ifup[383]: DHCPREQUEST for 172.27.0.15 on eth0 to 255.255.255.255 port 67 Nov 25 09:51:02 debian dhclient[427]: DHCPREQUEST for 172.27.0.15 on eth0 to 255.255.255.255 port 67 Nov 25 09:51:02 debian dhclient[427]: DHCPACK of 172.27.0.15 from 172.27.0.2 Nov 25 09:51:02 debian ifup[383]: DHCPACK of 172.27.0.15 from 172.27.0.2 Nov 25 09:51:02 debian ModemManager[351]: Couldn't check support for device '/sys/devices/pci0000:00/0000:00:0e.0': not supported by any plugin Nov 25 09:51:02 debian ModemManager[351]: Couldn't check support for device '/sys/devices/pci0000:00/0000:00:0f.0': not supported by any plugin Nov 25 09:51:02 debian dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 25 09:51:02 debian systemd[1]: Started Hostname Service. Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.4035] hostname: hostname: using hostnamed Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.4035] hostname: hostname changed from (none) to "debian" Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.4042] dns-mgr[0x558f391c90f0]: init: dns=default, rc-manager=resolvconf Nov 25 09:51:02 debian dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.6' (uid=0 pid=384 comm="/usr/sbin/NetworkManager --no-daemon ") Nov 25 09:51:02 debian systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 25 09:51:02 debian dhclient[427]: bound to 172.27.0.15 -- renewal in 37519 seconds. Nov 25 09:51:02 debian ifup[383]: bound to 172.27.0.15 -- renewal in 37519 seconds. Nov 25 09:51:02 debian dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Nov 25 09:51:02 debian systemd[1]: Started Network Manager Script Dispatcher Service. Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6428] ifupdown: interface-parser: parsing file /etc/network/interfaces Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6429] ifupdown: interface-parser: source line includes interfaces file(s) /etc/network/interfaces.d Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6429] ifupdown: interface-parser: source line includes interfaces file(s) /etc/network/interfaces.d/50-cloud-init Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6430] ifupdown: interface-parser: parsing file /etc/network/interfaces.d/50-cloud-init Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6430] ifupdown: interface-parser: finished parsing file /etc/network/interfaces.d/50-cloud-init Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6430] ifupdown: interface-parser: source line includes interfaces file(s) /run/network/interfaces.d Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6431] ifupdown: Failed to open directory /run/network/interfaces.d: Error opening directory “/run/network/interfaces.d”: No such file or directory Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6431] ifupdown: interface-parser: finished parsing file /etc/network/interfaces Nov 25 09:51:02 debian systemd[1]: Started Raise network interfaces. Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6534] ifupdown: guessed connection type (eth0) = 802-3-ethernet Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6536] ifupdown: update_connection_setting_from_if_block: name:eth0, type:802-3-ethernet, id:Ifupdown (eth0), uuid: 681b428f-beaf-8932-dce4-687ed5bae28e Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6566] ifupdown: management mode: unmanaged Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6566] settings: Loaded settings plugin: SettingsPluginIfupdown ("/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-settings-plugin-ifupdown.so") Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6567] settings: Loaded settings plugin: NMSKeyfilePlugin (internal) Nov 25 09:51:02 debian systemd[1]: Reached target Network. Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6718] manager: rfkill: WiFi enabled by radio killswitch; enabled by state file Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6721] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6747] manager: Networking is enabled by state file Nov 25 09:51:02 debian nm-dispatcher[461]: req:1 'hostname': new request (2 scripts) Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.6751] dhcp-init: Using DHCP client 'dhclient' Nov 25 09:51:02 debian nm-dispatcher[461]: req:1 'hostname': start running ordered scripts... Nov 25 09:51:02 debian systemd[1]: Starting OpenBSD Secure Shell server... Nov 25 09:51:02 debian systemd[1]: Started Unattended Upgrades Shutdown. Nov 25 09:51:02 debian systemd[1]: Started privileged operations for unprivileged applications. Nov 25 09:51:02 debian systemd[1]: Starting Certificate monitoring and PKI enrollment... Nov 25 09:51:02 debian systemd[1]: Starting chrony, an NTP client/server... Nov 25 09:51:02 debian systemd[1]: Starting NFS Mount Daemon... Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.8284] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-bluetooth.so) Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.8332] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-adsl.so) Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.8722] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-team.so) Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.8915] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-wwan.so) Nov 25 09:51:02 debian chronyd[518]: chronyd version 3.4 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 -DEBUG) Nov 25 09:51:02 debian chronyd[518]: Frequency 0.000 +/- 1000000.000 ppm read from /var/lib/chrony/chrony.drift Nov 25 09:51:02 debian chronyd[518]: Loaded seccomp filter Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.9236] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-wifi.so) Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.9911] device (lo): carrier: link connected Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.9943] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) Nov 25 09:51:02 debian NetworkManager[384]: [1574675462.9990] device (eth0): carrier: link connected Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.0051] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Nov 25 09:51:03 debian systemd[1]: Started chrony, an NTP client/server. Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.0632] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Nov 25 09:51:03 debian systemd[1]: Started Certificate monitoring and PKI enrollment. Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.0996] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Nov 25 09:51:03 debian kernel: IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready Nov 25 09:51:03 debian kernel: kauditd_printk_skb: 8 callbacks suppressed Nov 25 09:51:03 debian kernel: audit: type=1400 audit(1574675463.249:20): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:03 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:03 debian sshd[524]: Server listening on 0.0.0.0 port 22. Nov 25 09:51:03 debian sshd[524]: Server listening on :: port 22. Nov 25 09:51:03 debian systemd[1]: Started OpenBSD Secure Shell server. Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.2772] device (eth1): carrier: link connected Nov 25 09:51:03 debian systemd[1]: Started NFS Mount Daemon. Nov 25 09:51:03 debian systemd[1]: Starting NFS server and services... Nov 25 09:51:03 debian rpc.mountd[537]: Version 1.3.3 starting Nov 25 09:51:03 debian nm-dispatcher[461]: req:2 'connectivity-change': new request (2 scripts) Nov 25 09:51:03 debian nm-dispatcher[461]: req:2 'connectivity-change': start running ordered scripts... Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.3548] manager: NetworkManager state is now CONNECTED_GLOBAL Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.4176] modem-manager: ModemManager available Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.4661] device (eth1): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:03 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:03 debian kernel: audit: type=1400 audit(1574675463.465:21): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:03 debian nfsdcltrack[547]: Failed to init database: -13 Nov 25 09:51:03 debian kernel: NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory Nov 25 09:51:03 debian kernel: NFSD: starting 90-second grace period (net f0000098) Nov 25 09:51:03 debian systemd[1]: Started NFS server and services. Nov 25 09:51:03 debian systemd[1]: Reached target Remote File Systems (Pre). Nov 25 09:51:03 debian systemd[1]: Reached target Remote File Systems. Nov 25 09:51:03 debian systemd[1]: Starting Virtualization daemon... Nov 25 09:51:03 debian systemd[1]: Started Regular background program processing daemon. Nov 25 09:51:03 debian systemd[1]: Starting Deferred execution scheduler... Nov 25 09:51:03 debian systemd[1]: Starting Permit User Sessions... Nov 25 09:51:03 debian NetworkManager[384]: [1574675463.7763] manager: startup complete Nov 25 09:51:03 debian cron[565]: (CRON) INFO (pidfile fd = 3) Nov 25 09:51:03 debian systemd[1]: Started Permit User Sessions. Nov 25 09:51:03 debian systemd[1]: Started Getty on tty1. Nov 25 09:51:03 debian systemd[1]: Started Serial Getty on ttyS0. Nov 25 09:51:03 debian systemd[1]: Reached target Login Prompts. Nov 25 09:51:03 debian systemd[1]: Started Network Manager Wait Online. Nov 25 09:51:03 debian systemd[1]: Reached target Network is Online. Nov 25 09:51:03 debian systemd[1]: Starting LSB: Control pmproxy (the pmcd proxy daemon for PCP)... Nov 25 09:51:03 debian systemd[1]: Starting LSB: exim Mail Transport Agent... Nov 25 09:51:03 debian systemd[1]: Starting LSB: Control pmie (performance inference engine for PCP)... Nov 25 09:51:04 debian systemd[1]: Starting Docker Application Container Engine... Nov 25 09:51:04 debian cron[565]: (CRON) INFO (Running @reboot jobs) Nov 25 09:51:04 debian systemd[1]: Starting LSB: Control pmcd (the collection daemon for PCP)... Nov 25 09:51:04 debian systemd[1]: Starting LSB: Control pmlogger (the performance metrics logger for PCP)... Nov 25 09:51:04 debian systemd[1]: Started Deferred execution scheduler. Nov 25 09:51:04 debian sshd[617]: Did not receive identification string from 172.27.0.2 port 58694 Nov 25 09:51:05 debian sshd[709]: Did not receive identification string from 172.27.0.2 port 58366 Nov 25 09:51:05 debian pmlogger[582]: /etc/init.d/pmlogger: Warning: Performance Co-Pilot archive logger(s) not permanently enabled. Nov 25 09:51:05 debian pmlogger[582]: To enable pmlogger, run the following as root: Nov 25 09:51:05 debian pmlogger[582]: update-rc.d -f pmlogger remove Nov 25 09:51:05 debian pmlogger[582]: update-rc.d pmlogger defaults 94 06 Nov 25 09:51:05 debian pmlogger[582]: Starting pmlogger ... Nov 25 09:51:06 debian systemd[1]: Started LSB: Control pmlogger (the performance metrics logger for PCP). Nov 25 09:51:06 debian sshd[679]: Accepted publickey for root from 172.27.0.2 port 58702 ssh2: RSA SHA256:n1YTxRMBLaZoc2vmRy+1/hg9jrJNgUdQeSzJHTuiKUY Nov 25 09:51:06 debian sshd[679]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 25 09:51:06 debian systemd[1]: Created slice User Slice of UID 0. Nov 25 09:51:06 debian systemd[1]: Starting User Runtime Directory /run/user/0... Nov 25 09:51:06 debian systemd-logind[428]: New session 1 of user root. Nov 25 09:51:06 debian pmproxy[576]: Starting pmproxy ... Nov 25 09:51:06 debian systemd[1]: Started User Runtime Directory /run/user/0. Nov 25 09:51:06 debian systemd[1]: Starting User Manager for UID 0... Nov 25 09:51:06 debian systemd[1]: Started Virtualization daemon. Nov 25 09:51:06 debian systemd[1075]: pam_unix(systemd-user:session): session opened for user root by (uid=0) Nov 25 09:51:06 debian systemd[1]: Starting Suspend/Resume Running libvirt Guests... Nov 25 09:51:06 debian systemd[1]: Started LSB: Control pmproxy (the pmcd proxy daemon for PCP). Nov 25 09:51:06 debian sshd[1060]: Did not receive identification string from 172.27.0.2 port 58030 Nov 25 09:51:06 debian systemd[1]: Started Suspend/Resume Running libvirt Guests. Nov 25 09:51:06 debian systemd[1075]: Reached target Timers. Nov 25 09:51:06 debian systemd[1075]: Listening on GnuPG network certificate management daemon. Nov 25 09:51:06 debian systemd[1075]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 25 09:51:06 debian systemd[1075]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 25 09:51:06 debian systemd[1075]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 25 09:51:06 debian systemd[1075]: Reached target Paths. Nov 25 09:51:06 debian systemd[1075]: Starting D-Bus User Message Bus Socket. Nov 25 09:51:06 debian systemd[1075]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 25 09:51:06 debian systemd[1075]: Listening on D-Bus User Message Bus Socket. Nov 25 09:51:06 debian systemd[1075]: Reached target Sockets. Nov 25 09:51:06 debian systemd[1075]: Reached target Basic System. Nov 25 09:51:06 debian systemd[1]: Started User Manager for UID 0. Nov 25 09:51:06 debian systemd[1075]: Reached target Default. Nov 25 09:51:06 debian systemd[1075]: Startup finished in 363ms. Nov 25 09:51:06 debian systemd[1]: Started Session 1 of user root. Nov 25 09:51:06 debian sshd[679]: Received disconnect from 172.27.0.2 port 58702:11: disconnected by user Nov 25 09:51:06 debian sshd[679]: Disconnected from user root 172.27.0.2 port 58702 Nov 25 09:51:06 debian sshd[679]: pam_unix(sshd:session): session closed for user root Nov 25 09:51:06 debian systemd[1]: session-1.scope: Succeeded. Nov 25 09:51:06 debian systemd-logind[428]: Session 1 logged out. Waiting for processes to exit. Nov 25 09:51:06 debian systemd-logind[428]: Removed session 1. Nov 25 09:51:06 debian pmie[578]: /etc/init.d/pmie: Warning: Performance Co-Pilot Inference Engine (pmie) not permanently enabled. Nov 25 09:51:07 debian pmie[578]: To enable pmie, run the following as root: Nov 25 09:51:07 debian pmie[578]: update-rc.d -f pmie remove Nov 25 09:51:07 debian pmie[578]: update-rc.d pmie defaults 94 06 Nov 25 09:51:07 debian pmie[578]: Starting pmie ... Nov 25 09:51:07 debian sshd[1161]: Accepted publickey for root from 172.27.0.2 port 58856 ssh2: RSA SHA256:n1YTxRMBLaZoc2vmRy+1/hg9jrJNgUdQeSzJHTuiKUY Nov 25 09:51:07 debian sshd[1161]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 25 09:51:07 debian systemd[1]: Started Session 3 of user root. Nov 25 09:51:07 debian systemd-logind[428]: New session 3 of user root. Nov 25 09:51:07 debian systemd[1]: Started LSB: Control pmie (performance inference engine for PCP). Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.7155] keyfile: add connection /etc/NetworkManager/system-connections/static-52:54:01.nmconnection (b9ffb531-2ee0-40b2-9af6-e2627b81df96,"static-52:54:01") Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.7837] audit: op="connection-add" uuid="b9ffb531-2ee0-40b2-9af6-e2627b81df96" name="static-52:54:01" pid=1264 uid=0 result="success" Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.8285] policy: auto-activating connection 'static-52:54:01' (b9ffb531-2ee0-40b2-9af6-e2627b81df96) Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.8441] device (eth1): Activation: starting connection 'static-52:54:01' (b9ffb531-2ee0-40b2-9af6-e2627b81df96) Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.8594] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.9247] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.9394] agent-manager: req[0x558f39246100, :1.22/nmcli-connect/0]: agent registered Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.9492] device (eth1): state change: config -> deactivating (reason 'new-activation', sys-iface-state: 'managed') Nov 25 09:51:07 debian pmcd[581]: Starting pmcd ... Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.9819] device (eth1): disconnecting for new activation request. Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.9834] audit: op="connection-activate" uuid="b9ffb531-2ee0-40b2-9af6-e2627b81df96" name="static-52:54:01" pid=1337 uid=0 result="success" Nov 25 09:51:07 debian NetworkManager[384]: [1574675467.9854] device (eth1): state change: deactivating -> disconnected (reason 'new-activation', sys-iface-state: 'managed') Nov 25 09:51:07 debian kernel: audit: type=1400 audit(1574675467.985:22): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:07 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:08 debian NetworkManager[384]: [1574675468.0452] device (eth1): Activation: starting connection 'static-52:54:01' (b9ffb531-2ee0-40b2-9af6-e2627b81df96) Nov 25 09:51:08 debian nm-dispatcher[461]: req:3 'down' [eth1]: new request (2 scripts) Nov 25 09:51:08 debian nm-dispatcher[461]: req:3 'down' [eth1]: start running ordered scripts... Nov 25 09:51:08 debian NetworkManager[384]: [1574675468.0938] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:08 debian systemd[1]: Started LSB: Control pmcd (the collection daemon for PCP). Nov 25 09:51:08 debian NetworkManager[384]: [1574675468.1429] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:08 debian dockerd[580]: time="2019-11-25T09:51:08.498215918Z" level=info msg="libcontainerd: started new docker-containerd process" pid=1514 Nov 25 09:51:08 debian dockerd[580]: time="2019-11-25T09:51:08.499850201Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 25 09:51:08 debian dockerd[580]: time="2019-11-25T09:51:08.499880844Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 25 09:51:08 debian dockerd[580]: time="2019-11-25T09:51:08.500008208Z" level=info msg="ccResolverWrapper: sending new addresses to cc: [{unix:///var/run/docker/containerd/containerd.sock 0 }]" module=grpc Nov 25 09:51:08 debian dockerd[580]: time="2019-11-25T09:51:08.500059292Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 25 09:51:08 debian dockerd[580]: time="2019-11-25T09:51:08.501914031Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc000136370, CONNECTING" module=grpc Nov 25 09:51:09 debian pcp-pmie[1672]: Low random number entropy available 1.68%avail@debian Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.437192541Z" level=info msg="starting containerd" revision=9754871865f7fe2f4e74d43e2fc7ccd237edcbce version=18.09.1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.437780846Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.439860165Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.453552384Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.btrfs" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.btrfs must be a btrfs filesystem to be used with the btrfs snapshotter" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.453637697Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.484053879Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.aufs" error="modprobe aufs failed: \"modprobe: FATAL: Module aufs not found in directory /lib/modules/4.19.0-6-cloud-amd64\\n\": exit status 1" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.485931481Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.506245595Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.511808741Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.514180701Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.zfs" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.514247513Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.514304255Z" level=warning msg="could not use snapshotter zfs in metadata plugin" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.514331504Z" level=warning msg="could not use snapshotter btrfs in metadata plugin" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.btrfs must be a btrfs filesystem to be used with the btrfs snapshotter" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.514357294Z" level=warning msg="could not use snapshotter aufs in metadata plugin" error="modprobe aufs failed: \"modprobe: FATAL: Module aufs not found in directory /lib/modules/4.19.0-6-cloud-amd64\\n\": exit status 1" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521442186Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521525065Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521633966Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521676753Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521706877Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521734046Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.521771537Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.522968565Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.523006477Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.523040726Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.523257496Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.523407382Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.532909588Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.532997551Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533085568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533115654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533138960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533164735Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533183985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533204219Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533225686Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533256492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.533278859Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.538830796Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.538935515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.538967369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.538993976Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.539326697Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.539437736Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.539463919Z" level=info msg="containerd successfully booted in 0.110729s" Nov 25 09:51:09 debian dockerd[580]: time="2019-11-25T09:51:09.550162557Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc000136370, READY" module=grpc Nov 25 09:51:10 debian audit[1896]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1896 comm="apparmor_parser" Nov 25 09:51:10 debian kernel: audit: type=1400 audit(1574675470.069:23): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1896 comm="apparmor_parser" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.117761157Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.119801994Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.124301069Z" level=info msg="ccResolverWrapper: sending new addresses to cc: [{unix:///var/run/docker/containerd/containerd.sock 0 }]" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.124506358Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.124691867Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0005cd410, CONNECTING" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.125255474Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0005cd410, READY" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.131196215Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.131744581Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.149474166Z" level=info msg="ccResolverWrapper: sending new addresses to cc: [{unix:///var/run/docker/containerd/containerd.sock 0 }]" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.149590491Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.149684071Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0005cd970, CONNECTING" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.151297561Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0005cd970, READY" module=grpc Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.247579970Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.792849293Z" level=info msg="Graph migration to content-addressability took 0.00 seconds" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.796817762Z" level=warning msg="Your kernel does not support swap memory limit" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.796985646Z" level=warning msg="Your kernel does not support cgroup rt period" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.797023640Z" level=warning msg="Your kernel does not support cgroup rt runtime" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.797050077Z" level=warning msg="Your kernel does not support cgroup blkio weight" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.797071528Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" Nov 25 09:51:10 debian dockerd[580]: time="2019-11-25T09:51:10.799086003Z" level=info msg="Loading containers: start." Nov 25 09:51:10 debian kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 25 09:51:10 debian kernel: Bridge firewalling registered Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.1643] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:14 debian kernel: audit: type=1400 audit(1574675474.169:24): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:14 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:14 debian systemd-udevd[1334]: Using default interface naming scheme 'v240'. Nov 25 09:51:14 debian systemd-udevd[1334]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 25 09:51:14 debian systemd-udevd[1334]: Could not generate persistent MAC address for virbr0: No such file or directory Nov 25 09:51:14 debian kernel: tun: Universal TUN/TAP device driver, 1.6 Nov 25 09:51:14 debian kernel: virbr0: port 1(virbr0-nic) entered blocking state Nov 25 09:51:14 debian kernel: virbr0: port 1(virbr0-nic) entered disabled state Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D PREROUTING -m addrtype --dst-type LOCAL -j DOCKER' failed: iptables v1.8.2 (nf_tables): Chain 'DOCKER' does not exist Try `iptables -h' or 'iptables --help' for more information. Nov 25 09:51:14 debian kernel: device virbr0-nic entered promiscuous mode Nov 25 09:51:14 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D OUTPUT -m addrtype --dst-type LOCAL ! --dst 127.0.0.0/8 -j DOCKER' failed: iptables v1.8.2 (nf_tables): Chain 'DOCKER' does not exist Try `iptables -h' or 'iptables --help' for more information. Nov 25 09:51:14 debian kernel: audit: type=1400 audit(1574675474.365:25): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:14 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:14 debian kernel: audit: type=1400 audit(1574675474.377:26): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:14 debian systemd-udevd[3309]: Using default interface naming scheme 'v240'. Nov 25 09:51:14 debian systemd-udevd[3309]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.5259] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.5443] manager: (virbr0): new Bridge device (/org/freedesktop/NetworkManager/Devices/4) Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D OUTPUT -m addrtype --dst-type LOCAL -j DOCKER' failed: iptables v1.8.2 (nf_tables): Chain 'DOCKER' does not exist Try `iptables -h' or 'iptables --help' for more information. Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.5617] manager: (virbr0-nic): new Tun device (/org/freedesktop/NetworkManager/Devices/5) Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.5810] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.5979] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D PREROUTING' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D OUTPUT' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.7233] device (eth1): Activation: successful, device activated. Nov 25 09:51:14 debian nm-dispatcher[461]: req:4 'up' [eth1]: new request (2 scripts) Nov 25 09:51:14 debian nm-dispatcher[461]: req:4 'up' [eth1]: start running ordered scripts... Nov 25 09:51:14 debian nm-dispatcher[461]: req:5 'connectivity-change': new request (2 scripts) Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.7465] device (virbr0-nic): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.7542] device (virbr0-nic): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'external') Nov 25 09:51:14 debian systemd[1]: Reloading Network Manager. Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -X DOCKER' failed: iptables: No chain/target/match by that name. Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.8334] audit: op="reload" arg="0" pid=3384 uid=0 result="success" Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.8358] config: signal: SIGHUP,config-files,values,values-user,dns-mode (/etc/NetworkManager/NetworkManager.conf (lib: no-mac-addr-change.conf) (etc: dns.conf, noauto.conf)) Nov 25 09:51:14 debian NetworkManager[384]: [1574675474.8378] dns-mgr: init: dns=none, rc-manager=unmanaged Nov 25 09:51:14 debian dbus-send[3384]: method return time=1574675474.841466 sender=:1.6 -> destination=:1.24 serial=416 reply_serial=2 Nov 25 09:51:14 debian systemd[1]: Reloaded Network Manager. Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER' failed: iptables: No chain/target/match by that name. Nov 25 09:51:14 debian nm-dispatcher[461]: req:5 'connectivity-change': start running ordered scripts... Nov 25 09:51:14 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER-ISOLATION-STAGE-1' failed: iptables: No chain/target/match by that name. Nov 25 09:51:15 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER-ISOLATION-STAGE-2' failed: iptables: No chain/target/match by that name. Nov 25 09:51:15 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER-ISOLATION' failed: iptables: No chain/target/match by that name. Nov 25 09:51:15 debian kernel: virbr0: port 1(virbr0-nic) entered blocking state Nov 25 09:51:15 debian kernel: virbr0: port 1(virbr0-nic) entered listening state Nov 25 09:51:15 debian kernel: audit: type=1400 audit(1574675475.237:27): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:15 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:15 debian audit[350]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:15 debian kernel: audit: type=1400 audit(1574675475.249:28): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=350 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.2764] device (virbr0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.2897] keyfile: add connection /run/NetworkManager/system-connections/virbr0.nmconnection (25e861e3-66fb-4fd8-a160-d1c95650d9fc,"virbr0") Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3100] device (virbr0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3233] device (virbr0): Activation: starting connection 'virbr0' (25e861e3-66fb-4fd8-a160-d1c95650d9fc) Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3244] device (virbr0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3413] device (virbr0): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3481] keyfile: add connection /run/NetworkManager/system-connections/virbr0-nic.nmconnection (7c5b31be-3577-4dda-a348-374cd16d7248,"virbr0-nic") Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3703] device (virbr0-nic): Activation: starting connection 'virbr0-nic' (7c5b31be-3577-4dda-a348-374cd16d7248) Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3712] device (virbr0): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3765] device (virbr0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.3880] device (virbr0-nic): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4008] device (virbr0-nic): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4080] device (virbr0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4111] device (virbr0-nic): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4140] device (virbr0): bridge port virbr0-nic was attached Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4157] device (virbr0-nic): Activation: connection 'virbr0-nic' enslaved, continuing activation Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4184] device (virbr0-nic): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.4401] device (virbr0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.6791] device (virbr0): Activation: successful, device activated. Nov 25 09:51:15 debian nm-dispatcher[461]: req:6 'up' [virbr0]: new request (2 scripts) Nov 25 09:51:15 debian nm-dispatcher[461]: req:6 'up' [virbr0]: start running ordered scripts... Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.6881] device (virbr0-nic): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.6932] device (virbr0-nic): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Nov 25 09:51:15 debian dnsmasq[3636]: started, version 2.80 cachesize 150 Nov 25 09:51:15 debian dnsmasq[3636]: compile time options: IPv6 GNU-getopt DBus i18n IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC loop-detect inotify dumpfile Nov 25 09:51:15 debian dnsmasq-dhcp[3636]: DHCP, IP range 192.168.122.2 -- 192.168.122.254, lease time 1h Nov 25 09:51:15 debian dnsmasq-dhcp[3636]: DHCP, sockets bound exclusively to interface virbr0 Nov 25 09:51:15 debian dnsmasq[3636]: reading /etc/resolv.conf Nov 25 09:51:15 debian dnsmasq[3636]: using nameserver 10.111.112.100#53 Nov 25 09:51:15 debian dnsmasq[3636]: read /etc/hosts - 5 addresses Nov 25 09:51:15 debian dnsmasq[3636]: read /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses Nov 25 09:51:15 debian dnsmasq-dhcp[3636]: read /var/lib/libvirt/dnsmasq/default.hostsfile Nov 25 09:51:15 debian kernel: Initializing XFRM netlink socket Nov 25 09:51:15 debian kernel: virbr0: port 1(virbr0-nic) entered disabled state Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.8393] device (virbr0-nic): Activation: successful, device activated. Nov 25 09:51:15 debian nm-dispatcher[461]: req:7 'up' [virbr0-nic]: new request (2 scripts) Nov 25 09:51:15 debian nm-dispatcher[461]: req:7 'up' [virbr0-nic]: start running ordered scripts... Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.8505] device (virbr0-nic): state change: activated -> unmanaged (reason 'connection-assumed', sys-iface-state: 'external') Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.8606] device (virbr0): bridge port virbr0-nic was detached Nov 25 09:51:15 debian NetworkManager[384]: [1574675475.8610] device (virbr0-nic): released from master device virbr0 Nov 25 09:51:15 debian systemd-udevd[1334]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 25 09:51:15 debian systemd-udevd[1334]: Could not generate persistent MAC address for docker0: No such file or directory Nov 25 09:51:15 debian nm-dispatcher[461]: req:8 'down' [virbr0-nic]: new request (2 scripts) Nov 25 09:51:15 debian nm-dispatcher[461]: req:8 'down' [virbr0-nic]: start running ordered scripts... Nov 25 09:51:16 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -D FORWARD -i docker0 -o docker0 -j DROP' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 25 09:51:16 debian NetworkManager[384]: [1574675476.2031] manager: (docker0): new Bridge device (/org/freedesktop/NetworkManager/Devices/6) Nov 25 09:51:16 debian kernel: IPv6: ADDRCONF(NETDEV_UP): docker0: link is not ready Nov 25 09:51:16 debian exim4[577]: Starting MTA: exim4. Nov 25 09:51:16 debian systemd[1]: Started LSB: exim Mail Transport Agent. Nov 25 09:51:17 debian dockerd[580]: time="2019-11-25T09:51:17.402651087Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Nov 25 09:51:17 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -D FORWARD -i docker0 -o docker0 -j DROP' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 25 09:51:18 debian dockerd[580]: time="2019-11-25T09:51:18.326785098Z" level=info msg="Loading containers: done." Nov 25 09:51:18 debian systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck933391530-merged.mount: Succeeded. Nov 25 09:51:18 debian systemd[1075]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck933391530-merged.mount: Succeeded. Nov 25 09:51:19 debian dockerd[580]: time="2019-11-25T09:51:19.772929474Z" level=info msg="Docker daemon" commit=4c52b90 graphdriver(s)=overlay2 version=18.09.1 Nov 25 09:51:19 debian dockerd[580]: time="2019-11-25T09:51:19.775121724Z" level=info msg="Daemon has completed initialization" Nov 25 09:51:20 debian systemd[1]: Started Docker Application Container Engine. Nov 25 09:51:20 debian systemd[1]: Reached target Multi-User System. Nov 25 09:51:20 debian systemd[1]: Reached target Graphical Interface. Nov 25 09:51:20 debian systemd[1]: Starting Update UTMP about System Runlevel Changes... Nov 25 09:51:20 debian dockerd[580]: time="2019-11-25T09:51:20.082645743Z" level=info msg="API listen on /var/run/docker.sock" Nov 25 09:51:20 debian systemd[1]: systemd-update-utmp-runlevel.service: Succeeded. Nov 25 09:51:20 debian systemd[1]: Started Update UTMP about System Runlevel Changes. Nov 25 09:51:20 debian systemd[1]: Startup finished in 4.187s (kernel) + 24.625s (userspace) = 28.812s. Nov 25 09:51:21 x0.cockpit.lan systemd-hostnamed[429]: Changed static host name to 'x0.cockpit.lan' Nov 25 09:51:21 x0.cockpit.lan NetworkManager[384]: [1574675481.3164] hostname: hostname changed from "debian" to "x0.cockpit.lan" Nov 25 09:51:21 x0.cockpit.lan nm-dispatcher[461]: req:9 'hostname': new request (2 scripts) Nov 25 09:51:21 x0.cockpit.lan NetworkManager[384]: [1574675481.3171] policy: set-hostname: set hostname to 'x0.cockpit.lan' (from system configuration) Nov 25 09:51:21 x0.cockpit.lan nm-dispatcher[461]: req:9 'hostname': start running ordered scripts... Nov 25 09:51:21 x0.cockpit.lan systemd-hostnamed[429]: Changed host name to 'x0.cockpit.lan' Nov 25 09:51:21 x0.cockpit.lan nm-dispatcher[461]: req:10 'hostname': new request (2 scripts) Nov 25 09:51:21 x0.cockpit.lan nm-dispatcher[461]: req:10 'hostname': start running ordered scripts... Nov 25 09:51:21 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:51:21 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: serial-getty@ttyS0.service: Current command vanished from the unit file, execution of the command list won't be resumed. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: getty@tty1.service: Current command vanished from the unit file, execution of the command list won't be resumed. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service Socket. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: Listening on Cockpit Web Service Socket. Nov 25 09:51:22 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http-redirect instance. Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance factory. Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http instance. Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http-redirect instance. Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http instance. Nov 25 09:51:23 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service... Nov 25 09:51:23 x0.cockpit.lan remotectl[6382]: Generating temporary certificate using: sscg --quiet --lifetime 3650 --key-strength 2048 --cert-key-file /etc/cockpit/ws-certs.d/0-self-signed.cert --cert-file /etc/cockpit/ws-certs.d/0-self-signed.cert --ca-file /etc/cockpit/ws-certs.d/0-self-signed-ca.pem --hostname x0.cockpit.lan --organization b28e3418676c443984dc8bade4c268eb --subject-alt-name localhost --subject-alt-name IP:127.0.0.1/255.255.255.255 Nov 25 09:51:23 x0.cockpit.lan remotectl[6382]: Error generating temporary dummy cert using sscg, falling back to openssl Nov 25 09:51:23 x0.cockpit.lan remotectl[6382]: Generating temporary certificate using: openssl req -x509 -days 36500 -newkey rsa:2048 -keyout /etc/cockpit/ws-certs.d/0-self-signed.YIKDB0.tmp -keyform PEM -nodes -out /etc/cockpit/ws-certs.d/0-self-signed.GJKDB0.tmp -outform PEM -subj /O=b28e3418676c443984dc8bade4c268eb/CN=x0.cockpit.lan -config /tmp/ssl.conf.5JKDB0 -extensions v3_req Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Started Cockpit Web Service. Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Started Cockpit Web Service http instance. Nov 25 09:51:24 x0.cockpit.lan sshd[6598]: Did not receive identification string from 172.27.0.2 port 58268 Nov 25 09:51:24 x0.cockpit.lan cockpit-session[6679]: pam_ssh_add: Failed adding some keys Nov 25 09:51:24 x0.cockpit.lan cockpit-session[6679]: pam_unix(cockpit:session): session opened for user admin by (uid=0) Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Created slice User Slice of UID 1002. Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Starting User Runtime Directory /run/user/1002... Nov 25 09:51:24 x0.cockpit.lan systemd-logind[428]: New session 4 of user admin. Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Started User Runtime Directory /run/user/1002. Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Starting User Manager for UID 1002... Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: pam_unix(systemd-user:session): session opened for user admin by (uid=0) Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 25 09:51:25 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:4 (system bus name :1.29 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Reached target Paths. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Listening on GnuPG network certificate management daemon. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Reached target Timers. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Starting D-Bus User Message Bus Socket. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Listening on D-Bus User Message Bus Socket. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Reached target Sockets. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Reached target Basic System. Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Started User Manager for UID 1002. Nov 25 09:51:24 x0.cockpit.lan systemd[1]: Started Session 4 of user admin. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Reached target Default. Nov 25 09:51:24 x0.cockpit.lan systemd[6715]: Startup finished in 100ms. Nov 25 09:51:26 x0.cockpit.lan cockpit-ws[6519]: logged in user session Nov 25 09:51:26 x0.cockpit.lan cockpit-ws[6519]: New connection to session Nov 25 09:51:27 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' requested by ':1.31' (uid=1002 pid=6745 comm="cockpit-bridge ") Nov 25 09:51:27 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' requested by ':1.33' (uid=1002 pid=6745 comm="cockpit-bridge ") Nov 25 09:51:27 x0.cockpit.lan systemd[1]: Starting Time & Date Service... Nov 25 09:51:27 x0.cockpit.lan update-motd[5877]: hostname: Temporary failure in name resolution Nov 25 09:51:27 x0.cockpit.lan systemd[1]: Starting Realm and Domain Configuration... Nov 25 09:51:27 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 25 09:51:27 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 25 09:51:27 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:4 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:6745:3366 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:51:27 x0.cockpit.lan pkexec[7140]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: Loaded settings from: /usr/lib/realmd/realmd-defaults.conf /usr/lib/realmd/realmd-distro.conf /etc/realmd.conf Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: holding daemon: startup Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: starting service Nov 25 09:51:27 x0.cockpit.lan pkexec[7140]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: connected to bus Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: released daemon: startup Nov 25 09:51:27 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.realmd' Nov 25 09:51:27 x0.cockpit.lan systemd[1]: Started Realm and Domain Configuration. Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: claimed name on bus: org.freedesktop.realmd Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: client using service: :1.33 Nov 25 09:51:27 x0.cockpit.lan realmd[7172]: holding daemon: :1.33 Nov 25 09:51:28 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' requested by ':1.37' (uid=0 pid=7140 comm="/usr/bin/cockpit-bridge --privileged ") Nov 25 09:51:28 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.timedate1' Nov 25 09:51:28 x0.cockpit.lan systemd[1]: Started Time & Date Service. Nov 25 09:51:28 x0.cockpit.lan systemd[1]: Starting PackageKit Daemon... Nov 25 09:51:28 x0.cockpit.lan PackageKit[7195]: daemon start Nov 25 09:51:28 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.PackageKit' Nov 25 09:51:31 x0.cockpit.lan systemd[1]: NetworkManager-dispatcher.service: Succeeded. Nov 25 09:51:31 x0.cockpit.lan systemd[1]: Started PackageKit Daemon. Nov 25 09:51:36 x0.cockpit.lan PackageKit[7195]: get-updates transaction /2_aecedebb from uid 0 finished with success after 7515ms Nov 25 09:51:58 x0.cockpit.lan systemd[1]: systemd-hostnamed.service: Succeeded. Nov 25 09:53:53 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:53:53 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:53:54 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:53:54 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:53:54 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:53:54 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:53:54 x0.cockpit.lan realmd[7172]: Searching for (objectClass=*) Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Got server software: ipa Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Got associatedDomain: cockpit.lan Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Found realm: COCKPIT.LAN Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Using 'cockpit-1' operation for method 'Join' invocation on 'org.freedesktop.realmd.KerberosMembership' interface Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: Registered cancellable for operation 'cockpit-1' Nov 25 09:53:55 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:4 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.configure-realm for system-bus-name::1.33 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: holding daemon: current-invocation Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: * Unconditionally checking packages Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: * Unconditionally checking packages Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: * Resolving required packages Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: * Resolving required packages Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: packages: CreateTransaction call Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: packages: SetHints call Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: packages: call Resolve (262144, ['freeipa-client', 'sssd-tools', 'sssd', 'libnss-sss', 'libpam-sss']) Nov 25 09:53:55 x0.cockpit.lan realmd[7172]: packages: call Resolve completed Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'freeipa-client;4.7.2-3;amd64;installed:debian-stable-main', 'FreeIPA centralized identity framework -- client') Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'libnss-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Nss library for the System Security Services Daemon') Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'libpam-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Pam module for the System Security Services Daemon') Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'sssd;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- metapackage') Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'sssd-tools;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- tools') Nov 25 09:53:56 x0.cockpit.lan PackageKit[7195]: resolve transaction /4_eedcaeed from uid 0 finished with success after 602ms Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: signal: Finished (1, 602) Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: * LANG=C /usr/sbin/ipa-client-install --domain cockpit.lan --realm COCKPIT.LAN --mkhomedir --enable-dns-updates --unattended --force-join --principal admin -W --force-ntpd Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: * LANG=C /usr/sbin/ipa-client-install --domain cockpit.lan --realm COCKPIT.LAN --mkhomedir --enable-dns-updates --unattended --force-join --principal admin -W --force-ntpd Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: process started: 8893 Nov 25 09:53:56 x0.cockpit.lan realmd[7172]: packages: freeing transtaction Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Option --force-ntpd has been deprecated Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Option --force-ntpd has been deprecated Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Discovery was successful! Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Discovery was successful! Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Client hostname: x0.cockpit.lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Client hostname: x0.cockpit.lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Realm: COCKPIT.LAN Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Realm: COCKPIT.LAN Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: DNS Domain: cockpit.lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: DNS Domain: cockpit.lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: IPA Server: f0.cockpit.lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: IPA Server: f0.cockpit.lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: BaseDN: dc=cockpit,dc=lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: BaseDN: dc=cockpit,dc=lan Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Synchronizing time Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: Synchronizing time Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: No SRV records of NTP servers found and no NTP server or pool address was provided. Nov 25 09:53:57 x0.cockpit.lan realmd[7172]: No SRV records of NTP servers found and no NTP server or pool address was provided. Nov 25 09:53:57 x0.cockpit.lan systemd[1]: Stopping chrony, an NTP client/server... Nov 25 09:53:57 x0.cockpit.lan chronyd[518]: chronyd exiting Nov 25 09:53:57 x0.cockpit.lan systemd[1]: chrony.service: Succeeded. Nov 25 09:53:58 x0.cockpit.lan systemd[1]: Stopped chrony, an NTP client/server. Nov 25 09:53:58 x0.cockpit.lan systemd[1]: Starting chrony, an NTP client/server... Nov 25 09:53:58 x0.cockpit.lan chronyd[8908]: chronyd version 3.4 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 -DEBUG) Nov 25 09:53:58 x0.cockpit.lan chronyd[8908]: Frequency 0.000 +/- 1000000.000 ppm read from /var/lib/chrony/chrony.drift Nov 25 09:53:58 x0.cockpit.lan chronyd[8908]: Loaded seccomp filter Nov 25 09:53:58 x0.cockpit.lan systemd[1]: Started chrony, an NTP client/server. Nov 25 09:53:58 x0.cockpit.lan realmd[7172]: Attempting to sync time with chronyc. Nov 25 09:53:58 x0.cockpit.lan realmd[7172]: Attempting to sync time with chronyc. Nov 25 09:54:18 x0.cockpit.lan realmd[7172]: Process chronyc waitsync failed to sync time! Nov 25 09:54:18 x0.cockpit.lan realmd[7172]: Process chronyc waitsync failed to sync time! Nov 25 09:54:18 x0.cockpit.lan realmd[7172]: Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. Nov 25 09:54:18 x0.cockpit.lan realmd[7172]: Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. Nov 25 09:54:19 x0.cockpit.lan python2[8893]: GSSAPI client step 1 Nov 25 09:54:19 x0.cockpit.lan python2[8893]: GSSAPI client step 1 Nov 25 09:54:19 x0.cockpit.lan python2[8893]: GSSAPI client step 1 Nov 25 09:54:19 x0.cockpit.lan python2[8893]: GSSAPI client step 2 Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Successfully retrieved CA cert Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Successfully retrieved CA cert Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Subject: CN=Certificate Authority,O=COCKPIT.LAN Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Subject: CN=Certificate Authority,O=COCKPIT.LAN Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Issuer: CN=Certificate Authority,O=COCKPIT.LAN Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Issuer: CN=Certificate Authority,O=COCKPIT.LAN Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Valid From: 2019-11-06 13:32:42 Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Valid From: 2019-11-06 13:32:42 Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Valid Until: 2039-11-06 13:32:42 Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Valid Until: 2039-11-06 13:32:42 Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Nov 25 09:54:20 x0.cockpit.lan realmd[7172]: Nov 25 09:54:23 x0.cockpit.lan ipa-getkeytab[8919]: GSSAPI client step 1 Nov 25 09:54:23 x0.cockpit.lan ipa-getkeytab[8919]: GSSAPI client step 1 Nov 25 09:54:23 x0.cockpit.lan ipa-getkeytab[8919]: GSSAPI client step 1 Nov 25 09:54:23 x0.cockpit.lan ipa-getkeytab[8919]: GSSAPI client step 2 Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Enrolled in IPA realm COCKPIT.LAN Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Enrolled in IPA realm COCKPIT.LAN Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Created /etc/ipa/default.conf Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Created /etc/ipa/default.conf Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Configured sudoers in /etc/nsswitch.conf Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Configured sudoers in /etc/nsswitch.conf Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Configured /etc/sssd/sssd.conf Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Configured /etc/sssd/sssd.conf Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Configured /etc/krb5.conf for IPA realm COCKPIT.LAN Nov 25 09:54:24 x0.cockpit.lan realmd[7172]: Configured /etc/krb5.conf for IPA realm COCKPIT.LAN Nov 25 09:54:34 x0.cockpit.lan python2[8893]: GSSAPI client step 1 Nov 25 09:54:34 x0.cockpit.lan python2[8893]: GSSAPI client step 1 Nov 25 09:54:35 x0.cockpit.lan python2[8893]: GSSAPI client step 1 Nov 25 09:54:35 x0.cockpit.lan python2[8893]: GSSAPI client step 2 Nov 25 09:54:37 x0.cockpit.lan realmd[7172]: Systemwide CA database updated. Nov 25 09:54:37 x0.cockpit.lan realmd[7172]: Systemwide CA database updated. Nov 25 09:54:37 x0.cockpit.lan realmd[7172]: Hostname (x0.cockpit.lan) does not have A/AAAA record. Nov 25 09:54:37 x0.cockpit.lan realmd[7172]: Hostname (x0.cockpit.lan) does not have A/AAAA record. Nov 25 09:54:39 x0.cockpit.lan realmd[7172]: Missing reverse record(s) for address(es): 10.111.113.1. Nov 25 09:54:39 x0.cockpit.lan realmd[7172]: Missing reverse record(s) for address(es): 10.111.113.1. Nov 25 09:54:39 x0.cockpit.lan realmd[7172]: Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub Nov 25 09:54:39 x0.cockpit.lan realmd[7172]: Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub Nov 25 09:54:39 x0.cockpit.lan realmd[7172]: Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub Nov 25 09:54:39 x0.cockpit.lan realmd[7172]: Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub Nov 25 09:54:48 x0.cockpit.lan realmd[7172]: SSSD enabled Nov 25 09:54:48 x0.cockpit.lan realmd[7172]: SSSD enabled Nov 25 09:54:48 x0.cockpit.lan systemd[1]: Stopping System Security Services Daemon... Nov 25 09:54:48 x0.cockpit.lan sssd[be[381]: Shutting down Nov 25 09:54:48 x0.cockpit.lan sssd[406]: Shutting down Nov 25 09:54:48 x0.cockpit.lan systemd[1]: sssd.service: Succeeded. Nov 25 09:54:48 x0.cockpit.lan systemd[1]: Stopped System Security Services Daemon. Nov 25 09:54:48 x0.cockpit.lan systemd[1]: Starting System Security Services Daemon... Nov 25 09:54:48 x0.cockpit.lan audit[9898]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=9898 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:48 x0.cockpit.lan kernel: audit: type=1400 audit(1574675688.693:29): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=9898 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:48 x0.cockpit.lan audit[9898]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=9898 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:48 x0.cockpit.lan kernel: audit: type=1400 audit(1574675688.713:30): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=9898 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:48 x0.cockpit.lan sssd[9898]: Starting up Nov 25 09:54:49 x0.cockpit.lan sssd[be[9899]: Starting up Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.061:31): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.069:32): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.105:33): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.129:34): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.137:35): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.177:36): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan sssd[9900]: Starting up Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.189:37): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9900]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan kernel: audit: type=1400 audit(1574675690.237:38): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9900]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9905]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9905 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9905]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9905 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan sssd[9903]: Starting up Nov 25 09:54:50 x0.cockpit.lan sssd[9902]: Starting up Nov 25 09:54:50 x0.cockpit.lan sssd[9901]: Starting up Nov 25 09:54:50 x0.cockpit.lan sssd[9904]: Starting up Nov 25 09:54:50 x0.cockpit.lan audit[9900]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9900]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9900]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9900]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=9900 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan sssd_be[9899]: GSSAPI client step 1 Nov 25 09:54:50 x0.cockpit.lan sssd_be[9899]: GSSAPI client step 1 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:50 x0.cockpit.lan systemd[1]: Started System Security Services Daemon. Nov 25 09:54:50 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:54:50 x0.cockpit.lan sssd_be[9899]: GSSAPI client step 1 Nov 25 09:54:50 x0.cockpit.lan sssd_be[9899]: GSSAPI client step 2 Nov 25 09:54:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:54:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:54:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:54:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:54:51 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:54:52 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:54:52 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:54:52 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:54:52 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:54:52 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:54:53 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:54:53 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:54:53 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:54:53 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:54:53 x0.cockpit.lan realmd[7172]: Configured /etc/openldap/ldap.conf Nov 25 09:54:53 x0.cockpit.lan realmd[7172]: Configured /etc/openldap/ldap.conf Nov 25 09:54:53 x0.cockpit.lan realmd[7172]: Configured /etc/ssh/ssh_config Nov 25 09:54:53 x0.cockpit.lan realmd[7172]: Configured /etc/ssh/ssh_config Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Configured /etc/ssh/sshd_config Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Configured /etc/ssh/sshd_config Nov 25 09:54:54 x0.cockpit.lan systemd[1]: Stopping OpenBSD Secure Shell server... Nov 25 09:54:54 x0.cockpit.lan sshd[524]: Received signal 15; terminating. Nov 25 09:54:54 x0.cockpit.lan systemd[1]: ssh.service: Succeeded. Nov 25 09:54:54 x0.cockpit.lan systemd[1]: Stopped OpenBSD Secure Shell server. Nov 25 09:54:54 x0.cockpit.lan systemd[1]: Starting OpenBSD Secure Shell server... Nov 25 09:54:54 x0.cockpit.lan sshd[9972]: Server listening on 0.0.0.0 port 22. Nov 25 09:54:54 x0.cockpit.lan sshd[9972]: Server listening on :: port 22. Nov 25 09:54:54 x0.cockpit.lan systemd[1]: Started OpenBSD Secure Shell server. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Configuring cockpit.lan as NIS domain. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Configuring cockpit.lan as NIS domain. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Client configuration complete. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Client configuration complete. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: The ipa-client-install command was successful Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: The ipa-client-install command was successful Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: This program will set up FreeIPA client. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: This program will set up FreeIPA client. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Version 4.7.2 Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Version 4.7.2 Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: WARNING: conflicting time&date synchronization service 'ntp' will be disabled Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: WARNING: conflicting time&date synchronization service 'ntp' will be disabled Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: in favor of chronyd Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: in favor of chronyd Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Using default chrony configuration. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: Using default chrony configuration. Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: process exited: 8893 Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: * /usr/sbin/update-rc.d sssd enable Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: * /usr/sbin/update-rc.d sssd enable Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 25 09:54:54 x0.cockpit.lan realmd[7172]: process started: 9979 Nov 25 09:54:55 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:54:56 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:54:56 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:54:56 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:54:56 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:54:56 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:54:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:54:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:54:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:54:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:54:57 x0.cockpit.lan realmd[7172]: process exited: 9979 Nov 25 09:54:57 x0.cockpit.lan realmd[7172]: * /usr/sbin/service sssd restart Nov 25 09:54:57 x0.cockpit.lan realmd[7172]: * /usr/sbin/service sssd restart Nov 25 09:54:57 x0.cockpit.lan realmd[7172]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 25 09:54:57 x0.cockpit.lan realmd[7172]: process started: 10016 Nov 25 09:54:57 x0.cockpit.lan systemd[1]: Stopping System Security Services Daemon... Nov 25 09:54:57 x0.cockpit.lan sssd[9901]: Shutting down Nov 25 09:54:57 x0.cockpit.lan sssd[9902]: Shutting down Nov 25 09:54:57 x0.cockpit.lan sssd[9903]: Shutting down Nov 25 09:54:57 x0.cockpit.lan sssd[9904]: Shutting down Nov 25 09:54:57 x0.cockpit.lan sssd[9900]: Shutting down Nov 25 09:54:57 x0.cockpit.lan sssd[be[9899]: Shutting down Nov 25 09:54:57 x0.cockpit.lan kernel: kauditd_printk_skb: 11 callbacks suppressed Nov 25 09:54:57 x0.cockpit.lan kernel: audit: type=1400 audit(1574675697.569:50): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:57 x0.cockpit.lan audit[9899]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=9899 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:57 x0.cockpit.lan systemd[1]: sssd.service: Succeeded. Nov 25 09:54:57 x0.cockpit.lan systemd[1]: Stopped System Security Services Daemon. Nov 25 09:54:57 x0.cockpit.lan systemd[1]: Starting System Security Services Daemon... Nov 25 09:54:57 x0.cockpit.lan kernel: audit: type=1400 audit(1574675697.657:51): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=10020 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:57 x0.cockpit.lan audit[10020]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=10020 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:57 x0.cockpit.lan audit[10020]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=10020 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:57 x0.cockpit.lan kernel: audit: type=1400 audit(1574675697.673:52): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=10020 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan sssd[10020]: Starting up Nov 25 09:54:58 x0.cockpit.lan sssd[be[10025]: Starting up Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.333:53): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.349:54): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.389:55): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.417:56): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.417:57): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan sssd[10027]: Starting up Nov 25 09:54:58 x0.cockpit.lan sssd[10026]: Starting up Nov 25 09:54:58 x0.cockpit.lan sssd[10028]: Starting up Nov 25 09:54:58 x0.cockpit.lan sssd[10029]: Starting up Nov 25 09:54:58 x0.cockpit.lan audit[10026]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.649:58): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan sssd[10030]: Starting up Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan kernel: audit: type=1400 audit(1574675698.681:59): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10026]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10031]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10031 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10031]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10031 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10026]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10026]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10026]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10026]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=10026 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan sssd_be[10025]: GSSAPI client step 1 Nov 25 09:54:58 x0.cockpit.lan sssd_be[10025]: GSSAPI client step 1 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:54:58 x0.cockpit.lan sssd_be[10025]: GSSAPI client step 1 Nov 25 09:54:58 x0.cockpit.lan sssd_be[10025]: GSSAPI client step 2 Nov 25 09:54:59 x0.cockpit.lan systemd[1]: Started System Security Services Daemon. Nov 25 09:54:59 x0.cockpit.lan realmd[7172]: process exited: 10016 Nov 25 09:54:59 x0.cockpit.lan realmd[7172]: * Successfully enrolled machine in realm Nov 25 09:54:59 x0.cockpit.lan realmd[7172]: * Successfully enrolled machine in realm Nov 25 09:54:59 x0.cockpit.lan realmd[7172]: released daemon: current-invocation Nov 25 09:55:01 x0.cockpit.lan CRON[10040]: pam_unix(cron:session): session opened for user pcp by (uid=0) Nov 25 09:55:01 x0.cockpit.lan CRON[10041]: (pcp) CMD ( /usr/lib/pcp/bin/pmlogger_check -C) Nov 25 09:55:01 x0.cockpit.lan CRON[10040]: pam_unix(cron:session): session closed for user pcp Nov 25 09:55:03 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 1 Nov 25 09:55:03 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 1 Nov 25 09:55:04 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 1 Nov 25 09:55:04 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 2 Nov 25 09:55:10 x0.cockpit.lan certmonger[10430]: Certificate in file "/run/cockpit/ipa.crt" issued by CA and saved. Nov 25 09:55:11 x0.cockpit.lan su[10437]: (to admin) root on none Nov 25 09:55:11 x0.cockpit.lan su[10437]: pam_unix(su:session): session opened for user admin by (uid=0) Nov 25 09:55:11 x0.cockpit.lan su[10437]: pam_unix(su:session): session closed for user admin Nov 25 09:55:11 x0.cockpit.lan cockpit-ws[6519]: Logging out session from (null) Nov 25 09:55:11 x0.cockpit.lan realmd[7172]: client gone away: :1.33 Nov 25 09:55:11 x0.cockpit.lan realmd[7172]: released daemon: :1.33 Nov 25 09:55:11 x0.cockpit.lan cockpit-ws[6519]: WebSocket from (null) for session closed Nov 25 09:55:11 x0.cockpit.lan polkitd(authority=local)[369]: Unregistered Authentication Agent for unix-session:4 (system bus name :1.29, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:11 x0.cockpit.lan cockpit-session[6679]: pam_unix(cockpit:session): session closed for user admin Nov 25 09:55:11 x0.cockpit.lan systemd-logind[428]: Session 4 logged out. Waiting for processes to exit. Nov 25 09:55:11 x0.cockpit.lan systemd[1]: session-4.scope: Succeeded. Nov 25 09:55:11 x0.cockpit.lan systemd-logind[428]: Removed session 4. Nov 25 09:55:12 x0.cockpit.lan sshd[10452]: Authorized to admin@cockpit.lan, krb5 principal admin@COCKPIT.LAN (krb5_kuserok) Nov 25 09:55:13 x0.cockpit.lan kernel: kauditd_printk_skb: 12 callbacks suppressed Nov 25 09:55:13 x0.cockpit.lan kernel: audit: type=1400 audit(1574675713.149:72): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10454 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan audit[10454]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10454 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan kernel: audit: type=1400 audit(1574675713.165:73): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10454 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan audit[10454]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10454 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan sshd[10452]: Accepted gssapi-with-mic for admin@cockpit.lan from 10.111.113.1 port 33956 ssh2: admin@COCKPIT.LAN Nov 25 09:55:13 x0.cockpit.lan sshd[10452]: pam_unix(sshd:session): session opened for user admin@cockpit.lan by (uid=0) Nov 25 09:55:13 x0.cockpit.lan systemd-logind[428]: New session 7 of user admin@cockpit.lan. Nov 25 09:55:13 x0.cockpit.lan systemd[1]: Created slice User Slice of UID 1279600000. Nov 25 09:55:13 x0.cockpit.lan systemd[1]: Starting User Runtime Directory /run/user/1279600000... Nov 25 09:55:13 x0.cockpit.lan systemd[1]: Started User Runtime Directory /run/user/1279600000. Nov 25 09:55:13 x0.cockpit.lan systemd[1]: Starting User Manager for UID 1279600000... Nov 25 09:55:13 x0.cockpit.lan audit[10457]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10457 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan kernel: audit: type=1400 audit(1574675713.441:74): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10457 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: pam_unix(systemd-user:session): session opened for user admin@cockpit.lan by (uid=0) Nov 25 09:55:13 x0.cockpit.lan audit[10457]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10457 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan kernel: audit: type=1400 audit(1574675713.453:75): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10457 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 25 09:55:13 x0.cockpit.lan sshd[10452]: pam_unix(sshd:session): session closed for user admin@cockpit.lan Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Reached target Paths. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Listening on GnuPG network certificate management daemon. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Reached target Timers. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Starting D-Bus User Message Bus Socket. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Listening on D-Bus User Message Bus Socket. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Reached target Sockets. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Reached target Basic System. Nov 25 09:55:13 x0.cockpit.lan systemd[1]: Started User Manager for UID 1279600000. Nov 25 09:55:13 x0.cockpit.lan systemd[1]: Started Session 7 of user admin@cockpit.lan. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Reached target Default. Nov 25 09:55:13 x0.cockpit.lan systemd[10456]: Startup finished in 66ms. Nov 25 09:55:13 x0.cockpit.lan systemd-logind[428]: Session 7 logged out. Waiting for processes to exit. Nov 25 09:55:13 x0.cockpit.lan systemd[1]: session-7.scope: Succeeded. Nov 25 09:55:13 x0.cockpit.lan systemd-logind[428]: Removed session 7. Nov 25 09:55:14 x0.cockpit.lan audit[10479]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10479 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:14 x0.cockpit.lan kernel: audit: type=1400 audit(1574675714.273:76): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10479 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:14 x0.cockpit.lan audit[10479]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10479 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:14 x0.cockpit.lan kernel: audit: type=1400 audit(1574675714.285:77): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10479 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:14 x0.cockpit.lan cockpit-session[10478]: pam_ssh_add: Failed adding some keys Nov 25 09:55:14 x0.cockpit.lan cockpit-session[10478]: pam_unix(cockpit:session): session opened for user admin@cockpit.lan by (uid=0) Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Started Session 9 of user admin@cockpit.lan. Nov 25 09:55:14 x0.cockpit.lan systemd-logind[428]: New session 9 of user admin@cockpit.lan. Nov 25 09:55:14 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:9 (system bus name :1.50 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:14 x0.cockpit.lan cockpit-ws[6519]: logged in user session Nov 25 09:55:14 x0.cockpit.lan polkitd(authority=local)[369]: Unregistered Authentication Agent for unix-session:9 (system bus name :1.50, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service http instance... Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service... Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.service: Main process exited, code=killed, status=15/TERM Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.service: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service http instance. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit.service: Main process exited, code=killed, status=15/TERM Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit.service: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service. Nov 25 09:55:14 x0.cockpit.lan cockpit-session[10478]: pam_unix(cockpit:session): session closed for user admin@cockpit.lan Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https-factory.socket: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service https instance factory. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http-redirect.socket: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http-redirect instance. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service Socket. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.socket: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http instance. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: cockpit.socket: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Closed Cockpit Web Service Socket. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: session-9.scope: Succeeded. Nov 25 09:55:14 x0.cockpit.lan systemd-logind[428]: Session 9 logged out. Waiting for processes to exit. Nov 25 09:55:14 x0.cockpit.lan systemd-logind[428]: Removed session 9. Nov 25 09:55:14 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service Socket. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Listening on Cockpit Web Service Socket. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 25 09:55:15 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http-redirect instance. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance factory. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http instance. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http-redirect instance. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http instance. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service... Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Started Cockpit Web Service. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Created slice system-cockpit\x2dwsinstance\x2dhttps\x2dfactory.slice. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Started Cockpit Web Service https instance factory (PID 10537/UID 113). Nov 25 09:55:15 x0.cockpit.lan systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Created slice Resource limits for all cockpit-ws-https@.service instances. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Created slice system-cockpit\x2dwsinstance\x2dhttps.slice. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: Started Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 25 09:55:15 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https-factory@0-10537-113.service: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855... Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service... Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit.service: Main process exited, code=killed, status=15/TERM Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit.service: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https@e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.service: Main process exited, code=killed, status=15/TERM Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https@e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.service: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https@e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.socket: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http-redirect.socket: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http-redirect instance. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https-factory.socket: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service https instance factory. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.socket: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http instance. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service Socket. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit.socket: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Closed Cockpit Web Service Socket. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service Socket. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Listening on Cockpit Web Service Socket. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 25 09:55:16 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 25 09:55:16 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 25 09:55:17 x0.cockpit.lan audit[10599]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10599 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan kernel: audit: type=1400 audit(1574675717.041:78): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10599 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan su[10595]: (to admin@cockpit.lan) root on none Nov 25 09:55:17 x0.cockpit.lan su[10595]: pam_unix(su-l:session): session opened for user admin@cockpit.lan by (uid=0) Nov 25 09:55:17 x0.cockpit.lan audit[10599]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10599 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan kernel: audit: type=1400 audit(1574675717.053:79): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10599 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan sudo[10603]: pam_unix(sudo:auth): authentication failure; logname= uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 25 09:55:17 x0.cockpit.lan audit[10604]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10604 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan kernel: audit: type=1400 audit(1574675717.349:80): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10604 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan audit[10604]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10604 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan kernel: audit: type=1400 audit(1574675717.361:81): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10604 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:17 x0.cockpit.lan sudo[10603]: pam_sss(sudo:auth): authentication success; logname= uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 25 09:55:18 x0.cockpit.lan audit[10606]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10606 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:18 x0.cockpit.lan audit[10606]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10606 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:18 x0.cockpit.lan sudo[10603]: admin@cockpit.lan : TTY=unknown ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/true Nov 25 09:55:18 x0.cockpit.lan sudo[10603]: pam_unix(sudo:session): session opened for user root by (uid=0) Nov 25 09:55:18 x0.cockpit.lan sudo[10603]: pam_unix(sudo:session): session closed for user root Nov 25 09:55:18 x0.cockpit.lan su[10595]: pam_unix(su-l:session): session closed for user admin@cockpit.lan Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance factory. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http-redirect instance. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http instance. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http-redirect instance. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http instance. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service... Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Started Cockpit Web Service. Nov 25 09:55:18 x0.cockpit.lan systemd[1]: Started Cockpit Web Service http instance. Nov 25 09:55:19 x0.cockpit.lan cockpit-session[10654]: pam_unix(cockpit:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=admin@cockpit.lan Nov 25 09:55:19 x0.cockpit.lan kernel: kauditd_printk_skb: 2 callbacks suppressed Nov 25 09:55:19 x0.cockpit.lan kernel: audit: type=1400 audit(1574675719.309:84): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10655 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:19 x0.cockpit.lan audit[10655]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10655 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:19 x0.cockpit.lan audit[10655]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10655 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:19 x0.cockpit.lan kernel: audit: type=1400 audit(1574675719.333:85): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10655 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:19 x0.cockpit.lan audit[10655]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=10655 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:19 x0.cockpit.lan kernel: audit: type=1400 audit(1574675719.337:86): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=10655 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:19 x0.cockpit.lan cockpit-session[10654]: pam_sss(cockpit:auth): authentication success; logname= uid=0 euid=0 tty= ruser= rhost= user=admin@cockpit.lan Nov 25 09:55:20 x0.cockpit.lan audit[10656]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10656 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:20 x0.cockpit.lan kernel: audit: type=1400 audit(1574675720.133:87): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10656 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:20 x0.cockpit.lan audit[10656]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10656 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:20 x0.cockpit.lan kernel: audit: type=1400 audit(1574675720.141:88): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10656 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:20 x0.cockpit.lan cockpit-session[10654]: pam_ssh_add: Failed adding some keys Nov 25 09:55:20 x0.cockpit.lan cockpit-session[10654]: pam_unix(cockpit:session): session opened for user admin@cockpit.lan by (uid=0) Nov 25 09:55:20 x0.cockpit.lan systemd-logind[428]: New session 10 of user admin@cockpit.lan. Nov 25 09:55:20 x0.cockpit.lan systemd[1]: Started Session 10 of user admin@cockpit.lan. Nov 25 09:55:20 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:10 (system bus name :1.56 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:20 x0.cockpit.lan cockpit-ws[10650]: logged in user session Nov 25 09:55:20 x0.cockpit.lan cockpit-ws[10650]: New connection to session Nov 25 09:55:20 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.57' (uid=1279600000 pid=10662 comm="cockpit-bridge ") Nov 25 09:55:20 x0.cockpit.lan systemd[1]: Starting Hostname Service... Nov 25 09:55:20 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 25 09:55:20 x0.cockpit.lan systemd[1]: Started Hostname Service. Nov 25 09:55:21 x0.cockpit.lan systemd[1]: Stopping User Manager for UID 1002... Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Stopped target Default. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Stopped target Basic System. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Stopped target Paths. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Stopped target Timers. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Stopped target Sockets. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: gpg-agent-browser.socket: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Closed GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: dirmngr.socket: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Closed GnuPG network certificate management daemon. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: gpg-agent.socket: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Closed GnuPG cryptographic agent and passphrase cache. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: dbus.socket: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Closed D-Bus User Message Bus Socket. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: gpg-agent-ssh.socket: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Closed GnuPG cryptographic agent (ssh-agent emulation). Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: gpg-agent-extra.socket: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Closed GnuPG cryptographic agent and passphrase cache (restricted). Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Reached target Shutdown. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: systemd-exit.service: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Started Exit the Session. Nov 25 09:55:21 x0.cockpit.lan systemd[6715]: Reached target Exit the Session. Nov 25 09:55:21 x0.cockpit.lan realmd[7172]: client using service: :1.59 Nov 25 09:55:21 x0.cockpit.lan realmd[7172]: holding daemon: :1.59 Nov 25 09:55:21 x0.cockpit.lan systemd[1]: user@1002.service: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[1]: Stopped User Manager for UID 1002. Nov 25 09:55:21 x0.cockpit.lan systemd[1]: Stopping User Runtime Directory /run/user/1002... Nov 25 09:55:21 x0.cockpit.lan systemd[1]: run-user-1002.mount: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[1075]: run-user-1002.mount: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[10456]: run-user-1002.mount: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[1]: user-runtime-dir@1002.service: Succeeded. Nov 25 09:55:21 x0.cockpit.lan systemd[1]: Stopped User Runtime Directory /run/user/1002. Nov 25 09:55:21 x0.cockpit.lan systemd[1]: Removed slice User Slice of UID 1002. Nov 25 09:55:21 x0.cockpit.lan cockpit-bridge[10662]: cannot reauthorize identity(s): unix-user:debian unix-user:admin Nov 25 09:55:21 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:10 FAILED to authenticate to gain authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:10662:26892 [cockpit-bridge] (owned by unix-user:admin@cockpit.lan) Nov 25 09:55:21 x0.cockpit.lan pkexec[10670]: admin@cockpit.lan: Error executing command as another user: Not authorized [USER=root] [TTY=unknown] [CWD=/run/user/1279600000] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 25 09:55:21 x0.cockpit.lan cockpit-bridge[10662]: Error executing command as another user: Not authorized Nov 25 09:55:21 x0.cockpit.lan cockpit-bridge[10662]: This incident has been reported. Nov 25 09:55:21 x0.cockpit.lan sudo[10683]: pam_unix(sudo:auth): authentication failure; logname=admin@cockpit.lan uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 25 09:55:21 x0.cockpit.lan audit[10685]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10685 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:21 x0.cockpit.lan kernel: audit: type=1400 audit(1574675721.913:89): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10685 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:21 x0.cockpit.lan audit[10685]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10685 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:21 x0.cockpit.lan kernel: audit: type=1400 audit(1574675721.929:90): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10685 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:21 x0.cockpit.lan kernel: audit: type=1400 audit(1574675721.929:91): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=10685 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:21 x0.cockpit.lan audit[10685]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=10685 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:22 x0.cockpit.lan sudo[10683]: pam_sss(sudo:auth): authentication success; logname=admin@cockpit.lan uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 25 09:55:22 x0.cockpit.lan audit[10686]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10686 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:22 x0.cockpit.lan kernel: audit: type=1400 audit(1574675722.309:92): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=10686 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:22 x0.cockpit.lan sudo[10683]: admin@cockpit.lan : TTY=unknown ; PWD=/run/user/1279600000 ; USER=root ; COMMAND=/usr/bin/cockpit-bridge --privileged Nov 25 09:55:22 x0.cockpit.lan sudo[10683]: pam_unix(sudo:session): session opened for user root by admin@cockpit.lan(uid=0) Nov 25 09:55:22 x0.cockpit.lan audit[10686]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10686 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:22 x0.cockpit.lan kernel: audit: type=1400 audit(1574675722.321:93): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=10686 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:24 x0.cockpit.lan PackageKit[7195]: get-updates transaction /5_bcdacdee from uid 0 finished with success after 1581ms Nov 25 09:55:25 x0.cockpit.lan systemd[1]: systemd-tmpfiles-clean.timer: Succeeded. Nov 25 09:55:25 x0.cockpit.lan systemd[1]: Stopped Daily Cleanup of Temporary Directories. Nov 25 09:55:26 x0.cockpit.lan cockpit-ws[10650]: Logging out session from (null) Nov 25 09:55:26 x0.cockpit.lan cockpit-ws[10650]: WebSocket from (null) for session closed Nov 25 09:55:26 x0.cockpit.lan realmd[7172]: client gone away: :1.59 Nov 25 09:55:26 x0.cockpit.lan realmd[7172]: released daemon: :1.59 Nov 25 09:55:26 x0.cockpit.lan polkitd(authority=local)[369]: Unregistered Authentication Agent for unix-session:10 (system bus name :1.56, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:26 x0.cockpit.lan cockpit-session[10654]: pam_unix(cockpit:session): session closed for user admin@cockpit.lan Nov 25 09:55:26 x0.cockpit.lan sudo[10683]: pam_unix(sudo:session): session closed for user root Nov 25 09:55:26 x0.cockpit.lan systemd[1]: session-10.scope: Succeeded. Nov 25 09:55:27 x0.cockpit.lan cockpit-session[10714]: pam_ssh_add: Failed adding some keys Nov 25 09:55:27 x0.cockpit.lan cockpit-session[10714]: pam_unix(cockpit:session): session opened for user admin by (uid=0) Nov 25 09:55:27 x0.cockpit.lan systemd-logind[428]: Session 10 logged out. Waiting for processes to exit. Nov 25 09:55:27 x0.cockpit.lan systemd-logind[428]: Removed session 10. Nov 25 09:55:27 x0.cockpit.lan systemd[1]: Created slice User Slice of UID 1002. Nov 25 09:55:27 x0.cockpit.lan systemd-logind[428]: New session 11 of user admin. Nov 25 09:55:27 x0.cockpit.lan systemd[1]: Starting User Runtime Directory /run/user/1002... Nov 25 09:55:27 x0.cockpit.lan systemd[1]: Started User Runtime Directory /run/user/1002. Nov 25 09:55:27 x0.cockpit.lan systemd[1]: Starting User Manager for UID 1002... Nov 25 09:55:27 x0.cockpit.lan systemd[10721]: pam_unix(systemd-user:session): session opened for user admin by (uid=0) Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Reached target Timers. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Starting D-Bus User Message Bus Socket. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Reached target Paths. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Listening on GnuPG network certificate management daemon. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Listening on D-Bus User Message Bus Socket. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Reached target Sockets. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Reached target Basic System. Nov 25 09:55:28 x0.cockpit.lan systemd[1]: Started User Manager for UID 1002. Nov 25 09:55:28 x0.cockpit.lan systemd[1]: Started Session 11 of user admin. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Reached target Default. Nov 25 09:55:28 x0.cockpit.lan systemd[10721]: Startup finished in 66ms. Nov 25 09:55:28 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:11 (system bus name :1.69 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:28 x0.cockpit.lan cockpit-ws[10650]: logged in user session Nov 25 09:55:28 x0.cockpit.lan cockpit-ws[10650]: New connection to session Nov 25 09:55:29 x0.cockpit.lan realmd[7172]: client using service: :1.72 Nov 25 09:55:29 x0.cockpit.lan realmd[7172]: holding daemon: :1.72 Nov 25 09:55:29 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:11 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:10732:27675 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:55:29 x0.cockpit.lan pkexec[10739]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 25 09:55:29 x0.cockpit.lan pkexec[10739]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 25 09:55:30 x0.cockpit.lan sshd[10768]: Accepted keyboard-interactive/pam for admin from 10.111.113.1 port 34006 ssh2 Nov 25 09:55:30 x0.cockpit.lan sshd[10768]: pam_unix(sshd:session): session opened for user admin by (uid=0) Nov 25 09:55:31 x0.cockpit.lan PackageKit[7195]: get-updates transaction /7_ccdbaeec from uid 0 finished with success after 1329ms Nov 25 09:55:31 x0.cockpit.lan systemd-logind[428]: New session 13 of user admin. Nov 25 09:55:31 x0.cockpit.lan systemd[1]: Started Session 13 of user admin. Nov 25 09:55:32 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:13 (system bus name :1.79 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:34 x0.cockpit.lan cockpit-ws[10650]: Logging out session from (null) Nov 25 09:55:34 x0.cockpit.lan cockpit-ws[10650]: WebSocket from (null) for session closed Nov 25 09:55:34 x0.cockpit.lan realmd[7172]: client gone away: :1.72 Nov 25 09:55:34 x0.cockpit.lan realmd[7172]: released daemon: :1.72 Nov 25 09:55:34 x0.cockpit.lan polkitd(authority=local)[369]: Unregistered Authentication Agent for unix-session:11 (system bus name :1.69, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:34 x0.cockpit.lan cockpit-session[10714]: pam_unix(cockpit:session): session closed for user admin Nov 25 09:55:34 x0.cockpit.lan realmd[7172]: client using service: :1.82 Nov 25 09:55:34 x0.cockpit.lan realmd[7172]: holding daemon: :1.82 Nov 25 09:55:34 x0.cockpit.lan systemd-logind[428]: Session 11 logged out. Waiting for processes to exit. Nov 25 09:55:34 x0.cockpit.lan polkitd(authority=local)[369]: Unregistered Authentication Agent for unix-session:13 (system bus name :1.79, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:34 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:13 FAILED to authenticate to gain authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:10781:28057 [] (owned by unix-user:admin) Nov 25 09:55:34 x0.cockpit.lan realmd[7172]: client gone away: :1.82 Nov 25 09:55:34 x0.cockpit.lan realmd[7172]: released daemon: :1.82 Nov 25 09:55:34 x0.cockpit.lan cockpit-session[10802]: pam_ssh_add: Failed adding some keys Nov 25 09:55:34 x0.cockpit.lan cockpit-session[10802]: pam_unix(cockpit:session): session opened for user admin by (uid=0) Nov 25 09:55:34 x0.cockpit.lan systemd[1]: Started Session 14 of user admin. Nov 25 09:55:34 x0.cockpit.lan systemd-logind[428]: New session 14 of user admin. Nov 25 09:55:34 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:14 (system bus name :1.86 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:35 x0.cockpit.lan cockpit-ws[10650]: logged in user session Nov 25 09:55:35 x0.cockpit.lan cockpit-ws[10650]: New connection to session Nov 25 09:55:35 x0.cockpit.lan sshd[10818]: Accepted keyboard-interactive/pam for admin from 10.111.113.1 port 34012 ssh2 Nov 25 09:55:35 x0.cockpit.lan sshd[10818]: pam_unix(sshd:session): session opened for user admin by (uid=0) Nov 25 09:55:35 x0.cockpit.lan systemd[1]: Started Session 15 of user admin. Nov 25 09:55:35 x0.cockpit.lan systemd-logind[428]: New session 15 of user admin. Nov 25 09:55:35 x0.cockpit.lan polkitd(authority=local)[369]: Registered Authentication Agent for unix-session:15 (system bus name :1.89 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 25 09:55:36 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:14 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:10808:28360 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:55:36 x0.cockpit.lan pkexec[10834]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 25 09:55:36 x0.cockpit.lan pkexec[10834]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 25 09:55:36 x0.cockpit.lan realmd[7172]: client using service: :1.94 Nov 25 09:55:36 x0.cockpit.lan realmd[7172]: holding daemon: :1.94 Nov 25 09:55:37 x0.cockpit.lan realmd[7172]: client using service: :1.99 Nov 25 09:55:37 x0.cockpit.lan realmd[7172]: holding daemon: :1.99 Nov 25 09:55:37 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:15 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:10826:28445 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:55:37 x0.cockpit.lan pkexec[10854]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 25 09:55:37 x0.cockpit.lan pkexec[10854]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: Using 'cockpit-1' operation for method 'Deconfigure' invocation on 'org.freedesktop.realmd.Realm' interface Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: Registered cancellable for operation 'cockpit-1' Nov 25 09:55:38 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:14 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.deconfigure-realm for system-bus-name::1.94 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: holding daemon: current-invocation Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: * LANG=C /usr/sbin/ipa-client-install --uninstall --unattended Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: * LANG=C /usr/sbin/ipa-client-install --uninstall --unattended Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 25 09:55:38 x0.cockpit.lan realmd[7172]: process started: 10886 Nov 25 09:55:40 x0.cockpit.lan PackageKit[7195]: get-updates transaction /9_cdedaebc from uid 0 finished with success after 3155ms Nov 25 09:55:40 x0.cockpit.lan systemd[1]: Stopping User Manager for UID 1279600000... Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Stopped target Default. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Stopped target Basic System. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Stopped target Timers. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Stopped target Sockets. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: dbus.socket: Succeeded. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Closed D-Bus User Message Bus Socket. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: dirmngr.socket: Succeeded. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Closed GnuPG network certificate management daemon. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: gpg-agent-extra.socket: Succeeded. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Closed GnuPG cryptographic agent and passphrase cache (restricted). Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: gpg-agent-ssh.socket: Succeeded. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Closed GnuPG cryptographic agent (ssh-agent emulation). Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: gpg-agent.socket: Succeeded. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Closed GnuPG cryptographic agent and passphrase cache. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Stopped target Paths. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: gpg-agent-browser.socket: Succeeded. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Closed GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: Reached target Shutdown. Nov 25 09:55:40 x0.cockpit.lan systemd[10456]: systemd-exit.service: Succeeded. Nov 25 09:55:41 x0.cockpit.lan systemd[10456]: Started Exit the Session. Nov 25 09:55:41 x0.cockpit.lan systemd[10456]: Reached target Exit the Session. Nov 25 09:55:41 x0.cockpit.lan systemd[1]: user@1279600000.service: Succeeded. Nov 25 09:55:41 x0.cockpit.lan systemd[1]: Stopped User Manager for UID 1279600000. Nov 25 09:55:41 x0.cockpit.lan systemd[1]: Stopping User Runtime Directory /run/user/1279600000... Nov 25 09:55:41 x0.cockpit.lan systemd[1]: run-user-1279600000.mount: Succeeded. Nov 25 09:55:41 x0.cockpit.lan systemd[10721]: run-user-1279600000.mount: Succeeded. Nov 25 09:55:41 x0.cockpit.lan systemd[1075]: run-user-1279600000.mount: Succeeded. Nov 25 09:55:41 x0.cockpit.lan systemd[1]: user-runtime-dir@1279600000.service: Succeeded. Nov 25 09:55:41 x0.cockpit.lan systemd[1]: Stopped User Runtime Directory /run/user/1279600000. Nov 25 09:55:41 x0.cockpit.lan systemd[1]: Removed slice User Slice of UID 1279600000. Nov 25 09:55:45 x0.cockpit.lan PackageKit[7195]: get-updates transaction /10_dcbbbcea from uid 0 finished with success after 4446ms Nov 25 09:55:48 x0.cockpit.lan systemd[1]: Stopping Certificate monitoring and PKI enrollment... Nov 25 09:55:48 x0.cockpit.lan systemd[1]: certmonger.service: Succeeded. Nov 25 09:55:48 x0.cockpit.lan systemd[1]: Stopped Certificate monitoring and PKI enrollment. Nov 25 09:55:48 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:49 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:49 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:49 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:49 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:49 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:50 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:50 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:50 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:50 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:51 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:51 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:51 x0.cockpit.lan realmd[7172]: Unenrolling client from IPA server Nov 25 09:55:51 x0.cockpit.lan realmd[7172]: Unenrolling client from IPA server Nov 25 09:55:54 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:54 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Unenrolling host failed: No permission to join this host to the IPA domain. Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Unenrolling host failed: No permission to join this host to the IPA domain. Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Removing Kerberos service principals from /etc/krb5.keytab Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Removing Kerberos service principals from /etc/krb5.keytab Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Disabling client Kerberos and LDAP configurations Nov 25 09:55:55 x0.cockpit.lan realmd[7172]: Disabling client Kerberos and LDAP configurations Nov 25 09:55:56 x0.cockpit.lan realmd[7172]: Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted Nov 25 09:55:56 x0.cockpit.lan realmd[7172]: Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted Nov 25 09:55:56 x0.cockpit.lan systemd[1]: Stopping System Security Services Daemon... Nov 25 09:55:56 x0.cockpit.lan sssd[10027]: Shutting down Nov 25 09:55:57 x0.cockpit.lan sssd[be[10025]: Shutting down Nov 25 09:55:57 x0.cockpit.lan sssd[10028]: Shutting down Nov 25 09:55:57 x0.cockpit.lan sssd[10030]: Shutting down Nov 25 09:55:57 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:57 x0.cockpit.lan kernel: audit: type=1400 audit(1574675757.037:94): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:57 x0.cockpit.lan sssd[10026]: Shutting down Nov 25 09:55:57 x0.cockpit.lan sssd[10029]: Shutting down Nov 25 09:55:57 x0.cockpit.lan audit[10025]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:57 x0.cockpit.lan kernel: audit: type=1400 audit(1574675757.089:95): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=10025 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 25 09:55:57 x0.cockpit.lan systemd[1]: sssd.service: Succeeded. Nov 25 09:55:57 x0.cockpit.lan systemd[1]: Stopped System Security Services Daemon. Nov 25 09:55:57 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:55:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:55:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:55:57 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:55:58 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.fedorahosted.certmonger' unit='certmonger.service' requested by ':1.108' (uid=0 pid=11033 comm="ipa-getcert list ") Nov 25 09:56:01 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:56:02 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:56:02 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:56:02 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:56:02 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:56:02 x0.cockpit.lan systemd[1]: Reloading. Nov 25 09:56:03 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 25 09:56:03 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 25 09:56:03 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:56:03 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 25 09:56:03 x0.cockpit.lan realmd[7172]: Restoring client configuration files Nov 25 09:56:03 x0.cockpit.lan realmd[7172]: Restoring client configuration files Nov 25 09:56:04 x0.cockpit.lan systemd[1]: Starting Certificate monitoring and PKI enrollment... Nov 25 09:56:04 x0.cockpit.lan realmd[7172]: Unconfiguring the NIS domain. Nov 25 09:56:04 x0.cockpit.lan realmd[7172]: Unconfiguring the NIS domain. Nov 25 09:56:04 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.fedorahosted.certmonger' Nov 25 09:56:05 x0.cockpit.lan systemd[1]: Started Certificate monitoring and PKI enrollment. Nov 25 09:56:05 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Searching for (objectClass=*) Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Got server software: ipa Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Got associatedDomain: cockpit.lan Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: Found realm: COCKPIT.LAN Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:07 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Using 'cockpit-1' operation for method 'Join' invocation on 'org.freedesktop.realmd.KerberosMembership' interface Nov 25 09:56:08 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:14 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.configure-realm for system-bus-name::1.94 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Searching for (objectClass=*) Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Got server software: ipa Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Got associatedDomain: cockpit.lan Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: Found realm: COCKPIT.LAN Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:08 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:09 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:56:09 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:56:09 x0.cockpit.lan systemd[1]: systemd-hostnamed.service: Succeeded. Nov 25 09:56:09 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 25 09:56:09 x0.cockpit.lan realmd[7172]: nscd daemon is not installed, skip configuration Nov 25 09:56:09 x0.cockpit.lan realmd[7172]: nscd daemon is not installed, skip configuration Nov 25 09:56:09 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.nope Nov 25 09:56:09 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.nope Nov 25 09:56:10 x0.cockpit.lan realmd[7172]: nslcd daemon is not installed, skip configuration Nov 25 09:56:10 x0.cockpit.lan realmd[7172]: nslcd daemon is not installed, skip configuration Nov 25 09:56:11 x0.cockpit.lan systemd[1]: Stopping OpenBSD Secure Shell server... Nov 25 09:56:11 x0.cockpit.lan sshd[9972]: Received signal 15; terminating. Nov 25 09:56:11 x0.cockpit.lan systemd[1]: ssh.service: Succeeded. Nov 25 09:56:11 x0.cockpit.lan systemd[1]: Stopped OpenBSD Secure Shell server. Nov 25 09:56:11 x0.cockpit.lan systemd[1]: Starting OpenBSD Secure Shell server... Nov 25 09:56:11 x0.cockpit.lan sshd[11139]: Server listening on 0.0.0.0 port 22. Nov 25 09:56:11 x0.cockpit.lan sshd[11139]: Server listening on :: port 22. Nov 25 09:56:11 x0.cockpit.lan systemd[1]: Started OpenBSD Secure Shell server. Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: Some installation state for ntp has not been restored, see /var/lib/ipa/sysrestore/sysrestore.state Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: Some installation state for ntp has not been restored, see /var/lib/ipa/sysrestore/sysrestore.state Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: Some installation state has not been restored. Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: Some installation state has not been restored. Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: This may cause re-installation to fail. Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: This may cause re-installation to fail. Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: It should be safe to remove /var/lib/ipa-client/sysrestore.state but it may Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: It should be safe to remove /var/lib/ipa-client/sysrestore.state but it may Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: mean your system hasn't been restored to its pre-installation state. Nov 25 09:56:11 x0.cockpit.lan realmd[7172]: mean your system hasn't been restored to its pre-installation state. Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: Systemwide CA database updated. Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: Systemwide CA database updated. Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: Client uninstall complete. Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: Client uninstall complete. Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: The ipa-client-install command failed. See /var/log/ipaclient-uninstall.log for more information Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: The ipa-client-install command failed. See /var/log/ipaclient-uninstall.log for more information Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: process exited: 10886 Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: ! Running ipa-client-install failed Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: ! Running ipa-client-install failed Nov 25 09:56:13 x0.cockpit.lan realmd[7172]: released daemon: current-invocation Nov 25 09:56:19 x0.cockpit.lan realmd[7172]: Temporarily unable to resolve “_ldap._tcp.nope” Nov 25 09:56:19 x0.cockpit.lan realmd[7172]: * Resolving: nope Nov 25 09:56:19 x0.cockpit.lan realmd[7172]: * Resolving: nope Nov 25 09:56:19 x0.cockpit.lan realmd[7172]: Resolving nope failed: Temporarily unable to resolve “_kerberos._udp.nope” Nov 25 09:56:19 x0.cockpit.lan realmd[7172]: Resolving nope failed: Temporarily unable to resolve “_kerberos._udp.nope” Nov 25 09:56:25 x0.cockpit.lan realmd[7172]: ! Discovery timed out after 15 seconds Nov 25 09:56:25 x0.cockpit.lan realmd[7172]: ! Discovery timed out after 15 seconds Nov 25 09:56:25 x0.cockpit.lan realmd[7172]: ! Discovery timed out after 15 seconds Nov 25 09:56:25 x0.cockpit.lan realmd[7172]: ! Discovery timed out after 15 seconds Nov 25 09:56:29 x0.cockpit.lan realmd[7172]: Error resolving “nope”: Temporary failure in name resolution Nov 25 09:56:29 x0.cockpit.lan realmd[7172]: * No results: nope Nov 25 09:56:29 x0.cockpit.lan realmd[7172]: * No results: nope Nov 25 09:56:29 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:56:29 x0.cockpit.lan realmd[7172]: * No default domain received via DHCP Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Searching for (objectClass=*) Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Got server software: ipa Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Got associatedDomain: cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Found realm: COCKPIT.LAN Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Using 'cockpit-1' operation for method 'Join' invocation on 'org.freedesktop.realmd.KerberosMembership' interface Nov 25 09:56:30 x0.cockpit.lan polkitd(authority=local)[369]: Operator of unix-session:14 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.configure-realm for system-bus-name::1.94 [cockpit-bridge] (owned by unix-user:admin) Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: holding daemon: current-invocation Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Unconditionally checking packages Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Unconditionally checking packages Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Resolving required packages Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Resolving required packages Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: packages: CreateTransaction call Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: packages: SetHints call Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: packages: call Resolve (262144, ['freeipa-client', 'sssd-tools', 'sssd', 'libnss-sss', 'libpam-sss']) Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: packages: call Resolve completed Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Cancelling operation 'cockpit-1' Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Resolving: _ldap._tcp.cockpit.lan Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 25 09:56:30 x0.cockpit.lan realmd[7172]: Searching for (objectClass=*) Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: Got server software: ipa Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: Got associatedDomain: cockpit.lan Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: Found realm: COCKPIT.LAN Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: * Successfully discovered: cockpit.lan Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'freeipa-client;4.7.2-3;amd64;installed:debian-stable-main', 'FreeIPA centralized identity framework -- client') Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'libnss-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Nss library for the System Security Services Daemon') Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'libpam-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Pam module for the System Security Services Daemon') Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'sssd;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- metapackage') Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: signal: Package (1, 'sssd-tools;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- tools') Nov 25 09:56:31 x0.cockpit.lan PackageKit[7195]: resolve transaction /13_dcaabbba from uid 0 finished with success after 739ms Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: signal: Finished (1, 739) Nov 25 09:56:31 x0.cockpit.lan realmd[7172]: packages: freeing transtaction Nov 25 09:56:35 x0.cockpit.lan cockpit-ws[10650]: cockpit-session: session timed out during authentication Nov 25 09:56:35 x0.cockpit.lan cockpit-ws[10650]: cockpit-session: didn't receive expected "authorize" message Nov 25 09:56:35 x0.cockpit.lan cockpit-ws[10650]: cockpit-session: authentication timed out Nov 25 09:56:35 x0.cockpit.lan cockpit-ws[10650]: ignoring failure from session process: Authentication failed: Timeout