-- Logs begin at Thu 2019-11-21 19:52:28 UTC, end at Thu 2019-11-21 20:04:00 UTC. -- Nov 21 19:52:28 debian sshd[3453]: Received disconnect from 172.27.0.2 port 35798:11: disconnected by user Nov 21 19:52:29 debian dockerd[907]: time="2019-11-21T19:52:28.937388900Z" level=info msg="Processing signal 'terminated'" Nov 21 19:52:29 debian dockerd[907]: time="2019-11-21T19:52:28.944391890Z" level=info msg="stopping event stream following graceful shutdown" error="context canceled" module=libcontainerd namespace=moby Nov 21 19:52:29 debian dockerd[907]: time="2019-11-21T19:52:28.944576043Z" level=info msg="stopping healthcheck following graceful shutdown" module=libcontainerd Nov 21 19:52:29 debian dockerd[907]: time="2019-11-21T19:52:28.944705324Z" level=info msg="stopping event stream following graceful shutdown" error="context canceled" module=libcontainerd namespace=plugins.moby Nov 21 19:52:29 debian dockerd[907]: time="2019-11-21T19:52:28.952444472Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0008f45b0, TRANSIENT_FAILURE" module=grpc Nov 21 19:52:29 debian dockerd[907]: time="2019-11-21T19:52:28.952575016Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0008f45b0, CONNECTING" module=grpc Nov 21 19:52:28 debian systemd-logind[567]: Power key pressed. Nov 21 19:52:28 debian sshd[3453]: Disconnected from user root 172.27.0.2 port 35798 Nov 21 19:52:28 debian systemd-logind[567]: Powering Off... Nov 21 19:52:28 debian sshd[3453]: pam_unix(sshd:session): session closed for user root Nov 21 19:52:29 debian exim4[10713]: Stopping MTA: exim4_listener. Nov 21 19:52:28 debian systemd-logind[567]: Session 3 logged out. Waiting for processes to exit. Nov 21 19:52:28 debian blkmapd[297]: exit on signal(15) Nov 21 19:52:29 debian pmlogger[10717]: Stopping pmlogger ... Nov 21 19:52:28 debian systemd-logind[567]: System is powering down. Nov 21 19:52:28 debian chronyd[894]: chronyd exiting Nov 21 19:52:28 debian systemd[1]: unattended-upgrades.service: Succeeded. Nov 21 19:52:28 debian sshd[883]: Received signal 15; terminating. Nov 21 19:52:28 debian systemd[1]: Stopping pNFS block layout mapping daemon... Nov 21 19:52:28 debian ModemManager[387]: Caught signal, shutting down... Nov 21 19:52:29 debian blkdeactivate[10718]: Deactivating block devices: Nov 21 19:52:28 debian systemd[1]: session-3.scope: Killing process 27300 (ssh-agent) with signal SIGTERM. Nov 21 19:52:28 debian ModemManager[387]: ModemManager is shut down Nov 21 19:52:28 debian systemd[1]: Stopping Session 3 of user root. Nov 21 19:52:28 debian rsyslogd[389]: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="389" x-info="https://www.rsyslog.com"] exiting on signal 15. Nov 21 19:52:28 debian systemd[1]: Stopped target RPC Port Mapper. Nov 21 19:52:29 debian libvirt-guests.sh[10712]: Running guests on default URI: no running guests. Nov 21 19:52:28 debian systemd[1]: lvm2-lvmpolld.socket: Succeeded. Nov 21 19:52:28 debian systemd[1]: Closed LVM2 poll daemon socket. Nov 21 19:52:28 debian systemd[1]: Stopping Dynamic System Tuning Daemon... Nov 21 19:52:28 debian systemd[1]: Stopped target Graphical Interface. Nov 21 19:52:28 debian systemd[1]: Stopped target Multi-User System. Nov 21 19:52:28 debian systemd[1]: Stopping Suspend/Resume Running libvirt Guests... Nov 21 19:52:28 debian systemd[1]: Stopping Docker Application Container Engine... Nov 21 19:52:28 debian systemd[1]: Stopping privileged operations for unprivileged applications... Nov 21 19:52:28 debian systemd[1]: Stopping System Logging Service... Nov 21 19:52:28 debian systemd[1]: Stopping LSB: exim Mail Transport Agent... Nov 21 19:52:28 debian systemd[1]: Stopping Regular background program processing daemon... Nov 21 19:52:28 debian systemd[1]: Stopping OpenBSD Secure Shell server... Nov 21 19:52:28 debian systemd[1]: Stopping Certificate monitoring and PKI enrollment... Nov 21 19:52:28 debian systemd[1]: Stopped target Login Prompts. Nov 21 19:52:28 debian systemd[1]: Stopping Getty on tty1... Nov 21 19:52:28 debian systemd[1]: Stopping Modem Manager... Nov 21 19:52:28 debian systemd[1]: Stopping LSB: Control pmie (performance inference engine for PCP)... Nov 21 19:52:28 debian systemd[1]: Stopping LSB: Control pmcd (the collection daemon for PCP)... Nov 21 19:52:28 debian systemd[1]: Stopping LSB: Control pmproxy (the pmcd proxy daemon for PCP)... Nov 21 19:52:28 debian systemd[1]: Stopped target Timers. Nov 21 19:52:28 debian systemd[1]: apt-daily-upgrade.timer: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Daily apt upgrade and clean activities. Nov 21 19:52:28 debian systemd[1]: systemd-tmpfiles-clean.timer: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Daily Cleanup of Temporary Directories. Nov 21 19:52:28 debian systemd[1]: man-db.timer: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Daily man-db regeneration. Nov 21 19:52:28 debian systemd[1]: logrotate.timer: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Daily rotation of log files. Nov 21 19:52:28 debian systemd[1]: Stopping chrony, an NTP client/server... Nov 21 19:52:28 debian systemd[1]: Stopping Disk Manager... Nov 21 19:52:28 debian systemd[1]: Stopping Deferred execution scheduler... Nov 21 19:52:28 debian systemd[1]: Stopping Serial Getty on ttyS0... Nov 21 19:52:28 debian systemd[1]: Stopping LSB: Control pmlogger (the performance metrics logger for PCP)... Nov 21 19:52:28 debian systemd[1]: Stopping Availability of block devices... Nov 21 19:52:28 debian systemd[1]: certmonger.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Certificate monitoring and PKI enrollment. Nov 21 19:52:28 debian systemd[1]: oddjobd.service: Main process exited, code=killed, status=15/TERM Nov 21 19:52:28 debian systemd[1]: oddjobd.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped privileged operations for unprivileged applications. Nov 21 19:52:28 debian systemd[1]: nfs-blkmap.service: Main process exited, code=exited, status=1/FAILURE Nov 21 19:52:28 debian systemd[1]: nfs-blkmap.service: Failed with result 'exit-code'. Nov 21 19:52:28 debian NetworkManager[653]: [1574365948.9387] modem-manager: ModemManager no longer available Nov 21 19:52:28 debian systemd[1]: Stopped pNFS block layout mapping daemon. Nov 21 19:52:28 debian systemd[1]: ssh.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped OpenBSD Secure Shell server. Nov 21 19:52:28 debian systemd[1]: cron.service: Main process exited, code=killed, status=15/TERM Nov 21 19:52:28 debian systemd[1]: cron.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Regular background program processing daemon. Nov 21 19:52:28 debian systemd[1]: atd.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Deferred execution scheduler. Nov 21 19:52:28 debian systemd[1]: rsyslog.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped System Logging Service. Nov 21 19:52:28 debian unknown[385]: udisks daemon version 2.8.1 exiting Nov 21 19:52:28 debian systemd[1]: chrony.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped chrony, an NTP client/server. Nov 21 19:52:28 debian systemd[1]: serial-getty@ttyS0.service: Main process exited, code=killed, status=15/TERM Nov 21 19:52:28 debian systemd[1]: serial-getty@ttyS0.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Serial Getty on ttyS0. Nov 21 19:52:28 debian systemd[1]: getty@tty1.service: Main process exited, code=killed, status=15/TERM Nov 21 19:52:28 debian systemd[1]: getty@tty1.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Getty on tty1. Nov 21 19:52:28 debian systemd[1]: session-3.scope: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Session 3 of user root. Nov 21 19:52:28 debian systemd[1]: Stopping User Manager for UID 0... Nov 21 19:52:28 debian systemd-logind[567]: Removed session 3. Nov 21 19:52:28 debian systemd[1]: Removed slice system-getty.slice. Nov 21 19:52:28 debian systemd[1]: Removed slice system-serial\x2dgetty.slice. Nov 21 19:52:28 debian systemd[1]: udisks2.service: Succeeded. Nov 21 19:52:28 debian systemd[1]: Stopped Disk Manager. Nov 21 19:52:29 debian systemd[1]: tuned.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Dynamic System Tuning Daemon. Nov 21 19:52:29 debian systemd[3247]: Stopped target Default. Nov 21 19:52:29 debian systemd[3247]: Stopped target Basic System. Nov 21 19:52:29 debian systemd[3247]: Stopped target Paths. Nov 21 19:52:29 debian systemd[3247]: Stopped target Sockets. Nov 21 19:52:29 debian systemd[3247]: gpg-agent-extra.socket: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Closed GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 19:52:29 debian systemd[3247]: gpg-agent-ssh.socket: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Closed GnuPG cryptographic agent (ssh-agent emulation). Nov 21 19:52:29 debian systemd[3247]: Stopped target Timers. Nov 21 19:52:29 debian systemd[3247]: dirmngr.socket: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Closed GnuPG network certificate management daemon. Nov 21 19:52:29 debian systemd[3247]: dbus.socket: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Closed D-Bus User Message Bus Socket. Nov 21 19:52:29 debian systemd[3247]: gpg-agent.socket: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Closed GnuPG cryptographic agent and passphrase cache. Nov 21 19:52:29 debian systemd[3247]: gpg-agent-browser.socket: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Closed GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 19:52:29 debian systemd[3247]: Reached target Shutdown. Nov 21 19:52:29 debian systemd[3247]: systemd-exit.service: Succeeded. Nov 21 19:52:29 debian systemd[3247]: Started Exit the Session. Nov 21 19:52:29 debian systemd[3247]: Reached target Exit the Session. Nov 21 19:52:29 debian systemd[1]: user@0.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped User Manager for UID 0. Nov 21 19:52:29 debian systemd[1]: Stopping User Runtime Directory /run/user/0... Nov 21 19:52:29 debian systemd[1]: exim4.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped LSB: exim Mail Transport Agent. Nov 21 19:52:29 debian systemd[1]: run-user-0.mount: Succeeded. Nov 21 19:52:29 debian systemd[1]: Unmounted /run/user/0. Nov 21 19:52:29 debian systemd[1]: ModemManager.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Modem Manager. Nov 21 19:52:29 debian systemd[1]: blk-availability.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Availability of block devices. Nov 21 19:52:29 debian systemd[1]: user-runtime-dir@0.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped User Runtime Directory /run/user/0. Nov 21 19:52:29 debian systemd[1]: Removed slice User Slice of UID 0. Nov 21 19:52:29 debian systemd[1]: Stopping Permit User Sessions... Nov 21 19:52:29 debian systemd[1]: systemd-user-sessions.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Permit User Sessions. Nov 21 19:52:29 debian systemd[1]: pmlogger.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped LSB: Control pmlogger (the performance metrics logger for PCP). Nov 21 19:52:29 debian systemd[1]: libvirt-guests.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Suspend/Resume Running libvirt Guests. Nov 21 19:52:29 debian systemd[1]: Stopped target Libvirt guests shutdown. Nov 21 19:52:29 debian systemd[1]: Stopping Virtualization daemon... Nov 21 19:52:29 debian systemd[1]: libvirtd.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Virtualization daemon. Nov 21 19:52:29 debian systemd[1]: Stopping Login Service... Nov 21 19:52:29 debian pmie[10714]: Waiting for pmie process(es) to terminate ... Nov 21 19:52:29 debian systemd[1]: systemd-logind.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Login Service. Nov 21 19:52:29 debian systemd[1]: Stopped target User and Group Name Lookups. Nov 21 19:52:29 debian systemd[1]: Stopping System Security Services Daemon... Nov 21 19:52:29 debian sssd[be[480]: Shutting down Nov 21 19:52:29 debian sssd[547]: Shutting down Nov 21 19:52:29 debian systemd[1]: pmie.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped LSB: Control pmie (performance inference engine for PCP). Nov 21 19:52:29 debian systemd[1]: sssd.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped System Security Services Daemon. Nov 21 19:52:29 debian pmcd[10715]: Waiting for pmcd to terminate ... Nov 21 19:52:29 debian systemd[1]: pmcd.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped LSB: Control pmcd (the collection daemon for PCP). Nov 21 19:52:29 debian systemd[1]: docker.service: Succeeded. Nov 21 19:52:29 debian systemd[1]: Stopped Docker Application Container Engine. Nov 21 19:52:32 debian pmproxy[10716]: Waiting for pmproxy to terminate ... Nov 21 19:52:32 debian systemd[1]: pmproxy.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped LSB: Control pmproxy (the pmcd proxy daemon for PCP). Nov 21 19:52:32 debian systemd[1]: Stopped target Network is Online. Nov 21 19:52:32 debian systemd[1]: NetworkManager-wait-online.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped Network Manager Wait Online. Nov 21 19:52:32 debian systemd[1]: Stopped target Remote File Systems. Nov 21 19:52:32 debian systemd[1]: Stopped target Remote File Systems (Pre). Nov 21 19:52:32 debian systemd[1]: Stopping NFS server and services... Nov 21 19:52:32 debian systemd[1]: Stopped target NFS client services. Nov 21 19:52:32 debian systemd[1]: Stopped target System Time Synchronized. Nov 21 19:52:32 debian systemd[1]: nfs-server.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped NFS server and services. Nov 21 19:52:32 debian systemd[1]: Stopping NFS Mount Daemon... Nov 21 19:52:32 debian systemd[1]: Stopping NFSv4 ID-name mapping service... Nov 21 19:52:32 debian rpc.mountd[902]: Caught signal 15, un-registering and exiting. Nov 21 19:52:32 debian systemd[1]: nfs-idmapd.service: Main process exited, code=killed, status=15/TERM Nov 21 19:52:32 debian systemd[1]: nfs-idmapd.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped NFSv4 ID-name mapping service. Nov 21 19:52:32 debian systemd[1]: nfs-mountd.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped NFS Mount Daemon. Nov 21 19:52:32 debian systemd[1]: Stopped target Network. Nov 21 19:52:32 debian systemd[1]: Stopping Raise network interfaces... Nov 21 19:52:32 debian systemd[1]: Stopping Network Manager... Nov 21 19:52:32 debian NetworkManager[653]: [1574365952.4826] caught SIGTERM, shutting down normally. Nov 21 19:52:32 debian systemd[1]: Stopping WPA supplicant... Nov 21 19:52:32 debian systemd[1]: Unmounting RPC Pipe File System... Nov 21 19:52:32 debian systemd[1]: wpa_supplicant.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped WPA supplicant. Nov 21 19:52:32 debian NetworkManager[653]: [1574365952.4890] device (virbr0-nic): released from master device virbr0 Nov 21 19:52:32 debian systemd[1]: run-rpc_pipefs.mount: Succeeded. Nov 21 19:52:32 debian systemd[1]: Unmounted RPC Pipe File System. Nov 21 19:52:32 debian dhclient[11336]: Killed old client process Nov 21 19:52:32 debian ifdown[11327]: Killed old client process Nov 21 19:52:32 debian NetworkManager[653]: [1574365952.5092] exiting (success) Nov 21 19:52:32 debian kernel: nfsd: last server has exited, flushing export cache Nov 21 19:52:32 debian systemd[1]: NetworkManager.service: Succeeded. Nov 21 19:52:32 debian systemd[1]: Stopped Network Manager. Nov 21 19:52:33 debian dhclient[11336]: Internet Systems Consortium DHCP Client 4.4.1 Nov 21 19:52:33 debian ifdown[11327]: Internet Systems Consortium DHCP Client 4.4.1 Nov 21 19:52:33 debian dhclient[11336]: Copyright 2004-2018 Internet Systems Consortium. Nov 21 19:52:33 debian ifdown[11327]: Copyright 2004-2018 Internet Systems Consortium. Nov 21 19:52:33 debian dhclient[11336]: All rights reserved. Nov 21 19:52:33 debian ifdown[11327]: All rights reserved. Nov 21 19:52:33 debian dhclient[11336]: For info, please visit https://www.isc.org/software/dhcp/ Nov 21 19:52:33 debian ifdown[11327]: For info, please visit https://www.isc.org/software/dhcp/ Nov 21 19:52:33 debian dhclient[11336]: Nov 21 19:52:33 debian dhclient[11336]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 21 19:52:33 debian ifdown[11327]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 21 19:52:33 debian dhclient[11336]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 21 19:52:33 debian ifdown[11327]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 21 19:52:33 debian dhclient[11336]: Sending on Socket/fallback Nov 21 19:52:33 debian ifdown[11327]: Sending on Socket/fallback Nov 21 19:52:33 debian dhclient[11336]: DHCPRELEASE of 172.27.0.15 on eth0 to 172.27.0.2 port 67 Nov 21 19:52:33 debian ifdown[11327]: DHCPRELEASE of 172.27.0.15 on eth0 to 172.27.0.2 port 67 Nov 21 19:52:33 debian systemd[1]: networking.service: Succeeded. Nov 21 19:52:33 debian systemd[1]: Stopped Raise network interfaces. Nov 21 19:52:33 debian systemd[1]: Stopped target Network (Pre). Nov 21 19:52:33 debian systemd[1]: Stopping firewalld - dynamic firewall daemon... Nov 21 19:52:33 debian firewalld[407]: ERROR: '/usr/sbin/iptables-restore -w -n' failed: iptables-restore v1.8.2 (nf_tables): line 4: RULE_REPLACE failed (No such file or directory): rule in chain INPUT line 4: RULE_REPLACE failed (No such file or directory): rule in chain OUTPUT Nov 21 19:52:33 debian firewalld[407]: ERROR: '/usr/sbin/ip6tables-restore -w -n' failed: ip6tables-restore v1.8.2 (nf_tables): line 4: RULE_REPLACE failed (No such file or directory): rule in chain INPUT line 4: RULE_REPLACE failed (No such file or directory): rule in chain OUTPUT Nov 21 19:52:33 debian firewalld[407]: ERROR: COMMAND_FAILED: '/usr/sbin/ip6tables-restore -w -n' failed: ip6tables-restore v1.8.2 (nf_tables): line 4: RULE_REPLACE failed (No such file or directory): rule in chain INPUT line 4: RULE_REPLACE failed (No such file or directory): rule in chain OUTPUT Nov 21 19:52:33 debian systemd[1]: firewalld.service: Succeeded. Nov 21 19:52:33 debian systemd[1]: Stopped firewalld - dynamic firewall daemon. Nov 21 19:52:33 debian systemd[1]: Stopping Authorization Manager... Nov 21 19:52:33 debian systemd[1]: Stopping D-Bus System Message Bus... Nov 21 19:52:33 debian systemd[1]: dbus.service: Succeeded. Nov 21 19:52:33 debian systemd[1]: Stopped D-Bus System Message Bus. Nov 21 19:52:33 debian systemd[1]: polkit.service: Main process exited, code=killed, status=15/TERM Nov 21 19:52:33 debian systemd[1]: polkit.service: Succeeded. Nov 21 19:52:33 debian systemd[1]: Stopped Authorization Manager. Nov 21 19:52:33 debian systemd[1]: Stopped target Basic System. Nov 21 19:52:34 debian systemd[1]: Stopped target Sockets. Nov 21 19:52:34 debian systemd[1]: uuidd.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed UUID daemon activation socket. Nov 21 19:52:34 debian systemd[1]: Stopping Cockpit Web Service Socket. Nov 21 19:52:34 debian systemd[1]: syslog.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Syslog Socket. Nov 21 19:52:34 debian systemd[1]: docker.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Docker Socket for the API. Nov 21 19:52:34 debian systemd[1]: virtlogd-admin.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Virtual machine log manager socket. Nov 21 19:52:34 debian systemd[1]: virtlogd.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Virtual machine log manager socket. Nov 21 19:52:34 debian systemd[1]: sssd-secrets.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed SSSD Secrets Service responder socket. Nov 21 19:52:34 debian systemd[1]: virtlockd.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Virtual machine lock manager socket. Nov 21 19:52:34 debian systemd[1]: virtlockd-admin.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Virtual machine lock manager admin socket. Nov 21 19:52:34 debian systemd[1]: Stopped target Slices. Nov 21 19:52:34 debian systemd[1]: Removed slice User and Session Slice. Nov 21 19:52:34 debian systemd[1]: Stopped target Paths. Nov 21 19:52:34 debian systemd[1]: dbus.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed D-Bus System Message Bus Socket. Nov 21 19:52:34 debian systemd[1]: cockpit.socket: Succeeded. Nov 21 19:52:34 debian systemd[1]: Closed Cockpit Web Service Socket. Nov 21 19:52:34 debian systemd[1]: Stopped target System Initialization. Nov 21 19:52:34 debian systemd[1]: Stopped target Swap. Nov 21 19:52:34 debian systemd[1]: Stopping Update UTMP about System Boot/Shutdown... Nov 21 19:52:34 debian systemd[1]: Stopping Load/Save Random Seed... Nov 21 19:52:34 debian systemd[1]: systemd-sysctl.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Apply Kernel Variables. Nov 21 19:52:34 debian systemd[1]: Stopped target Local Encrypted Volumes. Nov 21 19:52:34 debian systemd[1]: systemd-ask-password-console.path: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Nov 21 19:52:34 debian systemd[1]: systemd-ask-password-wall.path: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Forward Password Requests to Wall Directory Watch. Nov 21 19:52:34 debian systemd[1]: systemd-modules-load.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Load Kernel Modules. Nov 21 19:52:34 debian systemd[1]: systemd-random-seed.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Load/Save Random Seed. Nov 21 19:52:34 debian systemd[1]: systemd-update-utmp.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Update UTMP about System Boot/Shutdown. Nov 21 19:52:34 debian systemd[1]: systemd-tmpfiles-setup.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Create Volatile Files and Directories. Nov 21 19:52:34 debian systemd[1]: Stopped target Local File Systems. Nov 21 19:52:34 debian systemd[1]: Unmounting /boot/efi... Nov 21 19:52:34 debian systemd[1]: boot-efi.mount: Succeeded. Nov 21 19:52:34 debian systemd[1]: Unmounted /boot/efi. Nov 21 19:52:34 debian systemd[1]: Reached target Unmount All Filesystems. Nov 21 19:52:34 debian systemd[1]: Stopped target Local File Systems (Pre). Nov 21 19:52:34 debian systemd[1]: systemd-tmpfiles-setup-dev.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Create Static Device Nodes in /dev. Nov 21 19:52:34 debian systemd[1]: systemd-sysusers.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Create System Users. Nov 21 19:52:34 debian systemd[1]: Stopping Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Nov 21 19:52:34 debian systemd[1]: systemd-remount-fs.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Stopped Remount Root and Kernel File Systems. Nov 21 19:52:34 debian systemd[1]: Reached target Shutdown. Nov 21 19:52:34 debian systemd[1]: Reached target Final Step. Nov 21 19:52:34 debian systemd[1]: systemd-poweroff.service: Succeeded. Nov 21 19:52:34 debian systemd[1]: Started Power-Off. Nov 21 19:52:34 debian systemd[1]: Reached target Power-Off. Nov 21 19:52:34 debian systemd[1]: Shutting down. Nov 21 19:52:34 debian kernel: systemd-shutdow: 56 output lines suppressed due to ratelimiting Nov 21 19:52:34 debian systemd-shutdown[1]: Syncing filesystems and block devices. Nov 21 19:52:34 debian dnsmasq[3534]: exiting on receipt of SIGTERM Nov 21 19:52:34 debian systemd-shutdown[1]: Sending SIGTERM to remaining processes... Nov 21 19:52:34 debian systemd-journald[288]: Journal stopped -- Reboot -- Nov 21 19:59:52 debian kernel: Linux version 4.19.0-6-cloud-amd64 (debian-kernel@lists.debian.org) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.67-2+deb10u2 (2019-11-11) Nov 21 19:59:52 debian kernel: Command line: BOOT_IMAGE=/boot/vmlinuz-4.19.0-6-cloud-amd64 root=UUID=38ca74d0-013a-4237-b0f0-a54c22da0d9a ro console=tty0 console=ttyS0,115200 earlyprintk=ttyS0,115200 net.ifnames=0 biosdevname=0 elevator=noop scsi_mod.use_blk_mq=Y Nov 21 19:59:52 debian kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 21 19:59:52 debian kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 21 19:59:52 debian kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 21 19:59:52 debian kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 21 19:59:52 debian kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Nov 21 19:59:52 debian kernel: BIOS-provided physical RAM map: Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ffdbfff] usable Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x000000003ffdc000-0x000000003fffffff] reserved Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Nov 21 19:59:52 debian kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Nov 21 19:59:52 debian kernel: bootconsole [earlyser0] enabled Nov 21 19:59:52 debian kernel: NX (Execute Disable) protection: active Nov 21 19:59:52 debian kernel: SMBIOS 2.8 present. Nov 21 19:59:52 debian kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-2.fc30 04/01/2014 Nov 21 19:59:52 debian kernel: Hypervisor detected: KVM Nov 21 19:59:52 debian kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 21 19:59:52 debian kernel: kvm-clock: cpu 0, msr 713a001, primary cpu clock Nov 21 19:59:52 debian kernel: kvm-clock: using sched offset of 2396413625 cycles Nov 21 19:59:52 debian kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 21 19:59:52 debian kernel: tsc: Detected 2394.454 MHz processor Nov 21 19:59:52 debian kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 21 19:59:52 debian kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 21 19:59:52 debian kernel: last_pfn = 0x3ffdc max_arch_pfn = 0x400000000 Nov 21 19:59:52 debian kernel: MTRR default type: write-back Nov 21 19:59:52 debian kernel: MTRR fixed ranges enabled: Nov 21 19:59:52 debian kernel: 00000-9FFFF write-back Nov 21 19:59:52 debian kernel: A0000-BFFFF uncachable Nov 21 19:59:52 debian kernel: C0000-FFFFF write-protect Nov 21 19:59:52 debian kernel: MTRR variable ranges enabled: Nov 21 19:59:52 debian kernel: 0 base 0080000000 mask FF80000000 uncachable Nov 21 19:59:52 debian kernel: 1 disabled Nov 21 19:59:52 debian kernel: 2 disabled Nov 21 19:59:52 debian kernel: 3 disabled Nov 21 19:59:52 debian kernel: 4 disabled Nov 21 19:59:52 debian kernel: 5 disabled Nov 21 19:59:52 debian kernel: 6 disabled Nov 21 19:59:52 debian kernel: 7 disabled Nov 21 19:59:52 debian kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 21 19:59:52 debian kernel: Using GB pages for direct mapping Nov 21 19:59:52 debian kernel: BRK [0x07201000, 0x07201fff] PGTABLE Nov 21 19:59:52 debian kernel: BRK [0x07202000, 0x07202fff] PGTABLE Nov 21 19:59:52 debian kernel: BRK [0x07203000, 0x07203fff] PGTABLE Nov 21 19:59:52 debian kernel: BRK [0x07204000, 0x07204fff] PGTABLE Nov 21 19:59:52 debian kernel: BRK [0x07205000, 0x07205fff] PGTABLE Nov 21 19:59:52 debian kernel: RAMDISK: [mem 0x35d85000-0x36eb9fff] Nov 21 19:59:52 debian kernel: ACPI: Early table checksum verification disabled Nov 21 19:59:52 debian kernel: ACPI: RSDP 0x00000000000F5A60 000014 (v00 BOCHS ) Nov 21 19:59:52 debian kernel: ACPI: RSDT 0x000000003FFE1548 000030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) Nov 21 19:59:52 debian kernel: ACPI: FACP 0x000000003FFE1424 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) Nov 21 19:59:52 debian kernel: ACPI: DSDT 0x000000003FFE0040 0013E4 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) Nov 21 19:59:52 debian kernel: ACPI: FACS 0x000000003FFE0000 000040 Nov 21 19:59:52 debian kernel: ACPI: APIC 0x000000003FFE1498 000078 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) Nov 21 19:59:52 debian kernel: ACPI: HPET 0x000000003FFE1510 000038 (v01 BOCHS BXPCHPET 00000001 BXPC 00000001) Nov 21 19:59:52 debian kernel: ACPI: Local APIC address 0xfee00000 Nov 21 19:59:52 debian kernel: No NUMA configuration found Nov 21 19:59:52 debian kernel: Faking a node at [mem 0x0000000000000000-0x000000003ffdbfff] Nov 21 19:59:52 debian kernel: NODE_DATA(0) allocated [mem 0x3ffd7000-0x3ffdbfff] Nov 21 19:59:52 debian kernel: Zone ranges: Nov 21 19:59:52 debian kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 21 19:59:52 debian kernel: DMA32 [mem 0x0000000001000000-0x000000003ffdbfff] Nov 21 19:59:52 debian kernel: Normal empty Nov 21 19:59:52 debian kernel: Device empty Nov 21 19:59:52 debian kernel: Movable zone start for each node Nov 21 19:59:52 debian kernel: Early memory node ranges Nov 21 19:59:52 debian kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Nov 21 19:59:52 debian kernel: node 0: [mem 0x0000000000100000-0x000000003ffdbfff] Nov 21 19:59:52 debian kernel: Reserved but unavailable: 98 pages Nov 21 19:59:52 debian kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000003ffdbfff] Nov 21 19:59:52 debian kernel: On node 0 totalpages: 262010 Nov 21 19:59:52 debian kernel: DMA zone: 64 pages used for memmap Nov 21 19:59:52 debian kernel: DMA zone: 21 pages reserved Nov 21 19:59:52 debian kernel: DMA zone: 3998 pages, LIFO batch:0 Nov 21 19:59:52 debian kernel: DMA32 zone: 4032 pages used for memmap Nov 21 19:59:52 debian kernel: DMA32 zone: 258012 pages, LIFO batch:63 Nov 21 19:59:52 debian kernel: ACPI: PM-Timer IO Port: 0x608 Nov 21 19:59:52 debian kernel: ACPI: Local APIC address 0xfee00000 Nov 21 19:59:52 debian kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 21 19:59:52 debian kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 21 19:59:52 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 21 19:59:52 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 21 19:59:52 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 21 19:59:52 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 21 19:59:52 debian kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 21 19:59:52 debian kernel: ACPI: IRQ0 used by override. Nov 21 19:59:52 debian kernel: ACPI: IRQ5 used by override. Nov 21 19:59:52 debian kernel: ACPI: IRQ9 used by override. Nov 21 19:59:52 debian kernel: ACPI: IRQ10 used by override. Nov 21 19:59:52 debian kernel: ACPI: IRQ11 used by override. Nov 21 19:59:52 debian kernel: Using ACPI (MADT) for SMP configuration information Nov 21 19:59:52 debian kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Nov 21 19:59:52 debian kernel: smpboot: Allowing 1 CPUs, 0 hotplug CPUs Nov 21 19:59:52 debian kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff] Nov 21 19:59:52 debian kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Nov 21 19:59:52 debian kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] Nov 21 19:59:52 debian kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] Nov 21 19:59:52 debian kernel: [mem 0x40000000-0xfeffbfff] available for PCI devices Nov 21 19:59:52 debian kernel: Booting paravirtualized kernel on KVM Nov 21 19:59:52 debian kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Nov 21 19:59:52 debian kernel: random: get_random_bytes called from start_kernel+0x93/0x522 with crng_init=0 Nov 21 19:59:52 debian kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:1 nr_node_ids:1 Nov 21 19:59:52 debian kernel: percpu: Embedded 44 pages/cpu s141720 r8192 d30312 u2097152 Nov 21 19:59:52 debian kernel: pcpu-alloc: s141720 r8192 d30312 u2097152 alloc=1*2097152 Nov 21 19:59:52 debian kernel: pcpu-alloc: [0] 0 Nov 21 19:59:52 debian kernel: KVM setup async PF for cpu 0 Nov 21 19:59:52 debian kernel: kvm-stealtime: cpu 0, msr 3ea15f00 Nov 21 19:59:52 debian kernel: Built 1 zonelists, mobility grouping on. Total pages: 257893 Nov 21 19:59:52 debian kernel: Policy zone: DMA32 Nov 21 19:59:52 debian kernel: Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.19.0-6-cloud-amd64 root=UUID=38ca74d0-013a-4237-b0f0-a54c22da0d9a ro console=tty0 console=ttyS0,115200 earlyprintk=ttyS0,115200 net.ifnames=0 biosdevname=0 elevator=noop scsi_mod.use_blk_mq=Y Nov 21 19:59:52 debian kernel: Memory: 990940K/1048040K available (10252K kernel code, 1096K rwdata, 2732K rodata, 1468K init, 884K bss, 57100K reserved, 0K cma-reserved) Nov 21 19:59:52 debian kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 Nov 21 19:59:52 debian kernel: Kernel/User page tables isolation: enabled Nov 21 19:59:52 debian kernel: ftrace: allocating 27193 entries in 107 pages Nov 21 19:59:52 debian kernel: rcu: Hierarchical RCU implementation. Nov 21 19:59:52 debian kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=1. Nov 21 19:59:52 debian kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=1 Nov 21 19:59:52 debian kernel: NR_IRQS: 33024, nr_irqs: 256, preallocated irqs: 16 Nov 21 19:59:52 debian kernel: Console: colour VGA+ 80x25 Nov 21 19:59:52 debian kernel: console [tty0] enabled Nov 21 19:59:52 debian kernel: console [ttyS0] enabled Nov 21 19:59:52 debian kernel: bootconsole [earlyser0] disabled Nov 21 19:59:52 debian kernel: ACPI: Core revision 20180810 Nov 21 19:59:52 debian kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Nov 21 19:59:52 debian kernel: hpet clockevent registered Nov 21 19:59:52 debian kernel: APIC: Switch to symmetric I/O mode setup Nov 21 19:59:52 debian kernel: x2apic enabled Nov 21 19:59:52 debian kernel: Switched APIC routing to physical x2apic. Nov 21 19:59:52 debian kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Nov 21 19:59:52 debian kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2283c0783fd, max_idle_ns: 440795301468 ns Nov 21 19:59:52 debian kernel: Calibrating delay loop (skipped) preset value.. 4788.90 BogoMIPS (lpj=9577816) Nov 21 19:59:52 debian kernel: pid_max: default: 32768 minimum: 301 Nov 21 19:59:52 debian kernel: Security Framework initialized Nov 21 19:59:52 debian kernel: Yama: disabled by default; enable with sysctl kernel.yama.* Nov 21 19:59:52 debian kernel: AppArmor: AppArmor initialized Nov 21 19:59:52 debian kernel: Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes) Nov 21 19:59:52 debian kernel: Inode-cache hash table entries: 65536 (order: 7, 524288 bytes) Nov 21 19:59:52 debian kernel: Mount-cache hash table entries: 2048 (order: 2, 16384 bytes) Nov 21 19:59:52 debian kernel: Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes) Nov 21 19:59:52 debian kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Nov 21 19:59:52 debian kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Nov 21 19:59:52 debian kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 21 19:59:52 debian kernel: Spectre V2 : Mitigation: Full generic retpoline Nov 21 19:59:52 debian kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Nov 21 19:59:52 debian kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Nov 21 19:59:52 debian kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 21 19:59:52 debian kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 21 19:59:52 debian kernel: MDS: Mitigation: Clear CPU buffers Nov 21 19:59:52 debian kernel: Freeing SMP alternatives memory: 20K Nov 21 19:59:52 debian kernel: TSC deadline timer enabled Nov 21 19:59:52 debian kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz (family: 0x6, model: 0x3f, stepping: 0x2) Nov 21 19:59:52 debian kernel: Performance Events: Haswell events, Intel PMU driver. Nov 21 19:59:52 debian kernel: ... version: 2 Nov 21 19:59:52 debian kernel: ... bit width: 48 Nov 21 19:59:52 debian kernel: ... generic registers: 4 Nov 21 19:59:52 debian kernel: ... value mask: 0000ffffffffffff Nov 21 19:59:52 debian kernel: ... max period: 000000007fffffff Nov 21 19:59:52 debian kernel: ... fixed-purpose events: 3 Nov 21 19:59:52 debian kernel: ... event mask: 000000070000000f Nov 21 19:59:52 debian kernel: rcu: Hierarchical SRCU implementation. Nov 21 19:59:52 debian kernel: random: crng done (trusting CPU's manufacturer) Nov 21 19:59:52 debian kernel: smp: Bringing up secondary CPUs ... Nov 21 19:59:52 debian kernel: smp: Brought up 1 node, 1 CPU Nov 21 19:59:52 debian kernel: smpboot: Max logical packages: 1 Nov 21 19:59:52 debian kernel: smpboot: Total of 1 processors activated (4788.90 BogoMIPS) Nov 21 19:59:52 debian kernel: devtmpfs: initialized Nov 21 19:59:52 debian kernel: x86/mm: Memory block size: 128MB Nov 21 19:59:52 debian kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Nov 21 19:59:52 debian kernel: futex hash table entries: 256 (order: 2, 16384 bytes) Nov 21 19:59:52 debian kernel: NET: Registered protocol family 16 Nov 21 19:59:52 debian kernel: audit: initializing netlink subsys (disabled) Nov 21 19:59:52 debian kernel: ACPI: bus type PCI registered Nov 21 19:59:52 debian kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 21 19:59:52 debian kernel: PCI: Using configuration type 1 for base access Nov 21 19:59:52 debian kernel: audit: type=2000 audit(1574366389.278:1): state=initialized audit_enabled=0 res=1 Nov 21 19:59:52 debian kernel: core: PMU erratum BJ122, BV98, HSD29 workaround disabled, HT off Nov 21 19:59:52 debian kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 21 19:59:52 debian kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 21 19:59:52 debian kernel: ACPI: Added _OSI(Module Device) Nov 21 19:59:52 debian kernel: ACPI: Added _OSI(Processor Device) Nov 21 19:59:52 debian kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Nov 21 19:59:52 debian kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 21 19:59:52 debian kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 21 19:59:52 debian kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 21 19:59:52 debian kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 21 19:59:52 debian kernel: ACPI: Interpreter enabled Nov 21 19:59:52 debian kernel: ACPI: (supports S0 S4 S5) Nov 21 19:59:52 debian kernel: ACPI: Using IOAPIC for interrupt routing Nov 21 19:59:52 debian kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 21 19:59:52 debian kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Nov 21 19:59:52 debian kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 21 19:59:52 debian kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] Nov 21 19:59:52 debian kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM Nov 21 19:59:52 debian kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Nov 21 19:59:52 debian kernel: acpiphp: Slot [2] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [3] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [4] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [5] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [6] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [7] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [8] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [9] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [10] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [11] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [12] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [13] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [14] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [15] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [16] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [17] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [18] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [19] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [20] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [21] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [22] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [23] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [24] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [25] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [26] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [27] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [28] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [29] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [30] registered Nov 21 19:59:52 debian kernel: acpiphp: Slot [31] registered Nov 21 19:59:52 debian kernel: PCI host bridge to bus 0000:00 Nov 21 19:59:52 debian kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: root bus resource [mem 0x40000000-0xfebfffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 21 19:59:52 debian kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Nov 21 19:59:52 debian kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Nov 21 19:59:52 debian kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Nov 21 19:59:52 debian kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Nov 21 19:59:52 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Nov 21 19:59:52 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Nov 21 19:59:52 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Nov 21 19:59:52 debian kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Nov 21 19:59:52 debian kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Nov 21 19:59:52 debian kernel: pci 0000:00:01.2: reg 0x20: [io 0xc080-0xc09f] Nov 21 19:59:52 debian kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Nov 21 19:59:52 debian kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Nov 21 19:59:52 debian kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Nov 21 19:59:52 debian kernel: pci 0000:00:02.0: [1af4:1004] type 00 class 0x010000 Nov 21 19:59:52 debian kernel: pci 0000:00:02.0: reg 0x10: [io 0xc000-0xc03f] Nov 21 19:59:52 debian kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebc0000-0xfebc0fff] Nov 21 19:59:52 debian kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebe8000-0xfebebfff 64bit pref] Nov 21 19:59:52 debian kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Nov 21 19:59:52 debian kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Nov 21 19:59:52 debian kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebc1000-0xfebc1fff] Nov 21 19:59:52 debian kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfebec000-0xfebeffff 64bit pref] Nov 21 19:59:52 debian kernel: pci 0000:00:04.0: [1af4:1002] type 00 class 0x00ff00 Nov 21 19:59:52 debian kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0a0-0xc0bf] Nov 21 19:59:52 debian kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfebf0000-0xfebf3fff 64bit pref] Nov 21 19:59:52 debian kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Nov 21 19:59:52 debian kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0df] Nov 21 19:59:52 debian kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfebf4000-0xfebf7fff 64bit pref] Nov 21 19:59:52 debian kernel: pci 0000:00:0e.0: [1af4:1000] type 00 class 0x020000 Nov 21 19:59:52 debian kernel: pci 0000:00:0e.0: reg 0x10: [io 0xc0e0-0xc0ff] Nov 21 19:59:52 debian kernel: pci 0000:00:0e.0: reg 0x14: [mem 0xfebc2000-0xfebc2fff] Nov 21 19:59:52 debian kernel: pci 0000:00:0e.0: reg 0x20: [mem 0xfebf8000-0xfebfbfff 64bit pref] Nov 21 19:59:52 debian kernel: pci 0000:00:0e.0: reg 0x30: [mem 0xfeb40000-0xfeb7ffff pref] Nov 21 19:59:52 debian kernel: pci 0000:00:0f.0: [1af4:1000] type 00 class 0x020000 Nov 21 19:59:52 debian kernel: pci 0000:00:0f.0: reg 0x10: [io 0xc100-0xc11f] Nov 21 19:59:52 debian kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xfebc3000-0xfebc3fff] Nov 21 19:59:52 debian kernel: pci 0000:00:0f.0: reg 0x20: [mem 0xfebfc000-0xfebfffff 64bit pref] Nov 21 19:59:52 debian kernel: pci 0000:00:0f.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Nov 21 19:59:52 debian kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Nov 21 19:59:52 debian kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Nov 21 19:59:52 debian kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Nov 21 19:59:52 debian kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Nov 21 19:59:52 debian kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) Nov 21 19:59:52 debian kernel: vgaarb: loaded Nov 21 19:59:52 debian kernel: PCI: Using ACPI for IRQ routing Nov 21 19:59:52 debian kernel: PCI: pci_cache_line_size set to 64 bytes Nov 21 19:59:52 debian kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Nov 21 19:59:52 debian kernel: e820: reserve RAM buffer [mem 0x3ffdc000-0x3fffffff] Nov 21 19:59:52 debian kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Nov 21 19:59:52 debian kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Nov 21 19:59:52 debian kernel: clocksource: Switched to clocksource kvm-clock Nov 21 19:59:52 debian kernel: VFS: Disk quotas dquot_6.6.0 Nov 21 19:59:52 debian kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 21 19:59:52 debian kernel: AppArmor: AppArmor Filesystem Enabled Nov 21 19:59:52 debian kernel: pnp: PnP ACPI init Nov 21 19:59:52 debian kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0b00 (active) Nov 21 19:59:52 debian kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0303 (active) Nov 21 19:59:52 debian kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0f13 (active) Nov 21 19:59:52 debian kernel: pnp 00:03: [dma 2] Nov 21 19:59:52 debian kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0700 (active) Nov 21 19:59:52 debian kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0501 (active) Nov 21 19:59:52 debian kernel: pnp: PnP ACPI: found 5 devices Nov 21 19:59:52 debian kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 21 19:59:52 debian kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: resource 7 [mem 0x40000000-0xfebfffff window] Nov 21 19:59:52 debian kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Nov 21 19:59:52 debian kernel: NET: Registered protocol family 2 Nov 21 19:59:52 debian kernel: tcp_listen_portaddr_hash hash table entries: 512 (order: 1, 8192 bytes) Nov 21 19:59:52 debian kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes) Nov 21 19:59:52 debian kernel: TCP bind hash table entries: 8192 (order: 5, 131072 bytes) Nov 21 19:59:52 debian kernel: TCP: Hash tables configured (established 8192 bind 8192) Nov 21 19:59:52 debian kernel: UDP hash table entries: 512 (order: 2, 16384 bytes) Nov 21 19:59:52 debian kernel: UDP-Lite hash table entries: 512 (order: 2, 16384 bytes) Nov 21 19:59:52 debian kernel: NET: Registered protocol family 1 Nov 21 19:59:52 debian kernel: NET: Registered protocol family 44 Nov 21 19:59:52 debian kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Nov 21 19:59:52 debian kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 21 19:59:52 debian kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Nov 21 19:59:52 debian kernel: PCI: CLS 0 bytes, default 64 Nov 21 19:59:52 debian kernel: Unpacking initramfs... Nov 21 19:59:52 debian kernel: Freeing initrd memory: 17620K Nov 21 19:59:52 debian kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2283c0783fd, max_idle_ns: 440795301468 ns Nov 21 19:59:52 debian kernel: Initialise system trusted keyrings Nov 21 19:59:52 debian kernel: Key type blacklist registered Nov 21 19:59:52 debian kernel: workingset: timestamp_bits=40 max_order=18 bucket_order=0 Nov 21 19:59:52 debian kernel: zbud: loaded Nov 21 19:59:52 debian kernel: Key type asymmetric registered Nov 21 19:59:52 debian kernel: Asymmetric key parser 'x509' registered Nov 21 19:59:52 debian kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Nov 21 19:59:52 debian kernel: io scheduler noop registered (default) Nov 21 19:59:52 debian kernel: io scheduler deadline registered Nov 21 19:59:52 debian kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 21 19:59:52 debian kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 21 19:59:52 debian kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 21 19:59:52 debian kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 21 19:59:52 debian kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 21 19:59:52 debian kernel: mousedev: PS/2 mouse device common for all mice Nov 21 19:59:52 debian kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 21 19:59:52 debian kernel: NET: Registered protocol family 10 Nov 21 19:59:52 debian kernel: Segment Routing with IPv6 Nov 21 19:59:52 debian kernel: mip6: Mobile IPv6 Nov 21 19:59:52 debian kernel: NET: Registered protocol family 17 Nov 21 19:59:52 debian kernel: mpls_gso: MPLS GSO support Nov 21 19:59:52 debian kernel: sched_clock: Marking stable (1519735822, 30497465)->(1621445548, -71212261) Nov 21 19:59:52 debian kernel: registered taskstats version 1 Nov 21 19:59:52 debian kernel: Loading compiled-in X.509 certificates Nov 21 19:59:52 debian kernel: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' Nov 21 19:59:52 debian kernel: Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def' Nov 21 19:59:52 debian kernel: AppArmor: AppArmor sha1 policy hashing enabled Nov 21 19:59:52 debian kernel: Freeing unused kernel image memory: 1468K Nov 21 19:59:52 debian kernel: Write protecting the kernel read-only data: 16384k Nov 21 19:59:52 debian kernel: Freeing unused kernel image memory: 2028K Nov 21 19:59:52 debian kernel: Freeing unused kernel image memory: 1364K Nov 21 19:59:52 debian kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Nov 21 19:59:52 debian kernel: x86/mm: Checking user space page tables Nov 21 19:59:52 debian kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Nov 21 19:59:52 debian kernel: Run /init as init process Nov 21 19:59:52 debian kernel: cryptd: max_cpu_qlen set to 1000 Nov 21 19:59:52 debian kernel: SCSI subsystem initialized Nov 21 19:59:52 debian kernel: AVX2 version of gcm_enc/dec engaged. Nov 21 19:59:52 debian kernel: AES CTR mode by8 optimization enabled Nov 21 19:59:52 debian kernel: libata version 3.00 loaded. Nov 21 19:59:52 debian kernel: ata_piix 0000:00:01.1: version 2.13 Nov 21 19:59:52 debian kernel: PCI Interrupt Link [LNKB] enabled at IRQ 10 Nov 21 19:59:52 debian kernel: scsi host0: ata_piix Nov 21 19:59:52 debian kernel: scsi host1: ata_piix Nov 21 19:59:52 debian kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Nov 21 19:59:52 debian kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Nov 21 19:59:52 debian kernel: PCI Interrupt Link [LNKC] enabled at IRQ 11 Nov 21 19:59:52 debian kernel: PCI Interrupt Link [LNKD] enabled at IRQ 11 Nov 21 19:59:52 debian kernel: PCI Interrupt Link [LNKA] enabled at IRQ 10 Nov 21 19:59:52 debian kernel: virtio_blk virtio1: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) Nov 21 19:59:52 debian kernel: scsi host2: Virtio SCSI HBA Nov 21 19:59:52 debian kernel: vda: vda1 vda14 vda15 Nov 21 19:59:52 debian kernel: ata1.01: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Nov 21 19:59:52 debian kernel: scsi: waiting for bus probes to complete ... Nov 21 19:59:52 debian kernel: scsi 0:0:1:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Nov 21 19:59:52 debian kernel: sr 0:0:1:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Nov 21 19:59:52 debian kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Nov 21 19:59:52 debian kernel: sr 0:0:1:0: Attached scsi CD-ROM sr0 Nov 21 19:59:52 debian kernel: raid6: sse2x1 gen() 8946 MB/s Nov 21 19:59:52 debian kernel: raid6: sse2x1 xor() 6140 MB/s Nov 21 19:59:52 debian kernel: raid6: sse2x2 gen() 10369 MB/s Nov 21 19:59:52 debian kernel: raid6: sse2x2 xor() 6762 MB/s Nov 21 19:59:52 debian kernel: raid6: sse2x4 gen() 12198 MB/s Nov 21 19:59:52 debian kernel: raid6: sse2x4 xor() 7604 MB/s Nov 21 19:59:52 debian kernel: raid6: avx2x1 gen() 17008 MB/s Nov 21 19:59:52 debian kernel: raid6: avx2x1 xor() 11567 MB/s Nov 21 19:59:52 debian kernel: raid6: avx2x2 gen() 19567 MB/s Nov 21 19:59:52 debian kernel: raid6: avx2x2 xor() 12580 MB/s Nov 21 19:59:52 debian kernel: raid6: avx2x4 gen() 22809 MB/s Nov 21 19:59:52 debian kernel: raid6: avx2x4 xor() 14118 MB/s Nov 21 19:59:52 debian kernel: raid6: using algorithm avx2x4 gen() 22809 MB/s Nov 21 19:59:52 debian kernel: raid6: .... xor() 14118 MB/s, rmw enabled Nov 21 19:59:52 debian kernel: raid6: using avx2x2 recovery algorithm Nov 21 19:59:52 debian kernel: xor: automatically using best checksumming function avx Nov 21 19:59:52 debian kernel: EXT4-fs (vda1): mounted filesystem with ordered data mode. Opts: (null) Nov 21 19:59:52 debian systemd[1]: Inserted module 'autofs4' Nov 21 19:59:52 debian systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2 default-hierarchy=hybrid) Nov 21 19:59:52 debian systemd[1]: Detected virtualization kvm. Nov 21 19:59:52 debian systemd[1]: Detected architecture x86-64. Nov 21 19:59:52 debian systemd[1]: Set hostname to . Nov 21 19:59:52 debian systemd[1]: Failed to bump fs.file-max, ignoring: Invalid argument Nov 21 19:59:52 debian systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 19:59:52 debian systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 19:59:52 debian systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 19:59:52 debian systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 19:59:52 debian systemd[1]: Listening on udev Kernel Socket. Nov 21 19:59:52 debian kernel: RPC: Registered named UNIX socket transport module. Nov 21 19:59:52 debian kernel: RPC: Registered udp transport module. Nov 21 19:59:52 debian kernel: RPC: Registered tcp transport module. Nov 21 19:59:52 debian kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 21 19:59:52 debian kernel: EXT4-fs (vda1): re-mounted. Opts: discard,errors=remount-ro Nov 21 19:59:52 debian kernel: Installing knfsd (copyright (C) 1996 okir@monad.swb.de). Nov 21 19:59:52 debian systemd-journald[260]: Journal started Nov 21 19:59:52 debian systemd-journald[260]: Runtime journal (/run/log/journal/b28e3418676c443984dc8bade4c268eb) is 1.2M, max 9.8M, 8.6M free. Nov 21 19:59:52 debian blkmapd[272]: open pipe file /run/rpc_pipefs/nfs/blocklayout failed: No such file or directory Nov 21 19:59:52 debian systemd[1]: Starting Flush Journal to Persistent Storage... Nov 21 19:59:52 debian systemd[1]: nfs-blkmap.service: Can't open PID file /run/blkmapd.pid (yet?) after start: No such file or directory Nov 21 19:59:52 debian systemd[1]: Started pNFS block layout mapping daemon. Nov 21 19:59:53 debian systemd[1]: Started Load/Save Random Seed. Nov 21 19:59:53 debian systemd-journald[260]: Time spent on flushing to /var is 22.699ms for 416 entries. Nov 21 19:59:53 debian systemd-journald[260]: System journal (/var/log/journal/b28e3418676c443984dc8bade4c268eb) is 8.0M, max 992.1M, 984.1M free. Nov 21 19:59:53 debian systemd[1]: Started Apply Kernel Variables. Nov 21 19:59:53 debian systemd[1]: Started udev Coldplug all Devices. Nov 21 19:59:53 debian systemd[1]: Starting Helper to synchronize boot up for ifupdown... Nov 21 19:59:53 debian systemd-sysusers[268]: Failed to check if group sync already exists: Connection refused Nov 21 19:59:53 debian systemd-sysusers[268]: Failed to check if group nobody already exists: Connection refused Nov 21 19:59:53 debian systemd[1]: Started Create System Users. Nov 21 19:59:53 debian systemd[1]: Starting Create Static Device Nodes in /dev... Nov 21 19:59:53 debian systemd-tmpfiles[275]: [/usr/lib/tmpfiles.d/certmonger.conf:3] Line references path below legacy directory /var/run/, updating /var/run/certmonger → /run/certmonger; please update the tmpfiles.d/ drop-in file accordingly. Nov 21 19:59:53 debian systemd[1]: Started Create Static Device Nodes in /dev. Nov 21 19:59:53 debian systemd[1]: Reached target Local File Systems (Pre). Nov 21 19:59:53 debian systemd[1]: Starting udev Kernel Device Manager... Nov 21 19:59:53 debian systemd[1]: Started Flush Journal to Persistent Storage. Nov 21 19:59:53 debian systemd-udevd[278]: Network interface NamePolicy= disabled on kernel command line, ignoring. Nov 21 19:59:53 debian systemd[1]: Started udev Kernel Device Manager. Nov 21 19:59:53 debian kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Nov 21 19:59:53 debian kernel: ACPI: Power Button [PWRF] Nov 21 19:59:53 debian systemd-udevd[283]: Using default interface naming scheme 'v240'. Nov 21 19:59:53 debian systemd-udevd[283]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 21 19:59:53 debian systemd-udevd[280]: Using default interface naming scheme 'v240'. Nov 21 19:59:53 debian systemd-udevd[280]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 21 19:59:53 debian systemd[1]: Found device /dev/ttyS0. Nov 21 19:59:53 debian kernel: sr 0:0:1:0: Attached scsi generic sg0 type 5 Nov 21 19:59:53 debian systemd[1]: Found device /dev/disk/by-uuid/0DD8-3CA1. Nov 21 19:59:53 debian systemd-udevd[286]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 21 19:59:53 debian systemd[1]: Mounting /boot/efi... Nov 21 19:59:53 debian systemd[1]: Mounted /boot/efi. Nov 21 19:59:53 debian systemd[1]: Reached target Local File Systems. Nov 21 19:59:53 debian systemd[1]: Condition check resulted in Commit a transient machine-id on disk being skipped. Nov 21 19:59:53 debian systemd[1]: Starting Preprocess NFS configuration... Nov 21 19:59:53 debian systemd[1]: Condition check resulted in Mark the need to relabel after reboot being skipped. Nov 21 19:59:53 debian systemd[1]: Starting Set console font and keymap... Nov 21 19:59:53 debian systemd[1]: Starting Create Volatile Files and Directories... Nov 21 19:59:53 debian systemd[1]: Starting Load AppArmor profiles... Nov 21 19:59:53 debian systemd[1]: nfs-config.service: Succeeded. Nov 21 19:59:53 debian systemd[1]: Started Preprocess NFS configuration. Nov 21 19:59:53 debian systemd[1]: Started Set console font and keymap. Nov 21 19:59:53 debian systemd[1]: Condition check resulted in RPC security service for NFS server being skipped. Nov 21 19:59:53 debian systemd[1]: Condition check resulted in RPC security service for NFS client and server being skipped. Nov 21 19:59:53 debian systemd[1]: Reached target NFS client services. Nov 21 19:59:53 debian systemd[1]: Starting NFSv4 ID-name mapping service... Nov 21 19:59:53 debian systemd-tmpfiles[315]: [/usr/lib/tmpfiles.d/certmonger.conf:3] Line references path below legacy directory /var/run/, updating /var/run/certmonger → /run/certmonger; please update the tmpfiles.d/ drop-in file accordingly. Nov 21 19:59:53 debian apparmor.systemd[319]: Restarting AppArmor Nov 21 19:59:53 debian systemd[1]: Started NFSv4 ID-name mapping service. Nov 21 19:59:53 debian apparmor.systemd[319]: Reloading AppArmor profiles Nov 21 19:59:53 debian systemd[1]: Started Create Volatile Files and Directories. Nov 21 19:59:53 debian systemd[1]: Starting Update UTMP about System Boot/Shutdown... Nov 21 19:59:53 debian systemd[1]: Starting RPC bind portmap service... Nov 21 19:59:53 debian systemd[1]: Started Update UTMP about System Boot/Shutdown. Nov 21 19:59:53 debian audit[328]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/chronyd" pid=328 comm="apparmor_parser" Nov 21 19:59:53 debian kernel: audit: type=1400 audit(1574366393.862:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/chronyd" pid=328 comm="apparmor_parser" Nov 21 19:59:53 debian apparmor.systemd[319]: Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode Nov 21 19:59:53 debian systemd[1]: Started RPC bind portmap service. Nov 21 19:59:53 debian systemd[1]: Reached target RPC Port Mapper. Nov 21 19:59:54 debian audit[330]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=330 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.054:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=330 comm="apparmor_parser" Nov 21 19:59:54 debian apparmor.systemd[319]: Warning from /etc/apparmor.d (/etc/apparmor.d/usr.sbin.sssd line 54): Warning failed to create cache: usr.sbin.sssd Nov 21 19:59:54 debian audit[336]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=336 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.074:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=336 comm="apparmor_parser" Nov 21 19:59:54 debian audit[336]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=336 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.074:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=336 comm="apparmor_parser" Nov 21 19:59:54 debian audit[336]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=336 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.074:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=336 comm="apparmor_parser" Nov 21 19:59:54 debian audit[337]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=337 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.086:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=337 comm="apparmor_parser" Nov 21 19:59:54 debian systemd[1]: Started Load AppArmor profiles. Nov 21 19:59:54 debian systemd[1]: Reached target System Initialization. Nov 21 19:59:54 debian systemd[1]: Started Daily man-db regeneration. Nov 21 19:59:54 debian audit[338]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=338 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.102:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=338 comm="apparmor_parser" Nov 21 19:59:54 debian systemd[1]: Listening on SSSD Secrets Service responder socket. Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.102:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=338 comm="apparmor_parser" Nov 21 19:59:54 debian audit[338]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=338 comm="apparmor_parser" Nov 21 19:59:54 debian systemd[1]: Listening on Virtual machine log manager socket. Nov 21 19:59:54 debian systemd[1]: Starting Docker Socket for the API. Nov 21 19:59:54 debian systemd[1]: Started Daily rotation of log files. Nov 21 19:59:54 debian audit[339]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=339 comm="apparmor_parser" Nov 21 19:59:54 debian kernel: audit: type=1400 audit(1574366394.114:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=339 comm="apparmor_parser" Nov 21 19:59:54 debian systemd[1]: Listening on Virtual machine lock manager socket. Nov 21 19:59:54 debian systemd[1]: Listening on UUID daemon activation socket. Nov 21 19:59:54 debian audit[341]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd" pid=341 comm="apparmor_parser" Nov 21 19:59:54 debian audit[341]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd//qemu_bridge_helper" pid=341 comm="apparmor_parser" Nov 21 19:59:54 debian systemd[1]: Started Daily Cleanup of Temporary Directories. Nov 21 19:59:54 debian systemd[1]: Reached target Timers. Nov 21 19:59:54 debian systemd[1]: Listening on D-Bus System Message Bus Socket. Nov 21 19:59:54 debian systemd[1]: Listening on Virtual machine log manager socket. Nov 21 19:59:54 debian systemd[1]: Listening on Virtual machine lock manager admin socket. Nov 21 19:59:54 debian systemd[1]: Listening on Docker Socket for the API. Nov 21 19:59:54 debian systemd[1]: Started Helper to synchronize boot up for ifupdown. Nov 21 19:59:54 debian systemd[1]: Reached target Sockets. Nov 21 19:59:54 debian systemd[1]: Reached target Basic System. Nov 21 19:59:54 debian systemd[1]: Starting Modem Manager... Nov 21 19:59:54 debian systemd[1]: Starting Disk Manager... Nov 21 19:59:54 debian systemd[1]: Starting System Logging Service... Nov 21 19:59:54 debian systemd[1]: Started D-Bus System Message Bus. Nov 21 19:59:54 debian systemd[1]: Starting firewalld - dynamic firewall daemon... Nov 21 19:59:54 debian systemd[1]: Starting WPA supplicant... Nov 21 19:59:54 debian systemd[1]: Condition check resulted in getty on tty2-tty6 if dbus and logind are not available being skipped. Nov 21 19:59:54 debian systemd[1]: Starting Restore /etc/resolv.conf if the system crashed before the ppp link was shut down... Nov 21 19:59:54 debian systemd[1]: Starting System Security Services Daemon... Nov 21 19:59:54 debian rsyslogd[351]: imuxsock: Acquired UNIX socket '/run/systemd/journal/syslog' (fd 3) from systemd. [v8.1901.0] Nov 21 19:59:54 debian rsyslogd[351]: [origin software="rsyslogd" swVersion="8.1901.0" x-pid="351" x-info="https://www.rsyslog.com"] start Nov 21 19:59:54 debian systemd[1]: Started System Logging Service. Nov 21 19:59:54 debian systemd[1]: pppd-dns.service: Succeeded. Nov 21 19:59:54 debian systemd[1]: Started Restore /etc/resolv.conf if the system crashed before the ppp link was shut down. Nov 21 19:59:54 debian udisksd[350]: udisks daemon version 2.8.1 starting Nov 21 19:59:54 debian ModemManager[349]: ModemManager (version 1.10.0) starting in system bus... Nov 21 19:59:54 debian systemd[1]: Started WPA supplicant. Nov 21 19:59:54 debian wpa_supplicant[354]: Successfully initialized wpa_supplicant Nov 21 19:59:54 debian dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.3' (uid=0 pid=349 comm="/usr/sbin/ModemManager --filter-policy=strict ") Nov 21 19:59:54 debian systemd[1]: Starting Authorization Manager... Nov 21 19:59:54 debian polkitd[368]: started daemon version 0.105 using authority implementation `local' version `0.105' Nov 21 19:59:54 debian dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 21 19:59:54 debian systemd[1]: Started Authorization Manager. Nov 21 19:59:55 debian systemd[1]: Started Modem Manager. Nov 21 19:59:55 debian systemd[1]: Started Disk Manager. Nov 21 19:59:55 debian sssd[359]: Starting up Nov 21 19:59:55 debian udisksd[350]: Acquired the name org.freedesktop.UDisks2 on the system message bus Nov 21 19:59:55 debian sssd[be[380]: Starting up Nov 21 19:59:55 debian systemd[1]: Started firewalld - dynamic firewall daemon. Nov 21 19:59:55 debian systemd[1]: Reached target Network (Pre). Nov 21 19:59:55 debian systemd[1]: Starting Raise network interfaces... Nov 21 19:59:55 debian systemd[1]: Starting Network Manager... Nov 21 19:59:55 debian NetworkManager[383]: [1574366395.8609] NetworkManager (version 1.14.6) is starting... (for the first time) Nov 21 19:59:55 debian NetworkManager[383]: [1574366395.8623] Read config: /etc/NetworkManager/NetworkManager.conf (lib: no-mac-addr-change.conf) (etc: noauto.conf) Nov 21 19:59:55 debian systemd[1]: Started Network Manager. Nov 21 19:59:55 debian sssd[398]: Starting up Nov 21 19:59:55 debian systemd[1]: Starting Network Manager Wait Online... Nov 21 19:59:55 debian NetworkManager[383]: [1574366395.9001] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Nov 21 19:59:55 debian NetworkManager[383]: [1574366395.9071] manager[0x55b0d9134020]: monitoring kernel firmware directory '/lib/firmware'. Nov 21 19:59:55 debian NetworkManager[383]: [1574366395.9076] monitoring ifupdown state file '/run/network/ifstate'. Nov 21 19:59:55 debian dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.6' (uid=0 pid=383 comm="/usr/sbin/NetworkManager --no-daemon ") Nov 21 19:59:55 debian systemd[1]: Starting Hostname Service... Nov 21 19:59:55 debian kernel: kauditd_printk_skb: 2 callbacks suppressed Nov 21 19:59:55 debian kernel: audit: type=1400 audit(1574366395.962:13): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:55 debian audit[398]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:55 debian audit[398]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366395.986:14): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian audit[398]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.062:15): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian audit[398]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.070:16): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian audit[398]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.122:17): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian audit[398]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.130:18): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=398 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 19:59:56 debian dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 21 19:59:56 debian systemd[1]: Started Hostname Service. Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.1690] hostname: hostname: using hostnamed Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.1691] hostname: hostname changed from (none) to "debian" Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.1695] dns-mgr[0x55b0d91408f0]: init: dns=default, rc-manager=resolvconf Nov 21 19:59:56 debian dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.6' (uid=0 pid=383 comm="/usr/sbin/NetworkManager --no-daemon ") Nov 21 19:59:56 debian systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 21 19:59:56 debian dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Nov 21 19:59:56 debian systemd[1]: Started Network Manager Script Dispatcher Service. Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2296] ifupdown: interface-parser: parsing file /etc/network/interfaces Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2297] ifupdown: interface-parser: source line includes interfaces file(s) /etc/network/interfaces.d Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2297] ifupdown: interface-parser: source line includes interfaces file(s) /etc/network/interfaces.d/50-cloud-init Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2297] ifupdown: interface-parser: parsing file /etc/network/interfaces.d/50-cloud-init Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2297] ifupdown: interface-parser: finished parsing file /etc/network/interfaces.d/50-cloud-init Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2298] ifupdown: interface-parser: source line includes interfaces file(s) /run/network/interfaces.d Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2298] ifupdown: Failed to open directory /run/network/interfaces.d: Error opening directory “/run/network/interfaces.d”: No such file or directory Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2298] ifupdown: interface-parser: finished parsing file /etc/network/interfaces Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2315] ifupdown: guessed connection type (eth0) = 802-3-ethernet Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2316] ifupdown: update_connection_setting_from_if_block: name:eth0, type:802-3-ethernet, id:Ifupdown (eth0), uuid: 681b428f-beaf-8932-dce4-687ed5bae28e Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2328] ifupdown: management mode: unmanaged Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2329] settings: Loaded settings plugin: SettingsPluginIfupdown ("/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-settings-plugin-ifupdown.so") Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2329] settings: Loaded settings plugin: NMSKeyfilePlugin (internal) Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2350] manager: rfkill: WiFi enabled by radio killswitch; enabled by state file Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2361] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2369] manager: Networking is enabled by state file Nov 21 19:59:56 debian nm-dispatcher[440]: req:1 'hostname': new request (2 scripts) Nov 21 19:59:56 debian nm-dispatcher[440]: req:1 'hostname': start running ordered scripts... Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2390] dhcp-init: Using DHCP client 'dhclient' Nov 21 19:59:56 debian systemd[1]: Started System Security Services Daemon. Nov 21 19:59:56 debian dhclient[429]: Internet Systems Consortium DHCP Client 4.4.1 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.266:19): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0e.0/virtio4/net/eth0/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:56 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0e.0/virtio4/net/eth0/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:56 debian ifup[382]: Internet Systems Consortium DHCP Client 4.4.1 Nov 21 19:59:56 debian ifup[382]: Copyright 2004-2018 Internet Systems Consortium. Nov 21 19:59:56 debian ifup[382]: All rights reserved. Nov 21 19:59:56 debian ifup[382]: For info, please visit https://www.isc.org/software/dhcp/ Nov 21 19:59:56 debian systemd[1]: Reached target User and Group Name Lookups. Nov 21 19:59:56 debian dhclient[429]: Copyright 2004-2018 Internet Systems Consortium. Nov 21 19:59:56 debian systemd[1]: Starting Login Service... Nov 21 19:59:56 debian dhclient[429]: All rights reserved. Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2855] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-bluetooth.so) Nov 21 19:59:56 debian dhclient[429]: For info, please visit https://www.isc.org/software/dhcp/ Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2871] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-adsl.so) Nov 21 19:59:56 debian dhclient[429]: Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2971] Loaded device plugin: NMTeamFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-team.so) Nov 21 19:59:56 debian dhclient[429]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.2995] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-wwan.so) Nov 21 19:59:56 debian ifup[382]: Listening on LPF/eth0/52:54:00:12:34:56 Nov 21 19:59:56 debian ifup[382]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 21 19:59:56 debian ifup[382]: Sending on Socket/fallback Nov 21 19:59:56 debian ifup[382]: DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 3 Nov 21 19:59:56 debian dhclient[429]: Sending on LPF/eth0/52:54:00:12:34:56 Nov 21 19:59:56 debian dhclient[429]: Sending on Socket/fallback Nov 21 19:59:56 debian dhclient[429]: DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 3 Nov 21 19:59:56 debian dhclient[429]: DHCPOFFER of 172.27.0.15 from 172.27.0.2 Nov 21 19:59:56 debian ifup[382]: DHCPOFFER of 172.27.0.15 from 172.27.0.2 Nov 21 19:59:56 debian ifup[382]: DHCPREQUEST for 172.27.0.15 on eth0 to 255.255.255.255 port 67 Nov 21 19:59:56 debian dhclient[429]: DHCPREQUEST for 172.27.0.15 on eth0 to 255.255.255.255 port 67 Nov 21 19:59:56 debian dhclient[429]: DHCPACK of 172.27.0.15 from 172.27.0.2 Nov 21 19:59:56 debian ifup[382]: DHCPACK of 172.27.0.15 from 172.27.0.2 Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3031] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/1.14.6/libnm-device-plugin-wifi.so) Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3053] device (lo): carrier: link connected Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3085] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3160] device (eth0): carrier: link connected Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3175] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3324] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3415] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Nov 21 19:59:56 debian kernel: IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.342:20): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:56 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.3658] device (eth1): carrier: link connected Nov 21 19:59:56 debian systemd-logind[449]: Watching system buttons on /dev/input/event1 (Power Button) Nov 21 19:59:56 debian systemd-logind[449]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 21 19:59:56 debian systemd-logind[449]: New seat seat0. Nov 21 19:59:56 debian nm-dispatcher[440]: req:2 'connectivity-change': new request (2 scripts) Nov 21 19:59:56 debian nm-dispatcher[440]: req:2 'connectivity-change': start running ordered scripts... Nov 21 19:59:56 debian systemd[1]: Started Login Service. Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.4095] manager: NetworkManager state is now CONNECTED_GLOBAL Nov 21 19:59:56 debian dhclient[429]: bound to 172.27.0.15 -- renewal in 33506 seconds. Nov 21 19:59:56 debian ifup[382]: bound to 172.27.0.15 -- renewal in 33506 seconds. Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.4525] modem-manager: ModemManager available Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.4803] device (eth1): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed') Nov 21 19:59:56 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:56 debian kernel: audit: type=1400 audit(1574366396.478:21): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:56 debian NetworkManager[383]: [1574366396.4977] manager: startup complete Nov 21 19:59:56 debian systemd[1]: Started Network Manager Wait Online. Nov 21 19:59:56 debian systemd[1]: Started Raise network interfaces. Nov 21 19:59:56 debian systemd[1]: Reached target Network. Nov 21 19:59:56 debian systemd[1]: Starting OpenBSD Secure Shell server... Nov 21 19:59:56 debian systemd[1]: Started privileged operations for unprivileged applications. Nov 21 19:59:56 debian systemd[1]: Starting Certificate monitoring and PKI enrollment... Nov 21 19:59:56 debian systemd[1]: Starting chrony, an NTP client/server... Nov 21 19:59:56 debian systemd[1]: Starting NFS Mount Daemon... Nov 21 19:59:56 debian systemd[1]: Started Unattended Upgrades Shutdown. Nov 21 19:59:56 debian systemd[1]: Reached target Network is Online. Nov 21 19:59:56 debian systemd[1]: Starting Docker Application Container Engine... Nov 21 19:59:56 debian chronyd[526]: chronyd version 3.4 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 -DEBUG) Nov 21 19:59:56 debian chronyd[526]: Frequency 0.000 +/- 1000000.000 ppm read from /var/lib/chrony/chrony.drift Nov 21 19:59:56 debian chronyd[526]: Loaded seccomp filter Nov 21 19:59:56 debian systemd[1]: Started Certificate monitoring and PKI enrollment. Nov 21 19:59:56 debian sshd[530]: Server listening on 0.0.0.0 port 22. Nov 21 19:59:56 debian sshd[530]: Server listening on :: port 22. Nov 21 19:59:56 debian systemd[1]: Started OpenBSD Secure Shell server. Nov 21 19:59:56 debian systemd[1]: Started chrony, an NTP client/server. Nov 21 19:59:56 debian systemd[1]: Started NFS Mount Daemon. Nov 21 19:59:56 debian systemd[1]: Starting NFS server and services... Nov 21 19:59:56 debian rpc.mountd[549]: Version 1.3.3 starting Nov 21 19:59:57 debian nfsdcltrack[555]: Failed to init database: -13 Nov 21 19:59:57 debian kernel: NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory Nov 21 19:59:57 debian kernel: NFSD: starting 90-second grace period (net f0000098) Nov 21 19:59:57 debian systemd[1]: Started NFS server and services. Nov 21 19:59:57 debian systemd[1]: Reached target Remote File Systems (Pre). Nov 21 19:59:57 debian systemd[1]: Reached target Remote File Systems. Nov 21 19:59:57 debian systemd[1]: Starting Deferred execution scheduler... Nov 21 19:59:57 debian systemd[1]: Starting LSB: Control pmie (performance inference engine for PCP)... Nov 21 19:59:57 debian systemd[1]: Starting LSB: Control pmcd (the collection daemon for PCP)... Nov 21 19:59:57 debian systemd[1]: Starting Virtualization daemon... Nov 21 19:59:57 debian systemd[1]: Starting LSB: exim Mail Transport Agent... Nov 21 19:59:57 debian systemd[1]: Started Regular background program processing daemon. Nov 21 19:59:57 debian systemd[1]: Starting LSB: Control pmproxy (the pmcd proxy daemon for PCP)... Nov 21 19:59:57 debian cron[578]: (CRON) INFO (pidfile fd = 3) Nov 21 19:59:57 debian systemd[1]: Starting Permit User Sessions... Nov 21 19:59:57 debian cron[578]: (CRON) INFO (Running @reboot jobs) Nov 21 19:59:57 debian systemd[1]: Starting LSB: Control pmlogger (the performance metrics logger for PCP)... Nov 21 19:59:57 debian systemd[1]: Started Deferred execution scheduler. Nov 21 19:59:57 debian systemd[1]: Started Permit User Sessions. Nov 21 19:59:57 debian systemd[1]: Started Getty on tty1. Nov 21 19:59:57 debian systemd[1]: Started Serial Getty on ttyS0. Nov 21 19:59:57 debian systemd[1]: Reached target Login Prompts. Nov 21 19:59:57 debian ModemManager[349]: Couldn't check support for device '/sys/devices/pci0000:00/0000:00:0e.0': not supported by any plugin Nov 21 19:59:57 debian ModemManager[349]: Couldn't check support for device '/sys/devices/pci0000:00/0000:00:0f.0': not supported by any plugin Nov 21 19:59:57 debian systemd[1]: Started Virtualization daemon. Nov 21 19:59:57 debian systemd[1]: Starting Suspend/Resume Running libvirt Guests... Nov 21 19:59:57 debian pmlogger[585]: /etc/init.d/pmlogger: Warning: Performance Co-Pilot archive logger(s) not permanently enabled. Nov 21 19:59:57 debian systemd[1]: Started Suspend/Resume Running libvirt Guests. Nov 21 19:59:57 debian pmproxy[579]: Starting pmproxy ... Nov 21 19:59:58 debian pmlogger[585]: To enable pmlogger, run the following as root: Nov 21 19:59:58 debian systemd[1]: Started LSB: Control pmproxy (the pmcd proxy daemon for PCP). Nov 21 19:59:58 debian pmlogger[585]: update-rc.d -f pmlogger remove Nov 21 19:59:58 debian pmlogger[585]: update-rc.d pmlogger defaults 94 06 Nov 21 19:59:58 debian pmlogger[585]: Starting pmlogger ... Nov 21 19:59:58 debian systemd[1]: Started LSB: Control pmlogger (the performance metrics logger for PCP). Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.355895334Z" level=info msg="libcontainerd: started new docker-containerd process" pid=1097 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.357902101Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.357927842Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.358006404Z" level=info msg="ccResolverWrapper: sending new addresses to cc: [{unix:///var/run/docker/containerd/containerd.sock 0 }]" module=grpc Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.358037967Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.358603320Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc000137a10, CONNECTING" module=grpc Nov 21 19:59:58 debian pmie[568]: /etc/init.d/pmie: Warning: Performance Co-Pilot Inference Engine (pmie) not permanently enabled. Nov 21 19:59:58 debian pmie[568]: To enable pmie, run the following as root: Nov 21 19:59:58 debian pmie[568]: update-rc.d -f pmie remove Nov 21 19:59:58 debian pmie[568]: update-rc.d pmie defaults 94 06 Nov 21 19:59:58 debian pmie[568]: Starting pmie ... Nov 21 19:59:58 debian systemd[1]: Started LSB: Control pmie (performance inference engine for PCP). Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.778616975Z" level=info msg="starting containerd" revision=9754871865f7fe2f4e74d43e2fc7ccd237edcbce version=18.09.1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.779195143Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.779719216Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.782182895Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.btrfs" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.btrfs must be a btrfs filesystem to be used with the btrfs snapshotter" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.782495027Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.814610964Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.aufs" error="modprobe aufs failed: \"modprobe: FATAL: Module aufs not found in directory /lib/modules/4.19.0-6-cloud-amd64\\n\": exit status 1" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.818585832Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.820305287Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.821165753Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.823093042Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.zfs" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.823360341Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.823661928Z" level=warning msg="could not use snapshotter btrfs in metadata plugin" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.btrfs must be a btrfs filesystem to be used with the btrfs snapshotter" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.823906352Z" level=warning msg="could not use snapshotter aufs in metadata plugin" error="modprobe aufs failed: \"modprobe: FATAL: Module aufs not found in directory /lib/modules/4.19.0-6-cloud-amd64\\n\": exit status 1" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.824130344Z" level=warning msg="could not use snapshotter zfs in metadata plugin" error="path /var/lib/docker/containerd/daemon/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.827801963Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.828134465Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.828465498Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.828728531Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.834289872Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.834814085Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.838284685Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.838584718Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.838901457Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.844708957Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.845284481Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.848905382Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870368190Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870423137Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870475136Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870492837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870506357Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870520976Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870533793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870547162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870560540Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870576151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.870589745Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.877211447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.877509308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.877704397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.877730170Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.878131688Z" level=info msg=serving... address=/var/run/docker/containerd/containerd-debug.sock Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.878378696Z" level=info msg=serving... address=/var/run/docker/containerd/containerd.sock Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.878561326Z" level=info msg="containerd successfully booted in 0.101451s" Nov 21 19:59:58 debian dockerd[523]: time="2019-11-21T19:59:58.890688145Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc000137a10, READY" module=grpc Nov 21 19:59:58 debian sshd[1316]: Did not receive identification string from 172.27.0.2 port 56882 Nov 21 19:59:59 debian pmcd[569]: Starting pmcd ... Nov 21 19:59:59 debian sshd[1332]: Accepted publickey for root from 172.27.0.2 port 56884 ssh2: RSA SHA256:n1YTxRMBLaZoc2vmRy+1/hg9jrJNgUdQeSzJHTuiKUY Nov 21 19:59:59 debian sshd[1332]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 21 19:59:59 debian systemd[1]: Created slice User Slice of UID 0. Nov 21 19:59:59 debian systemd[1]: Starting User Runtime Directory /run/user/0... Nov 21 19:59:59 debian systemd-logind[449]: New session 1 of user root. Nov 21 19:59:59 debian systemd[1]: Started User Runtime Directory /run/user/0. Nov 21 19:59:59 debian systemd[1]: Starting User Manager for UID 0... Nov 21 19:59:59 debian systemd[1398]: pam_unix(systemd-user:session): session opened for user root by (uid=0) Nov 21 19:59:59 debian systemd[1]: Started LSB: Control pmcd (the collection daemon for PCP). Nov 21 19:59:59 debian sshd[1400]: Did not receive identification string from 172.27.0.2 port 56836 Nov 21 19:59:59 debian systemd[1398]: Starting D-Bus User Message Bus Socket. Nov 21 19:59:59 debian systemd[1398]: Reached target Paths. Nov 21 19:59:59 debian systemd[1398]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 19:59:59 debian systemd[1398]: Listening on GnuPG network certificate management daemon. Nov 21 19:59:59 debian systemd[1398]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 21 19:59:59 debian systemd[1398]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 19:59:59 debian systemd[1398]: Reached target Timers. Nov 21 19:59:59 debian systemd[1398]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 21 19:59:59 debian systemd[1398]: Listening on D-Bus User Message Bus Socket. Nov 21 19:59:59 debian systemd[1398]: Reached target Sockets. Nov 21 19:59:59 debian systemd[1398]: Reached target Basic System. Nov 21 19:59:59 debian systemd[1]: Started User Manager for UID 0. Nov 21 19:59:59 debian systemd[1398]: Reached target Default. Nov 21 19:59:59 debian systemd[1398]: Startup finished in 119ms. Nov 21 19:59:59 debian systemd[1]: Started Session 1 of user root. Nov 21 19:59:59 debian sshd[1332]: Received disconnect from 172.27.0.2 port 56884:11: disconnected by user Nov 21 19:59:59 debian sshd[1332]: Disconnected from user root 172.27.0.2 port 56884 Nov 21 19:59:59 debian sshd[1332]: pam_unix(sshd:session): session closed for user root Nov 21 19:59:59 debian systemd[1]: session-1.scope: Succeeded. Nov 21 19:59:59 debian systemd-logind[449]: Session 1 logged out. Waiting for processes to exit. Nov 21 19:59:59 debian systemd-logind[449]: Removed session 1. Nov 21 19:59:59 debian audit[1374]: AVC apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1374 comm="apparmor_parser" Nov 21 19:59:59 debian kernel: audit: type=1400 audit(1574366399.470:22): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1374 comm="apparmor_parser" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.494537161Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.495300159Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.497970222Z" level=info msg="ccResolverWrapper: sending new addresses to cc: [{unix:///var/run/docker/containerd/containerd.sock 0 }]" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.499090659Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.499318147Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0007a0fb0, CONNECTING" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.499640542Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0007a0fb0, READY" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.501320876Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.502166679Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.506625259Z" level=info msg="ccResolverWrapper: sending new addresses to cc: [{unix:///var/run/docker/containerd/containerd.sock 0 }]" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.506940468Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.507148097Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0007a1910, CONNECTING" module=grpc Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.507500522Z" level=info msg="pickfirstBalancer: HandleSubConnStateChange: 0xc0007a1910, READY" module=grpc Nov 21 19:59:59 debian sshd[1435]: Accepted publickey for root from 172.27.0.2 port 56890 ssh2: RSA SHA256:n1YTxRMBLaZoc2vmRy+1/hg9jrJNgUdQeSzJHTuiKUY Nov 21 19:59:59 debian sshd[1435]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 21 19:59:59 debian systemd[1]: Started Session 3 of user root. Nov 21 19:59:59 debian systemd-logind[449]: New session 3 of user root. Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.587044940Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6384] keyfile: add connection /etc/NetworkManager/system-connections/static-52:54:01.nmconnection (818b8406-5b1a-4e2c-8038-81eb58a4790b,"static-52:54:01") Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6510] audit: op="connection-add" uuid="818b8406-5b1a-4e2c-8038-81eb58a4790b" name="static-52:54:01" pid=1510 uid=0 result="success" Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6665] policy: auto-activating connection 'static-52:54:01' (818b8406-5b1a-4e2c-8038-81eb58a4790b) Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6677] device (eth1): Activation: starting connection 'static-52:54:01' (818b8406-5b1a-4e2c-8038-81eb58a4790b) Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6682] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6915] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.6982] agent-manager: req[0x55b0d91b90c0, :1.22/nmcli-connect/0]: agent registered Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7020] device (eth1): state change: config -> deactivating (reason 'new-activation', sys-iface-state: 'managed') Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7139] device (eth1): disconnecting for new activation request. Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7163] audit: op="connection-activate" uuid="818b8406-5b1a-4e2c-8038-81eb58a4790b" name="static-52:54:01" pid=1522 uid=0 result="success" Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7166] device (eth1): state change: deactivating -> disconnected (reason 'new-activation', sys-iface-state: 'managed') Nov 21 19:59:59 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7379] device (eth1): Activation: starting connection 'static-52:54:01' (818b8406-5b1a-4e2c-8038-81eb58a4790b) Nov 21 19:59:59 debian nm-dispatcher[440]: req:3 'down' [eth1]: new request (2 scripts) Nov 21 19:59:59 debian nm-dispatcher[440]: req:3 'down' [eth1]: start running ordered scripts... Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7640] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.768956952Z" level=info msg="Graph migration to content-addressability took 0.00 seconds" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.769242785Z" level=warning msg="Your kernel does not support swap memory limit" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.769626938Z" level=warning msg="Your kernel does not support cgroup rt period" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.769649507Z" level=warning msg="Your kernel does not support cgroup rt runtime" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.769677197Z" level=warning msg="Your kernel does not support cgroup blkio weight" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.769689803Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" Nov 21 19:59:59 debian dockerd[523]: time="2019-11-21T19:59:59.770647543Z" level=info msg="Loading containers: start." Nov 21 19:59:59 debian NetworkManager[383]: [1574366399.7783] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Nov 21 19:59:59 debian kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 21 19:59:59 debian kernel: Bridge firewalling registered Nov 21 20:00:00 debian pcp-pmie[1783]: Low random number entropy available 1.93%avail@debian Nov 21 20:00:02 debian systemd-udevd[288]: Using default interface naming scheme 'v240'. Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.3621] manager: (virbr0): new Bridge device (/org/freedesktop/NetworkManager/Devices/4) Nov 21 20:00:02 debian systemd-udevd[288]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 21 20:00:02 debian systemd-udevd[288]: Could not generate persistent MAC address for virbr0: No such file or directory Nov 21 20:00:02 debian kernel: tun: Universal TUN/TAP device driver, 1.6 Nov 21 20:00:02 debian kernel: virbr0: port 1(virbr0-nic) entered blocking state Nov 21 20:00:02 debian kernel: virbr0: port 1(virbr0-nic) entered disabled state Nov 21 20:00:02 debian systemd-udevd[284]: Using default interface naming scheme 'v240'. Nov 21 20:00:02 debian kernel: device virbr0-nic entered promiscuous mode Nov 21 20:00:02 debian kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 21 20:00:02 debian kernel: audit: type=1400 audit(1574366402.466:24): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:02 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.4923] manager: (virbr0-nic): new Tun device (/org/freedesktop/NetworkManager/Devices/5) Nov 21 20:00:02 debian systemd-udevd[284]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 21 20:00:02 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:02 debian kernel: audit: type=1400 audit(1574366402.482:25): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.5708] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Nov 21 20:00:02 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:02 debian kernel: audit: type=1400 audit(1574366402.566:26): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/virtio5/net/eth1/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.5961] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.6107] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.6189] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.6790] device (eth1): Activation: successful, device activated. Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D PREROUTING -m addrtype --dst-type LOCAL -j DOCKER' failed: iptables v1.8.2 (nf_tables): Chain 'DOCKER' does not exist Try `iptables -h' or 'iptables --help' for more information. Nov 21 20:00:02 debian nm-dispatcher[440]: req:4 'up' [eth1]: new request (2 scripts) Nov 21 20:00:02 debian nm-dispatcher[440]: req:4 'up' [eth1]: start running ordered scripts... Nov 21 20:00:02 debian nm-dispatcher[440]: req:5 'connectivity-change': new request (2 scripts) Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.6996] device (virbr0-nic): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.7054] device (virbr0-nic): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'external') Nov 21 20:00:02 debian systemd[1]: Reloading Network Manager. Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D OUTPUT -m addrtype --dst-type LOCAL ! --dst 127.0.0.0/8 -j DOCKER' failed: iptables v1.8.2 (nf_tables): Chain 'DOCKER' does not exist Try `iptables -h' or 'iptables --help' for more information. Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.7505] audit: op="reload" arg="0" pid=3140 uid=0 result="success" Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.7512] config: signal: SIGHUP,config-files,values,values-user,dns-mode (/etc/NetworkManager/NetworkManager.conf (lib: no-mac-addr-change.conf) (etc: dns.conf, noauto.conf)) Nov 21 20:00:02 debian NetworkManager[383]: [1574366402.7518] dns-mgr: init: dns=none, rc-manager=unmanaged Nov 21 20:00:02 debian dbus-send[3140]: method return time=1574366402.754667 sender=:1.6 -> destination=:1.24 serial=427 reply_serial=2 Nov 21 20:00:02 debian systemd[1]: Reloaded Network Manager. Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D OUTPUT -m addrtype --dst-type LOCAL -j DOCKER' failed: iptables v1.8.2 (nf_tables): Chain 'DOCKER' does not exist Try `iptables -h' or 'iptables --help' for more information. Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D PREROUTING' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 21 20:00:02 debian nm-dispatcher[440]: req:5 'connectivity-change': start running ordered scripts... Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -D OUTPUT' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t nat -X DOCKER' failed: iptables: No chain/target/match by that name. Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER' failed: iptables: No chain/target/match by that name. Nov 21 20:00:02 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER-ISOLATION-STAGE-1' failed: iptables: No chain/target/match by that name. Nov 21 20:00:03 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER-ISOLATION-STAGE-2' failed: iptables: No chain/target/match by that name. Nov 21 20:00:03 debian kernel: virbr0: port 1(virbr0-nic) entered blocking state Nov 21 20:00:03 debian kernel: virbr0: port 1(virbr0-nic) entered listening state Nov 21 20:00:03 debian kernel: audit: type=1400 audit(1574366403.042:27): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:03 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:03 debian audit[359]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:03 debian kernel: audit: type=1400 audit(1574366403.050:28): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=359 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:00:03 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -t filter -X DOCKER-ISOLATION' failed: iptables: No chain/target/match by that name. Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.0801] device (virbr0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.0840] keyfile: add connection /run/NetworkManager/system-connections/virbr0.nmconnection (e4ede968-cd10-4f9c-99b6-8e4f4b6f2061,"virbr0") Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.0960] device (virbr0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1103] device (virbr0): Activation: starting connection 'virbr0' (e4ede968-cd10-4f9c-99b6-8e4f4b6f2061) Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1143] device (virbr0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1206] device (virbr0): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1252] keyfile: add connection /run/NetworkManager/system-connections/virbr0-nic.nmconnection (1fb8d870-7048-4828-b004-641ea97da230,"virbr0-nic") Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1344] device (virbr0-nic): Activation: starting connection 'virbr0-nic' (1fb8d870-7048-4828-b004-641ea97da230) Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1364] device (virbr0): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1398] device (virbr0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1515] device (virbr0-nic): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1543] device (virbr0-nic): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1563] device (virbr0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1584] device (virbr0-nic): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1635] device (virbr0): bridge port virbr0-nic was attached Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1637] device (virbr0-nic): Activation: connection 'virbr0-nic' enslaved, continuing activation Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1661] device (virbr0-nic): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.1713] device (virbr0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.2197] device (virbr0): Activation: successful, device activated. Nov 21 20:00:03 debian nm-dispatcher[440]: req:6 'up' [virbr0]: new request (2 scripts) Nov 21 20:00:03 debian nm-dispatcher[440]: req:6 'up' [virbr0]: start running ordered scripts... Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.2243] device (virbr0-nic): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.2251] device (virbr0-nic): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.2601] device (virbr0-nic): Activation: successful, device activated. Nov 21 20:00:03 debian nm-dispatcher[440]: req:7 'up' [virbr0-nic]: new request (2 scripts) Nov 21 20:00:03 debian dnsmasq[3395]: started, version 2.80 cachesize 150 Nov 21 20:00:03 debian dnsmasq[3395]: compile time options: IPv6 GNU-getopt DBus i18n IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC loop-detect inotify dumpfile Nov 21 20:00:03 debian dnsmasq-dhcp[3395]: DHCP, IP range 192.168.122.2 -- 192.168.122.254, lease time 1h Nov 21 20:00:03 debian dnsmasq-dhcp[3395]: DHCP, sockets bound exclusively to interface virbr0 Nov 21 20:00:03 debian dnsmasq[3395]: reading /etc/resolv.conf Nov 21 20:00:03 debian dnsmasq[3395]: using nameserver 10.111.112.100#53 Nov 21 20:00:03 debian dnsmasq[3395]: read /etc/hosts - 5 addresses Nov 21 20:00:03 debian nm-dispatcher[440]: req:7 'up' [virbr0-nic]: start running ordered scripts... Nov 21 20:00:03 debian dnsmasq[3395]: read /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses Nov 21 20:00:03 debian dnsmasq-dhcp[3395]: read /var/lib/libvirt/dnsmasq/default.hostsfile Nov 21 20:00:03 debian kernel: virbr0: port 1(virbr0-nic) entered disabled state Nov 21 20:00:03 debian kernel: Initializing XFRM netlink socket Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.3427] device (virbr0-nic): state change: activated -> unmanaged (reason 'connection-assumed', sys-iface-state: 'external') Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.3447] device (virbr0): bridge port virbr0-nic was detached Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.3450] device (virbr0-nic): released from master device virbr0 Nov 21 20:00:03 debian systemd-udevd[288]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. Nov 21 20:00:03 debian nm-dispatcher[440]: req:8 'down' [virbr0-nic]: new request (2 scripts) Nov 21 20:00:03 debian nm-dispatcher[440]: req:8 'down' [virbr0-nic]: start running ordered scripts... Nov 21 20:00:03 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -D FORWARD -i docker0 -o docker0 -j DROP' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 21 20:00:03 debian NetworkManager[383]: [1574366403.5121] manager: (docker0): new Bridge device (/org/freedesktop/NetworkManager/Devices/6) Nov 21 20:00:03 debian kernel: IPv6: ADDRCONF(NETDEV_UP): docker0: link is not ready Nov 21 20:00:04 debian dockerd[523]: time="2019-11-21T20:00:04.037914059Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Nov 21 20:00:04 debian firewalld[353]: WARNING: COMMAND_FAILED: '/usr/sbin/iptables -w10 -D FORWARD -i docker0 -o docker0 -j DROP' failed: iptables: Bad rule (does a matching rule exist in that chain?). Nov 21 20:00:04 debian dockerd[523]: time="2019-11-21T20:00:04.632527898Z" level=info msg="Loading containers: done." Nov 21 20:00:04 debian systemd[1398]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck806902510-merged.mount: Succeeded. Nov 21 20:00:04 debian systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck806902510-merged.mount: Succeeded. Nov 21 20:00:05 debian dockerd[523]: time="2019-11-21T20:00:05.357644618Z" level=info msg="Docker daemon" commit=4c52b90 graphdriver(s)=overlay2 version=18.09.1 Nov 21 20:00:05 debian dockerd[523]: time="2019-11-21T20:00:05.359482567Z" level=info msg="Daemon has completed initialization" Nov 21 20:00:05 debian systemd[1]: Started Docker Application Container Engine. Nov 21 20:00:05 debian dockerd[523]: time="2019-11-21T20:00:05.460890721Z" level=info msg="API listen on /var/run/docker.sock" Nov 21 20:00:05 debian sshd[4485]: Did not receive identification string from 172.27.0.2 port 56778 Nov 21 20:00:07 x0.cockpit.lan systemd-hostnamed[424]: Changed static host name to 'x0.cockpit.lan' Nov 21 20:00:07 x0.cockpit.lan NetworkManager[383]: [1574366407.1971] hostname: hostname changed from "debian" to "x0.cockpit.lan" Nov 21 20:00:07 x0.cockpit.lan nm-dispatcher[440]: req:9 'hostname': new request (2 scripts) Nov 21 20:00:07 x0.cockpit.lan NetworkManager[383]: [1574366407.1975] policy: set-hostname: set hostname to 'x0.cockpit.lan' (from system configuration) Nov 21 20:00:07 x0.cockpit.lan nm-dispatcher[440]: req:9 'hostname': start running ordered scripts... Nov 21 20:00:07 x0.cockpit.lan systemd-hostnamed[424]: Changed host name to 'x0.cockpit.lan' Nov 21 20:00:07 x0.cockpit.lan nm-dispatcher[440]: req:10 'hostname': new request (2 scripts) Nov 21 20:00:07 x0.cockpit.lan nm-dispatcher[440]: req:10 'hostname': start running ordered scripts... Nov 21 20:00:07 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: getty@tty1.service: Current command vanished from the unit file, execution of the command list won't be resumed. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: serial-getty@ttyS0.service: Current command vanished from the unit file, execution of the command list won't be resumed. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service Socket. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: Listening on Cockpit Web Service Socket. Nov 21 20:00:07 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance factory. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http-redirect instance. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http instance. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http-redirect instance. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http instance. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service... Nov 21 20:00:08 x0.cockpit.lan remotectl[6394]: Generating temporary certificate using: sscg --quiet --lifetime 3650 --key-strength 2048 --cert-key-file /etc/cockpit/ws-certs.d/0-self-signed.cert --cert-file /etc/cockpit/ws-certs.d/0-self-signed.cert --ca-file /etc/cockpit/ws-certs.d/0-self-signed-ca.pem --hostname x0.cockpit.lan --organization b28e3418676c443984dc8bade4c268eb --subject-alt-name localhost --subject-alt-name IP:127.0.0.1/255.255.255.255 Nov 21 20:00:08 x0.cockpit.lan remotectl[6394]: Error generating temporary dummy cert using sscg, falling back to openssl Nov 21 20:00:08 x0.cockpit.lan remotectl[6394]: Generating temporary certificate using: openssl req -x509 -days 36500 -newkey rsa:2048 -keyout /etc/cockpit/ws-certs.d/0-self-signed.YEZHB0.tmp -keyform PEM -nodes -out /etc/cockpit/ws-certs.d/0-self-signed.CCZHB0.tmp -outform PEM -subj /O=b28e3418676c443984dc8bade4c268eb/CN=x0.cockpit.lan -config /tmp/ssl.conf.MCZHB0 -extensions v3_req Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started Cockpit Web Service. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started Cockpit Web Service http instance. Nov 21 20:00:08 x0.cockpit.lan exim4[577]: Starting MTA: exim4. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started LSB: exim Mail Transport Agent. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Reached target Multi-User System. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Reached target Graphical Interface. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting Update UTMP about System Runlevel Changes... Nov 21 20:00:08 x0.cockpit.lan systemd[1]: systemd-update-utmp-runlevel.service: Succeeded. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started Update UTMP about System Runlevel Changes. Nov 21 20:00:08 x0.cockpit.lan cockpit-session[6608]: pam_ssh_add: Failed adding some keys Nov 21 20:00:08 x0.cockpit.lan cockpit-session[6608]: pam_unix(cockpit:session): session opened for user admin by (uid=0) Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Created slice User Slice of UID 1002. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting User Runtime Directory /run/user/1002... Nov 21 20:00:08 x0.cockpit.lan systemd-logind[449]: New session 4 of user admin. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started User Runtime Directory /run/user/1002. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Starting User Manager for UID 1002... Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: pam_unix(systemd-user:session): session opened for user admin by (uid=0) Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Reached target Paths. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 21 20:00:09 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:4 (system bus name :1.29 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Listening on GnuPG network certificate management daemon. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Starting D-Bus User Message Bus Socket. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Reached target Timers. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Listening on D-Bus User Message Bus Socket. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Reached target Sockets. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Reached target Basic System. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started User Manager for UID 1002. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Reached target Default. Nov 21 20:00:08 x0.cockpit.lan systemd[6644]: Startup finished in 47ms. Nov 21 20:00:08 x0.cockpit.lan systemd[1]: Started Session 4 of user admin. Nov 21 20:00:09 x0.cockpit.lan cockpit-ws[6481]: logged in user session Nov 21 20:00:09 x0.cockpit.lan cockpit-ws[6481]: New connection to session Nov 21 20:00:10 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' requested by ':1.32' (uid=1002 pid=6664 comm="cockpit-bridge ") Nov 21 20:00:10 x0.cockpit.lan systemd[1]: Starting Time & Date Service... Nov 21 20:00:10 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' requested by ':1.32' (uid=1002 pid=6664 comm="cockpit-bridge ") Nov 21 20:00:10 x0.cockpit.lan systemd[1]: Starting Realm and Domain Configuration... Nov 21 20:00:10 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:4 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:6664:2014 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:00:10 x0.cockpit.lan pkexec[6865]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 21 20:00:10 x0.cockpit.lan pkexec[6865]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: Loaded settings from: /usr/lib/realmd/realmd-defaults.conf /usr/lib/realmd/realmd-distro.conf /etc/realmd.conf Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: holding daemon: startup Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: starting service Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: connected to bus Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: released daemon: startup Nov 21 20:00:10 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.realmd' Nov 21 20:00:10 x0.cockpit.lan systemd[1]: Started Realm and Domain Configuration. Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: claimed name on bus: org.freedesktop.realmd Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: client using service: :1.32 Nov 21 20:00:10 x0.cockpit.lan realmd[6876]: holding daemon: :1.32 Nov 21 20:00:10 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' requested by ':1.36' (uid=0 pid=6865 comm="/usr/bin/cockpit-bridge --privileged ") Nov 21 20:00:10 x0.cockpit.lan systemd[1]: Starting PackageKit Daemon... Nov 21 20:00:10 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.timedate1' Nov 21 20:00:10 x0.cockpit.lan systemd[1]: Started Time & Date Service. Nov 21 20:00:10 x0.cockpit.lan PackageKit[6911]: daemon start Nov 21 20:00:10 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.PackageKit' Nov 21 20:00:12 x0.cockpit.lan systemd[1]: Started PackageKit Daemon. Nov 21 20:00:12 x0.cockpit.lan update-motd[6019]: hostname: Temporary failure in name resolution Nov 21 20:00:12 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 21 20:00:12 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 21 20:00:12 x0.cockpit.lan systemd[1]: Startup finished in 3.325s (kernel) + 20.789s (userspace) = 24.114s. Nov 21 20:00:13 x0.cockpit.lan PackageKit[6911]: get-updates transaction /2_eaaeaacd from uid 0 finished with success after 2966ms Nov 21 20:00:17 x0.cockpit.lan systemd[1]: NetworkManager-dispatcher.service: Succeeded. Nov 21 20:00:40 x0.cockpit.lan systemd[1]: systemd-hostnamed.service: Succeeded. Nov 21 20:01:46 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:01:46 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Searching for (objectClass=*) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Got server software: ipa Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Got associatedDomain: cockpit.lan Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Found realm: COCKPIT.LAN Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Using 'cockpit-1' operation for method 'Join' invocation on 'org.freedesktop.realmd.KerberosMembership' interface Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: Registered cancellable for operation 'cockpit-1' Nov 21 20:01:48 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:4 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.configure-realm for system-bus-name::1.32 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: holding daemon: current-invocation Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Unconditionally checking packages Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Unconditionally checking packages Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Resolving required packages Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * Resolving required packages Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: CreateTransaction call Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: SetHints call Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: call Resolve (262144, ['freeipa-client', 'sssd-tools', 'sssd', 'libnss-sss', 'libpam-sss']) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: call Resolve completed Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'freeipa-client;4.7.2-3;amd64;installed:debian-stable-main', 'FreeIPA centralized identity framework -- client') Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'libnss-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Nss library for the System Security Services Daemon') Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'libpam-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Pam module for the System Security Services Daemon') Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'sssd;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- metapackage') Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'sssd-tools;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- tools') Nov 21 20:01:48 x0.cockpit.lan PackageKit[6911]: resolve transaction /4_aedbeceb from uid 0 finished with success after 291ms Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: signal: Finished (1, 291) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * LANG=C /usr/sbin/ipa-client-install --domain cockpit.lan --realm COCKPIT.LAN --mkhomedir --enable-dns-updates --unattended --force-join --principal admin -W --force-ntpd Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: * LANG=C /usr/sbin/ipa-client-install --domain cockpit.lan --realm COCKPIT.LAN --mkhomedir --enable-dns-updates --unattended --force-join --principal admin -W --force-ntpd Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: process started: 10389 Nov 21 20:01:48 x0.cockpit.lan realmd[6876]: packages: freeing transtaction Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Option --force-ntpd has been deprecated Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Option --force-ntpd has been deprecated Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Discovery was successful! Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Discovery was successful! Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Client hostname: x0.cockpit.lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Client hostname: x0.cockpit.lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Realm: COCKPIT.LAN Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Realm: COCKPIT.LAN Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: DNS Domain: cockpit.lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: DNS Domain: cockpit.lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: IPA Server: f0.cockpit.lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: IPA Server: f0.cockpit.lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: BaseDN: dc=cockpit,dc=lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: BaseDN: dc=cockpit,dc=lan Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Synchronizing time Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: Synchronizing time Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: No SRV records of NTP servers found and no NTP server or pool address was provided. Nov 21 20:01:49 x0.cockpit.lan realmd[6876]: No SRV records of NTP servers found and no NTP server or pool address was provided. Nov 21 20:01:49 x0.cockpit.lan systemd[1]: Stopping chrony, an NTP client/server... Nov 21 20:01:49 x0.cockpit.lan chronyd[526]: chronyd exiting Nov 21 20:01:49 x0.cockpit.lan systemd[1]: chrony.service: Succeeded. Nov 21 20:01:49 x0.cockpit.lan systemd[1]: Stopped chrony, an NTP client/server. Nov 21 20:01:49 x0.cockpit.lan systemd[1]: Starting chrony, an NTP client/server... Nov 21 20:01:50 x0.cockpit.lan chronyd[10404]: chronyd version 3.4 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 -DEBUG) Nov 21 20:01:50 x0.cockpit.lan chronyd[10404]: Frequency 0.000 +/- 1000000.000 ppm read from /var/lib/chrony/chrony.drift Nov 21 20:01:50 x0.cockpit.lan chronyd[10404]: Loaded seccomp filter Nov 21 20:01:50 x0.cockpit.lan systemd[1]: Started chrony, an NTP client/server. Nov 21 20:01:50 x0.cockpit.lan realmd[6876]: Attempting to sync time with chronyc. Nov 21 20:01:50 x0.cockpit.lan realmd[6876]: Attempting to sync time with chronyc. Nov 21 20:02:10 x0.cockpit.lan realmd[6876]: Process chronyc waitsync failed to sync time! Nov 21 20:02:10 x0.cockpit.lan realmd[6876]: Process chronyc waitsync failed to sync time! Nov 21 20:02:10 x0.cockpit.lan realmd[6876]: Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. Nov 21 20:02:10 x0.cockpit.lan realmd[6876]: Unable to sync time with chrony server, assuming the time is in sync. Please check that 123 UDP port is opened, and any time server is on network. Nov 21 20:02:11 x0.cockpit.lan python2[10389]: GSSAPI client step 1 Nov 21 20:02:11 x0.cockpit.lan python2[10389]: GSSAPI client step 1 Nov 21 20:02:11 x0.cockpit.lan python2[10389]: GSSAPI client step 1 Nov 21 20:02:11 x0.cockpit.lan python2[10389]: GSSAPI client step 2 Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Successfully retrieved CA cert Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Successfully retrieved CA cert Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Subject: CN=Certificate Authority,O=COCKPIT.LAN Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Subject: CN=Certificate Authority,O=COCKPIT.LAN Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Issuer: CN=Certificate Authority,O=COCKPIT.LAN Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Issuer: CN=Certificate Authority,O=COCKPIT.LAN Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Valid From: 2019-11-06 13:32:42 Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Valid From: 2019-11-06 13:32:42 Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Valid Until: 2039-11-06 13:32:42 Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Valid Until: 2039-11-06 13:32:42 Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Nov 21 20:02:12 x0.cockpit.lan realmd[6876]: Nov 21 20:02:13 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 1 Nov 21 20:02:13 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 1 Nov 21 20:02:13 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 1 Nov 21 20:02:13 x0.cockpit.lan ipa-getkeytab[10415]: GSSAPI client step 2 Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Enrolled in IPA realm COCKPIT.LAN Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Enrolled in IPA realm COCKPIT.LAN Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Created /etc/ipa/default.conf Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Created /etc/ipa/default.conf Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Configured sudoers in /etc/nsswitch.conf Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Configured sudoers in /etc/nsswitch.conf Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Configured /etc/sssd/sssd.conf Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Configured /etc/sssd/sssd.conf Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Configured /etc/krb5.conf for IPA realm COCKPIT.LAN Nov 21 20:02:14 x0.cockpit.lan realmd[6876]: Configured /etc/krb5.conf for IPA realm COCKPIT.LAN Nov 21 20:02:19 x0.cockpit.lan python2[10389]: GSSAPI client step 1 Nov 21 20:02:19 x0.cockpit.lan python2[10389]: GSSAPI client step 1 Nov 21 20:02:20 x0.cockpit.lan python2[10389]: GSSAPI client step 1 Nov 21 20:02:20 x0.cockpit.lan python2[10389]: GSSAPI client step 2 Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Systemwide CA database updated. Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Systemwide CA database updated. Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Hostname (x0.cockpit.lan) does not have A/AAAA record. Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Hostname (x0.cockpit.lan) does not have A/AAAA record. Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Missing reverse record(s) for address(es): 10.111.113.1. Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Missing reverse record(s) for address(es): 10.111.113.1. Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub Nov 21 20:02:21 x0.cockpit.lan realmd[6876]: Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub Nov 21 20:02:26 x0.cockpit.lan realmd[6876]: SSSD enabled Nov 21 20:02:26 x0.cockpit.lan realmd[6876]: SSSD enabled Nov 21 20:02:26 x0.cockpit.lan systemd[1]: Stopping System Security Services Daemon... Nov 21 20:02:26 x0.cockpit.lan sssd[be[380]: Shutting down Nov 21 20:02:26 x0.cockpit.lan sssd[398]: Shutting down Nov 21 20:02:26 x0.cockpit.lan systemd[1]: sssd.service: Succeeded. Nov 21 20:02:26 x0.cockpit.lan systemd[1]: Stopped System Security Services Daemon. Nov 21 20:02:26 x0.cockpit.lan systemd[1]: Starting System Security Services Daemon... Nov 21 20:02:26 x0.cockpit.lan audit[11393]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=11393 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:26 x0.cockpit.lan kernel: audit: type=1400 audit(1574366546.458:29): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=11393 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:26 x0.cockpit.lan kernel: audit: type=1400 audit(1574366546.470:30): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=11393 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:26 x0.cockpit.lan audit[11393]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=11393 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:26 x0.cockpit.lan sssd[11393]: Starting up Nov 21 20:02:27 x0.cockpit.lan sssd[be[11394]: Starting up Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.262:31): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.278:32): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.302:33): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.330:34): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.346:35): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.366:36): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.366:37): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11400]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11400 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan kernel: audit: type=1400 audit(1574366547.414:38): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11400 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11400]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11400 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan sssd[11395]: Starting up Nov 21 20:02:27 x0.cockpit.lan sssd[11398]: Starting up Nov 21 20:02:27 x0.cockpit.lan sssd[11396]: Starting up Nov 21 20:02:27 x0.cockpit.lan sssd[11397]: Starting up Nov 21 20:02:27 x0.cockpit.lan audit[11395]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=11395 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan sssd[11399]: Starting up Nov 21 20:02:27 x0.cockpit.lan sssd_be[11394]: GSSAPI client step 1 Nov 21 20:02:27 x0.cockpit.lan sssd_be[11394]: GSSAPI client step 1 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11395]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=11395 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11395]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=11395 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11395]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=11395 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11395]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=11395 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan audit[11395]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=11395 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:27 x0.cockpit.lan sssd_be[11394]: GSSAPI client step 1 Nov 21 20:02:27 x0.cockpit.lan sssd_be[11394]: GSSAPI client step 2 Nov 21 20:02:27 x0.cockpit.lan systemd[1]: Started System Security Services Daemon. Nov 21 20:02:27 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:28 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:28 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:28 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:28 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:28 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:29 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:29 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:29 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:29 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:29 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configured /etc/openldap/ldap.conf Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configured /etc/openldap/ldap.conf Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configured /etc/ssh/ssh_config Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configured /etc/ssh/ssh_config Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configured /etc/ssh/sshd_config Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configured /etc/ssh/sshd_config Nov 21 20:02:30 x0.cockpit.lan systemd[1]: Stopping OpenBSD Secure Shell server... Nov 21 20:02:30 x0.cockpit.lan sshd[530]: Received signal 15; terminating. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: ssh.service: Succeeded. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: Stopped OpenBSD Secure Shell server. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: Starting OpenBSD Secure Shell server... Nov 21 20:02:30 x0.cockpit.lan sshd[11468]: Server listening on 0.0.0.0 port 22. Nov 21 20:02:30 x0.cockpit.lan sshd[11468]: Server listening on :: port 22. Nov 21 20:02:30 x0.cockpit.lan systemd[1]: Started OpenBSD Secure Shell server. Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configuring cockpit.lan as NIS domain. Nov 21 20:02:30 x0.cockpit.lan realmd[6876]: Configuring cockpit.lan as NIS domain. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Client configuration complete. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Client configuration complete. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: The ipa-client-install command was successful Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: The ipa-client-install command was successful Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: This program will set up FreeIPA client. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: This program will set up FreeIPA client. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Version 4.7.2 Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Version 4.7.2 Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: WARNING: conflicting time&date synchronization service 'ntp' will be disabled Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: WARNING: conflicting time&date synchronization service 'ntp' will be disabled Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: in favor of chronyd Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: in favor of chronyd Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Using default chrony configuration. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: Using default chrony configuration. Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: process exited: 10389 Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: * /usr/sbin/update-rc.d sssd enable Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: * /usr/sbin/update-rc.d sssd enable Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 21 20:02:31 x0.cockpit.lan realmd[6876]: process started: 11475 Nov 21 20:02:32 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:33 x0.cockpit.lan realmd[6876]: process exited: 11475 Nov 21 20:02:33 x0.cockpit.lan realmd[6876]: * /usr/sbin/service sssd restart Nov 21 20:02:33 x0.cockpit.lan realmd[6876]: * /usr/sbin/service sssd restart Nov 21 20:02:33 x0.cockpit.lan realmd[6876]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 21 20:02:33 x0.cockpit.lan realmd[6876]: process started: 11512 Nov 21 20:02:34 x0.cockpit.lan systemd[1]: Stopping System Security Services Daemon... Nov 21 20:02:34 x0.cockpit.lan sssd[11396]: Shutting down Nov 21 20:02:34 x0.cockpit.lan sssd[11397]: Shutting down Nov 21 20:02:34 x0.cockpit.lan sssd[11398]: Shutting down Nov 21 20:02:34 x0.cockpit.lan sssd[11399]: Shutting down Nov 21 20:02:34 x0.cockpit.lan sssd[11395]: Shutting down Nov 21 20:02:34 x0.cockpit.lan sssd[be[11394]: Shutting down Nov 21 20:02:34 x0.cockpit.lan kernel: kauditd_printk_skb: 11 callbacks suppressed Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.174:50): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11394]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11394 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan systemd[1]: sssd.service: Succeeded. Nov 21 20:02:34 x0.cockpit.lan systemd[1]: Stopped System Security Services Daemon. Nov 21 20:02:34 x0.cockpit.lan systemd[1]: Starting System Security Services Daemon... Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.278:51): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=11516 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11516]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/sssd/conf.d/" pid=11516 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.298:52): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=11516 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11516]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/usr/share/sssd/cfg_rules.ini" pid=11516 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan sssd[11516]: Starting up Nov 21 20:02:34 x0.cockpit.lan sssd[be[11517]: Starting up Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.494:53): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.506:54): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.550:55): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/gss/mech.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.594:56): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.594:57): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan sssd[11518]: Starting up Nov 21 20:02:34 x0.cockpit.lan sssd[11521]: Starting up Nov 21 20:02:34 x0.cockpit.lan sssd[11520]: Starting up Nov 21 20:02:34 x0.cockpit.lan sssd[11519]: Starting up Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.882:58): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan sssd[11522]: Starting up Nov 21 20:02:34 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan kernel: audit: type=1400 audit(1574366554.910:59): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11518]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=11518 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11518]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=11518 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11525]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11525 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11525]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11525 comm="ldap_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:34 x0.cockpit.lan audit[11518]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=11518 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan sssd_be[11517]: GSSAPI client step 1 Nov 21 20:02:35 x0.cockpit.lan sssd_be[11517]: GSSAPI client step 1 Nov 21 20:02:35 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan audit[11518]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=11518 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan audit[11518]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=11518 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan audit[11518]: AVC apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=11518 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 Nov 21 20:02:35 x0.cockpit.lan sssd_be[11517]: GSSAPI client step 1 Nov 21 20:02:35 x0.cockpit.lan sssd_be[11517]: GSSAPI client step 2 Nov 21 20:02:35 x0.cockpit.lan systemd[1]: Started System Security Services Daemon. Nov 21 20:02:35 x0.cockpit.lan realmd[6876]: process exited: 11512 Nov 21 20:02:35 x0.cockpit.lan realmd[6876]: * Successfully enrolled machine in realm Nov 21 20:02:35 x0.cockpit.lan realmd[6876]: * Successfully enrolled machine in realm Nov 21 20:02:35 x0.cockpit.lan realmd[6876]: released daemon: current-invocation Nov 21 20:02:38 x0.cockpit.lan ipa-getkeytab[11541]: GSSAPI client step 1 Nov 21 20:02:38 x0.cockpit.lan ipa-getkeytab[11541]: GSSAPI client step 1 Nov 21 20:02:38 x0.cockpit.lan ipa-getkeytab[11541]: GSSAPI client step 1 Nov 21 20:02:38 x0.cockpit.lan ipa-getkeytab[11541]: GSSAPI client step 2 Nov 21 20:02:42 x0.cockpit.lan certmonger[11556]: Certificate in file "/run/cockpit/ipa.crt" issued by CA and saved. Nov 21 20:02:42 x0.cockpit.lan su[11563]: (to admin) root on none Nov 21 20:02:42 x0.cockpit.lan su[11563]: pam_unix(su:session): session opened for user admin by (uid=0) Nov 21 20:02:42 x0.cockpit.lan su[11563]: pam_unix(su:session): session closed for user admin Nov 21 20:02:42 x0.cockpit.lan cockpit-ws[6481]: Logging out session from (null) Nov 21 20:02:42 x0.cockpit.lan cockpit-ws[6481]: WebSocket from (null) for session closed Nov 21 20:02:42 x0.cockpit.lan realmd[6876]: client gone away: :1.32 Nov 21 20:02:42 x0.cockpit.lan realmd[6876]: released daemon: :1.32 Nov 21 20:02:42 x0.cockpit.lan polkitd(authority=local)[368]: Unregistered Authentication Agent for unix-session:4 (system bus name :1.29, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:42 x0.cockpit.lan cockpit-session[6608]: pam_unix(cockpit:session): session closed for user admin Nov 21 20:02:42 x0.cockpit.lan systemd-logind[449]: Session 4 logged out. Waiting for processes to exit. Nov 21 20:02:42 x0.cockpit.lan systemd[1]: session-4.scope: Succeeded. Nov 21 20:02:42 x0.cockpit.lan systemd-logind[449]: Removed session 4. Nov 21 20:02:43 x0.cockpit.lan sshd[11578]: Authorized to admin@cockpit.lan, krb5 principal admin@COCKPIT.LAN (krb5_kuserok) Nov 21 20:02:43 x0.cockpit.lan kernel: kauditd_printk_skb: 12 callbacks suppressed Nov 21 20:02:43 x0.cockpit.lan kernel: audit: type=1400 audit(1574366563.534:72): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11580 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan audit[11580]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11580 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan audit[11580]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11580 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan kernel: audit: type=1400 audit(1574366563.562:73): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11580 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan sshd[11578]: Accepted gssapi-with-mic for admin@cockpit.lan from 10.111.113.1 port 40246 ssh2: admin@COCKPIT.LAN Nov 21 20:02:43 x0.cockpit.lan sshd[11578]: pam_unix(sshd:session): session opened for user admin@cockpit.lan by (uid=0) Nov 21 20:02:43 x0.cockpit.lan systemd-logind[449]: New session 6 of user admin@cockpit.lan. Nov 21 20:02:43 x0.cockpit.lan systemd[1]: Created slice User Slice of UID 1279600000. Nov 21 20:02:43 x0.cockpit.lan systemd[1]: Starting User Runtime Directory /run/user/1279600000... Nov 21 20:02:43 x0.cockpit.lan systemd[1]: Started User Runtime Directory /run/user/1279600000. Nov 21 20:02:43 x0.cockpit.lan systemd[1]: Starting User Manager for UID 1279600000... Nov 21 20:02:43 x0.cockpit.lan audit[11583]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11583 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan kernel: audit: type=1400 audit(1574366563.722:74): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11583 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: pam_unix(systemd-user:session): session opened for user admin@cockpit.lan by (uid=0) Nov 21 20:02:43 x0.cockpit.lan audit[11583]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11583 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan kernel: audit: type=1400 audit(1574366563.734:75): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11583 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Reached target Paths. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Starting D-Bus User Message Bus Socket. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Reached target Timers. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Listening on GnuPG network certificate management daemon. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Listening on D-Bus User Message Bus Socket. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Reached target Sockets. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Reached target Basic System. Nov 21 20:02:43 x0.cockpit.lan systemd[1]: Started User Manager for UID 1279600000. Nov 21 20:02:43 x0.cockpit.lan systemd[1]: Started Session 6 of user admin@cockpit.lan. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Reached target Default. Nov 21 20:02:43 x0.cockpit.lan systemd[11582]: Startup finished in 52ms. Nov 21 20:02:43 x0.cockpit.lan sshd[11578]: pam_unix(sshd:session): session closed for user admin@cockpit.lan Nov 21 20:02:43 x0.cockpit.lan systemd-logind[449]: Session 6 logged out. Waiting for processes to exit. Nov 21 20:02:43 x0.cockpit.lan systemd[1]: session-6.scope: Succeeded. Nov 21 20:02:43 x0.cockpit.lan systemd-logind[449]: Removed session 6. Nov 21 20:02:44 x0.cockpit.lan audit[11605]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11605 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:44 x0.cockpit.lan kernel: audit: type=1400 audit(1574366564.066:76): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11605 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:44 x0.cockpit.lan audit[11605]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11605 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:44 x0.cockpit.lan kernel: audit: type=1400 audit(1574366564.082:77): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11605 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:44 x0.cockpit.lan cockpit-session[11604]: pam_ssh_add: Failed adding some keys Nov 21 20:02:44 x0.cockpit.lan cockpit-session[11604]: pam_unix(cockpit:session): session opened for user admin@cockpit.lan by (uid=0) Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Started Session 8 of user admin@cockpit.lan. Nov 21 20:02:44 x0.cockpit.lan systemd-logind[449]: New session 8 of user admin@cockpit.lan. Nov 21 20:02:44 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:8 (system bus name :1.50 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:44 x0.cockpit.lan cockpit-ws[6481]: logged in user session Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service... Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service http instance... Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit.service: Main process exited, code=killed, status=15/TERM Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit.service: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.service: Main process exited, code=killed, status=15/TERM Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.service: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service http instance. Nov 21 20:02:44 x0.cockpit.lan polkitd(authority=local)[368]: Unregistered Authentication Agent for unix-session:8 (system bus name :1.50, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.socket: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http instance. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http-redirect.socket: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http-redirect instance. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https-factory.socket: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service https instance factory. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service Socket. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit.socket: Succeeded. Nov 21 20:02:44 x0.cockpit.lan cockpit-session[11604]: pam_unix(cockpit:session): session closed for user admin@cockpit.lan Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Closed Cockpit Web Service Socket. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: session-8.scope: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd-logind[449]: Session 8 logged out. Waiting for processes to exit. Nov 21 20:02:44 x0.cockpit.lan systemd-logind[449]: Removed session 8. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service Socket. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Listening on Cockpit Web Service Socket. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http instance. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http-redirect instance. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance factory. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http instance. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http-redirect instance. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service... Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Started Cockpit Web Service. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Created slice system-cockpit\x2dwsinstance\x2dhttps\x2dfactory.slice. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Started Cockpit Web Service https instance factory (PID 11663/UID 113). Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Created slice system-cockpit\x2dwsinstance\x2dhttps.slice. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Created slice Resource limits for all cockpit-ws-https@.service instances. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https-factory@0-11663-113.service: Succeeded. Nov 21 20:02:44 x0.cockpit.lan systemd[1]: Started Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855... Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service... Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https@e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.service: Main process exited, code=killed, status=15/TERM Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https@e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.service: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit.service: Main process exited, code=killed, status=15/TERM Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit.service: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Stopped Cockpit Web Service. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https-factory.socket: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service https instance factory. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http.socket: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http instance. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-wsinstance-http-redirect.socket: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service http-redirect instance. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Stopping Cockpit Web Service Socket. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-wsinstance-https@e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.socket: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Closed Socket for Cockpit Web Service https instance e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit.socket: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Closed Cockpit Web Service Socket. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service Socket. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Listening on Cockpit Web Service Socket. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 21 20:02:45 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 21 20:02:45 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 21 20:02:45 x0.cockpit.lan audit[11725]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11725 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:45 x0.cockpit.lan kernel: audit: type=1400 audit(1574366565.818:78): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11725 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:45 x0.cockpit.lan su[11724]: (to admin@cockpit.lan) root on none Nov 21 20:02:45 x0.cockpit.lan su[11724]: pam_unix(su-l:session): session opened for user admin@cockpit.lan by (uid=0) Nov 21 20:02:45 x0.cockpit.lan audit[11725]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11725 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:45 x0.cockpit.lan kernel: audit: type=1400 audit(1574366565.842:79): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11725 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan sudo[11729]: pam_unix(sudo:auth): authentication failure; logname= uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 21 20:02:46 x0.cockpit.lan audit[11730]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11730 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan kernel: audit: type=1400 audit(1574366566.198:80): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11730 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan audit[11730]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11730 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan kernel: audit: type=1400 audit(1574366566.210:81): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11730 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan sudo[11729]: pam_sss(sudo:auth): authentication success; logname= uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 21 20:02:46 x0.cockpit.lan audit[11732]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11732 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan audit[11732]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11732 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:46 x0.cockpit.lan sudo[11729]: admin@cockpit.lan : TTY=unknown ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/true Nov 21 20:02:46 x0.cockpit.lan sudo[11729]: pam_unix(sudo:session): session opened for user root by (uid=0) Nov 21 20:02:46 x0.cockpit.lan sudo[11729]: pam_unix(sudo:session): session closed for user root Nov 21 20:02:46 x0.cockpit.lan su[11724]: pam_unix(su-l:session): session closed for user admin@cockpit.lan Nov 21 20:02:46 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:02:46 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:02:46 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:02:46 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:02:46 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Starting Cockpit motd updater service... Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service https instance factory. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http-redirect instance. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Starting Socket for Cockpit Web Service http instance. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http-redirect instance. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Listening on Socket for Cockpit Web Service http instance. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Starting Cockpit Web Service... Nov 21 20:02:47 x0.cockpit.lan systemd[1]: cockpit-motd.service: Succeeded. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Started Cockpit motd updater service. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Started Cockpit Web Service. Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Started Cockpit Web Service http instance. Nov 21 20:02:47 x0.cockpit.lan cockpit-session[11780]: pam_unix(cockpit:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=admin@cockpit.lan Nov 21 20:02:47 x0.cockpit.lan audit[11781]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11781 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:47 x0.cockpit.lan audit[11781]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11781 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:47 x0.cockpit.lan audit[11781]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=11781 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:47 x0.cockpit.lan cockpit-session[11780]: pam_sss(cockpit:auth): authentication success; logname= uid=0 euid=0 tty= ruser= rhost= user=admin@cockpit.lan Nov 21 20:02:47 x0.cockpit.lan audit[11782]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11782 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:47 x0.cockpit.lan audit[11782]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11782 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:47 x0.cockpit.lan cockpit-session[11780]: pam_ssh_add: Failed adding some keys Nov 21 20:02:47 x0.cockpit.lan cockpit-session[11780]: pam_unix(cockpit:session): session opened for user admin@cockpit.lan by (uid=0) Nov 21 20:02:47 x0.cockpit.lan systemd[1]: Started Session 9 of user admin@cockpit.lan. Nov 21 20:02:47 x0.cockpit.lan systemd-logind[449]: New session 9 of user admin@cockpit.lan. Nov 21 20:02:47 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:9 (system bus name :1.56 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:47 x0.cockpit.lan cockpit-ws[11776]: logged in user session Nov 21 20:02:47 x0.cockpit.lan cockpit-ws[11776]: New connection to session Nov 21 20:02:47 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.57' (uid=1279600000 pid=11788 comm="cockpit-bridge ") Nov 21 20:02:48 x0.cockpit.lan systemd[1]: Starting Hostname Service... Nov 21 20:02:48 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 21 20:02:48 x0.cockpit.lan systemd[1]: Started Hostname Service. Nov 21 20:02:48 x0.cockpit.lan cockpit-bridge[11788]: cannot reauthorize identity(s): unix-user:debian unix-user:admin Nov 21 20:02:48 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:9 FAILED to authenticate to gain authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:11788:17885 [cockpit-bridge] (owned by unix-user:admin@cockpit.lan) Nov 21 20:02:48 x0.cockpit.lan pkexec[11796]: admin@cockpit.lan: Error executing command as another user: Not authorized [USER=root] [TTY=unknown] [CWD=/run/user/1279600000] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 21 20:02:48 x0.cockpit.lan cockpit-bridge[11788]: Error executing command as another user: Not authorized Nov 21 20:02:48 x0.cockpit.lan cockpit-bridge[11788]: This incident has been reported. Nov 21 20:02:48 x0.cockpit.lan realmd[6876]: client using service: :1.60 Nov 21 20:02:48 x0.cockpit.lan realmd[6876]: holding daemon: :1.60 Nov 21 20:02:48 x0.cockpit.lan sudo[11799]: pam_unix(sudo:auth): authentication failure; logname=admin@cockpit.lan uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 21 20:02:48 x0.cockpit.lan kernel: kauditd_printk_skb: 7 callbacks suppressed Nov 21 20:02:48 x0.cockpit.lan kernel: audit: type=1400 audit(1574366568.710:89): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11810 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan audit[11810]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11810 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan audit[11810]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11810 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan kernel: audit: type=1400 audit(1574366568.726:90): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11810 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan kernel: audit: type=1400 audit(1574366568.726:91): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=11810 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan audit[11810]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/run/systemd/users/1279600000" pid=11810 comm="krb5_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan sudo[11799]: pam_sss(sudo:auth): authentication success; logname=admin@cockpit.lan uid=1279600000 euid=0 tty= ruser=admin@cockpit.lan rhost= user=admin@cockpit.lan Nov 21 20:02:48 x0.cockpit.lan audit[11811]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11811 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan kernel: audit: type=1400 audit(1574366568.962:92): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/config" pid=11811 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:48 x0.cockpit.lan sudo[11799]: admin@cockpit.lan : TTY=unknown ; PWD=/run/user/1279600000 ; USER=root ; COMMAND=/usr/bin/cockpit-bridge --privileged Nov 21 20:02:48 x0.cockpit.lan sudo[11799]: pam_unix(sudo:session): session opened for user root by admin@cockpit.lan(uid=0) Nov 21 20:02:48 x0.cockpit.lan audit[11811]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11811 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:49 x0.cockpit.lan kernel: audit: type=1400 audit(1574366568.974:93): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/selinux/semanage.conf" pid=11811 comm="selinux_child" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:02:50 x0.cockpit.lan PackageKit[6911]: get-updates transaction /5_bcdeaeba from uid 0 finished with success after 1090ms Nov 21 20:02:51 x0.cockpit.lan systemd[1]: systemd-tmpfiles-clean.timer: Succeeded. Nov 21 20:02:51 x0.cockpit.lan systemd[1]: Stopped Daily Cleanup of Temporary Directories. Nov 21 20:02:52 x0.cockpit.lan cockpit-ws[11776]: Logging out session from (null) Nov 21 20:02:52 x0.cockpit.lan cockpit-ws[11776]: WebSocket from (null) for session closed Nov 21 20:02:52 x0.cockpit.lan realmd[6876]: client gone away: :1.60 Nov 21 20:02:52 x0.cockpit.lan realmd[6876]: released daemon: :1.60 Nov 21 20:02:52 x0.cockpit.lan polkitd(authority=local)[368]: Unregistered Authentication Agent for unix-session:9 (system bus name :1.56, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:52 x0.cockpit.lan sudo[11799]: pam_unix(sudo:session): session closed for user root Nov 21 20:02:52 x0.cockpit.lan cockpit-session[11780]: pam_unix(cockpit:session): session closed for user admin@cockpit.lan Nov 21 20:02:52 x0.cockpit.lan cockpit-session[11838]: pam_ssh_add: Failed adding some keys Nov 21 20:02:52 x0.cockpit.lan cockpit-session[11838]: pam_unix(cockpit:session): session opened for user admin by (uid=0) Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Stopped target Default. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Stopped target Basic System. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Stopped target Sockets. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: dirmngr.socket: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Closed GnuPG network certificate management daemon. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: gpg-agent-browser.socket: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Closed GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Stopped target Timers. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: dbus.socket: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Closed D-Bus User Message Bus Socket. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: gpg-agent-ssh.socket: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Closed GnuPG cryptographic agent (ssh-agent emulation). Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Stopped target Paths. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: gpg-agent.socket: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Closed GnuPG cryptographic agent and passphrase cache. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: gpg-agent-extra.socket: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Closed GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Reached target Shutdown. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: systemd-exit.service: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Started Exit the Session. Nov 21 20:02:53 x0.cockpit.lan systemd[6644]: Reached target Exit the Session. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Stopping User Manager for UID 1002... Nov 21 20:02:53 x0.cockpit.lan systemd[1]: user@1002.service: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Stopped User Manager for UID 1002. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Stopping User Runtime Directory /run/user/1002... Nov 21 20:02:53 x0.cockpit.lan systemd[1]: session-9.scope: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: run-user-1002.mount: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[1398]: run-user-1002.mount: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[11582]: run-user-1002.mount: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: user-runtime-dir@1002.service: Succeeded. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Starting User Runtime Directory /run/user/1002... Nov 21 20:02:53 x0.cockpit.lan systemd-logind[449]: New session 10 of user admin. Nov 21 20:02:53 x0.cockpit.lan systemd-logind[449]: Session 9 logged out. Waiting for processes to exit. Nov 21 20:02:53 x0.cockpit.lan systemd-logind[449]: Removed session 9. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Started User Runtime Directory /run/user/1002. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Starting User Manager for UID 1002... Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: pam_unix(systemd-user:session): session opened for user admin by (uid=0) Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Listening on GnuPG network certificate management daemon. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Listening on GnuPG cryptographic agent (ssh-agent emulation). Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Starting D-Bus User Message Bus Socket. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Listening on GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Reached target Paths. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Reached target Timers. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Listening on GnuPG cryptographic agent and passphrase cache. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Listening on D-Bus User Message Bus Socket. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Reached target Sockets. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Reached target Basic System. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Started User Manager for UID 1002. Nov 21 20:02:53 x0.cockpit.lan systemd[1]: Started Session 10 of user admin. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Reached target Default. Nov 21 20:02:53 x0.cockpit.lan systemd[11846]: Startup finished in 63ms. Nov 21 20:02:53 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:10 (system bus name :1.69 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:53 x0.cockpit.lan cockpit-ws[11776]: logged in user session Nov 21 20:02:53 x0.cockpit.lan cockpit-ws[11776]: New connection to session Nov 21 20:02:53 x0.cockpit.lan realmd[6876]: client using service: :1.71 Nov 21 20:02:53 x0.cockpit.lan realmd[6876]: holding daemon: :1.71 Nov 21 20:02:54 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:10 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:11857:18442 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:02:54 x0.cockpit.lan pkexec[11864]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 21 20:02:54 x0.cockpit.lan pkexec[11864]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 21 20:02:54 x0.cockpit.lan sshd[11893]: Accepted keyboard-interactive/pam for admin from 10.111.113.1 port 40296 ssh2 Nov 21 20:02:54 x0.cockpit.lan sshd[11893]: pam_unix(sshd:session): session opened for user admin by (uid=0) Nov 21 20:02:55 x0.cockpit.lan PackageKit[6911]: get-updates transaction /7_dceededc from uid 0 finished with success after 971ms Nov 21 20:02:55 x0.cockpit.lan systemd-logind[449]: New session 12 of user admin. Nov 21 20:02:55 x0.cockpit.lan systemd[1]: Started Session 12 of user admin. Nov 21 20:02:56 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:12 (system bus name :1.79 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:58 x0.cockpit.lan cockpit-ws[11776]: Logging out session from (null) Nov 21 20:02:58 x0.cockpit.lan cockpit-ws[11776]: WebSocket from (null) for session closed Nov 21 20:02:58 x0.cockpit.lan realmd[6876]: client gone away: :1.71 Nov 21 20:02:58 x0.cockpit.lan realmd[6876]: released daemon: :1.71 Nov 21 20:02:58 x0.cockpit.lan polkitd(authority=local)[368]: Unregistered Authentication Agent for unix-session:10 (system bus name :1.69, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:58 x0.cockpit.lan realmd[6876]: client using service: :1.81 Nov 21 20:02:58 x0.cockpit.lan realmd[6876]: holding daemon: :1.81 Nov 21 20:02:58 x0.cockpit.lan cockpit-session[11838]: pam_unix(cockpit:session): session closed for user admin Nov 21 20:02:58 x0.cockpit.lan systemd-logind[449]: Session 10 logged out. Waiting for processes to exit. Nov 21 20:02:58 x0.cockpit.lan polkitd(authority=local)[368]: Unregistered Authentication Agent for unix-session:12 (system bus name :1.79, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:58 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:12 FAILED to authenticate to gain authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:11906:18710 [] (owned by unix-user:admin) Nov 21 20:02:58 x0.cockpit.lan realmd[6876]: client gone away: :1.81 Nov 21 20:02:58 x0.cockpit.lan realmd[6876]: released daemon: :1.81 Nov 21 20:02:58 x0.cockpit.lan cockpit-session[11934]: pam_ssh_add: Failed adding some keys Nov 21 20:02:58 x0.cockpit.lan cockpit-session[11934]: pam_unix(cockpit:session): session opened for user admin by (uid=0) Nov 21 20:02:58 x0.cockpit.lan systemd[1]: Started Session 13 of user admin. Nov 21 20:02:58 x0.cockpit.lan systemd-logind[449]: New session 13 of user admin. Nov 21 20:02:58 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:13 (system bus name :1.86 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:02:58 x0.cockpit.lan cockpit-ws[11776]: logged in user session Nov 21 20:02:58 x0.cockpit.lan cockpit-ws[11776]: New connection to session Nov 21 20:02:59 x0.cockpit.lan realmd[6876]: client using service: :1.88 Nov 21 20:02:59 x0.cockpit.lan realmd[6876]: holding daemon: :1.88 Nov 21 20:02:59 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:13 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:11941:18955 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:02:59 x0.cockpit.lan pkexec[11952]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 21 20:02:59 x0.cockpit.lan pkexec[11952]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 21 20:02:59 x0.cockpit.lan sshd[11966]: Accepted keyboard-interactive/pam for admin from 10.111.113.1 port 40302 ssh2 Nov 21 20:02:59 x0.cockpit.lan sshd[11966]: pam_unix(sshd:session): session opened for user admin by (uid=0) Nov 21 20:02:59 x0.cockpit.lan systemd[1]: Started Session 14 of user admin. Nov 21 20:02:59 x0.cockpit.lan systemd-logind[449]: New session 14 of user admin. Nov 21 20:02:59 x0.cockpit.lan polkitd(authority=local)[368]: Registered Authentication Agent for unix-session:14 (system bus name :1.96 [cockpit-bridge], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale C.UTF-8) Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: Using 'cockpit-1' operation for method 'Deconfigure' invocation on 'org.freedesktop.realmd.Realm' interface Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: Registered cancellable for operation 'cockpit-1' Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: client using service: :1.100 Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: holding daemon: :1.100 Nov 21 20:03:00 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:13 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.deconfigure-realm for system-bus-name::1.88 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: holding daemon: current-invocation Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: * LANG=C /usr/sbin/ipa-client-install --uninstall --unattended Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: * LANG=C /usr/sbin/ipa-client-install --uninstall --unattended Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: GLib: posix_spawn avoided (fd close requested) (child_setup specified) Nov 21 20:03:00 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:14 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.cockpit-project.cockpit.root-bridge for unix-process:11979:19065 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:03:00 x0.cockpit.lan pkexec[11996]: pam_unix(polkit-1:session): session opened for user root by (uid=1002) Nov 21 20:03:00 x0.cockpit.lan pkexec[11996]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/run/user/1002] [COMMAND=/usr/bin/cockpit-bridge --privileged] Nov 21 20:03:00 x0.cockpit.lan realmd[6876]: process started: 12014 Nov 21 20:03:02 x0.cockpit.lan PackageKit[6911]: get-updates transaction /9_eddddeda from uid 0 finished with success after 2119ms Nov 21 20:03:05 x0.cockpit.lan PackageKit[6911]: get-updates transaction /10_ecabbedd from uid 0 finished with success after 3240ms Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Stopped target Default. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Stopped target Basic System. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Stopped target Sockets. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: gpg-agent-extra.socket: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Closed GnuPG cryptographic agent and passphrase cache (restricted). Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: gpg-agent-ssh.socket: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Closed GnuPG cryptographic agent (ssh-agent emulation). Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: dirmngr.socket: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Closed GnuPG network certificate management daemon. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: gpg-agent-browser.socket: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Closed GnuPG cryptographic agent and passphrase cache (access for web browsers). Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: dbus.socket: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Closed D-Bus User Message Bus Socket. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: gpg-agent.socket: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Closed GnuPG cryptographic agent and passphrase cache. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Stopped target Timers. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Stopped target Paths. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Reached target Shutdown. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: systemd-exit.service: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Started Exit the Session. Nov 21 20:03:07 x0.cockpit.lan systemd[11582]: Reached target Exit the Session. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Stopping User Manager for UID 1279600000... Nov 21 20:03:07 x0.cockpit.lan systemd[1]: user@1279600000.service: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Stopped User Manager for UID 1279600000. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Stopping User Runtime Directory /run/user/1279600000... Nov 21 20:03:07 x0.cockpit.lan systemd[1]: run-user-1279600000.mount: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[1398]: run-user-1279600000.mount: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[11846]: run-user-1279600000.mount: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: user-runtime-dir@1279600000.service: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Stopped User Runtime Directory /run/user/1279600000. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Removed slice User Slice of UID 1279600000. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Stopping Certificate monitoring and PKI enrollment... Nov 21 20:03:07 x0.cockpit.lan systemd[1]: certmonger.service: Succeeded. Nov 21 20:03:07 x0.cockpit.lan systemd[1]: Stopped Certificate monitoring and PKI enrollment. Nov 21 20:03:08 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:03:08 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:03:08 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:08 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:03:08 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:08 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:03:09 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:03:09 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:09 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:03:09 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:09 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:03:10 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:03:10 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:10 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:03:10 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:10 x0.cockpit.lan realmd[6876]: Unenrolling client from IPA server Nov 21 20:03:10 x0.cockpit.lan realmd[6876]: Unenrolling client from IPA server Nov 21 20:03:10 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:10 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Unenrolling host failed: No permission to join this host to the IPA domain. Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Unenrolling host failed: No permission to join this host to the IPA domain. Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Removing Kerberos service principals from /etc/krb5.keytab Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Removing Kerberos service principals from /etc/krb5.keytab Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Disabling client Kerberos and LDAP configurations Nov 21 20:03:13 x0.cockpit.lan realmd[6876]: Disabling client Kerberos and LDAP configurations Nov 21 20:03:13 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:13 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:14 x0.cockpit.lan realmd[6876]: Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted Nov 21 20:03:14 x0.cockpit.lan realmd[6876]: Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted Nov 21 20:03:14 x0.cockpit.lan systemd[1]: Stopping System Security Services Daemon... Nov 21 20:03:14 x0.cockpit.lan sssd[11519]: Shutting down Nov 21 20:03:14 x0.cockpit.lan sssd[11520]: Shutting down Nov 21 20:03:14 x0.cockpit.lan sssd[11522]: Shutting down Nov 21 20:03:14 x0.cockpit.lan sssd[11518]: Shutting down Nov 21 20:03:14 x0.cockpit.lan sssd[be[11517]: Shutting down Nov 21 20:03:14 x0.cockpit.lan kernel: audit: type=1400 audit(1574366594.786:94): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:03:14 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:03:14 x0.cockpit.lan sssd[11521]: Shutting down Nov 21 20:03:14 x0.cockpit.lan audit[11517]: AVC apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:03:14 x0.cockpit.lan kernel: audit: type=1400 audit(1574366594.842:95): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/etc/krb5.conf.d/freeipa" pid=11517 comm="sssd_be" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Nov 21 20:03:14 x0.cockpit.lan systemd[1]: sssd.service: Succeeded. Nov 21 20:03:14 x0.cockpit.lan systemd[1]: Stopped System Security Services Daemon. Nov 21 20:03:15 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:03:15 x0.cockpit.lan dbus-daemon[352]: [system] Activating via systemd: service name='org.fedorahosted.certmonger' unit='certmonger.service' requested by ':1.108' (uid=0 pid=12134 comm="ipa-getcert list ") Nov 21 20:03:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:03:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:03:15 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:15 x0.cockpit.lan systemd[1]: Starting Certificate monitoring and PKI enrollment... Nov 21 20:03:16 x0.cockpit.lan dbus-daemon[352]: [system] Successfully activated service 'org.fedorahosted.certmonger' Nov 21 20:03:16 x0.cockpit.lan systemd[1]: Started Certificate monitoring and PKI enrollment. Nov 21 20:03:16 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:03:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:03:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:03:16 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:17 x0.cockpit.lan systemd[1]: Reloading. Nov 21 20:03:17 x0.cockpit.lan systemd[1]: /lib/systemd/system/rpc-statd.service:13: PIDFile= references path below legacy directory /var/run/, updating /var/run/rpc.statd.pid → /run/rpc.statd.pid; please update the unit file accordingly. Nov 21 20:03:17 x0.cockpit.lan systemd[1]: /lib/systemd/system/oddjobd.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/oddjobd.pid → /run/oddjobd.pid; please update the unit file accordingly. Nov 21 20:03:17 x0.cockpit.lan systemd[1]: /lib/systemd/system/certmonger.service:6: PIDFile= references path below legacy directory /var/run/, updating /var/run/certmonger.pid → /run/certmonger.pid; please update the unit file accordingly. Nov 21 20:03:17 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:18 x0.cockpit.lan realmd[6876]: Restoring client configuration files Nov 21 20:03:18 x0.cockpit.lan realmd[6876]: Restoring client configuration files Nov 21 20:03:18 x0.cockpit.lan realmd[6876]: Unconfiguring the NIS domain. Nov 21 20:03:18 x0.cockpit.lan realmd[6876]: Unconfiguring the NIS domain. Nov 21 20:03:18 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:03:18 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Searching for (objectClass=*) Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Got server software: ipa Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Got associatedDomain: cockpit.lan Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: Found realm: COCKPIT.LAN Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:03:19 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Searching for (objectClass=*) Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Got server software: ipa Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Got associatedDomain: cockpit.lan Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: Found realm: COCKPIT.LAN Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:03:21 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:03:23 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:23 x0.cockpit.lan realmd[6876]: nscd daemon is not installed, skip configuration Nov 21 20:03:23 x0.cockpit.lan realmd[6876]: nscd daemon is not installed, skip configuration Nov 21 20:03:23 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:23 x0.cockpit.lan realmd[6876]: Using 'cockpit-1' operation for method 'Join' invocation on 'org.freedesktop.realmd.KerberosMembership' interface Nov 21 20:03:23 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:13 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.configure-realm for system-bus-name::1.88 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:03:24 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:03:24 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:03:24 x0.cockpit.lan realmd[6876]: nslcd daemon is not installed, skip configuration Nov 21 20:03:24 x0.cockpit.lan realmd[6876]: nslcd daemon is not installed, skip configuration Nov 21 20:03:24 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:24 x0.cockpit.lan systemd[1]: /lib/systemd/system/sssd.service:11: PIDFile= references path below legacy directory /var/run/, updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.nope Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.nope Nov 21 20:03:25 x0.cockpit.lan systemd[1]: Stopping OpenBSD Secure Shell server... Nov 21 20:03:25 x0.cockpit.lan sshd[11468]: Received signal 15; terminating. Nov 21 20:03:25 x0.cockpit.lan systemd[1]: ssh.service: Succeeded. Nov 21 20:03:25 x0.cockpit.lan systemd[1]: Stopped OpenBSD Secure Shell server. Nov 21 20:03:25 x0.cockpit.lan systemd[1]: Starting OpenBSD Secure Shell server... Nov 21 20:03:25 x0.cockpit.lan sshd[12259]: Server listening on 0.0.0.0 port 22. Nov 21 20:03:25 x0.cockpit.lan sshd[12259]: Server listening on :: port 22. Nov 21 20:03:25 x0.cockpit.lan systemd[1]: Started OpenBSD Secure Shell server. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: Some installation state for ntp has not been restored, see /var/lib/ipa/sysrestore/sysrestore.state Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: Some installation state for ntp has not been restored, see /var/lib/ipa/sysrestore/sysrestore.state Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: Some installation state has not been restored. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: Some installation state has not been restored. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: This may cause re-installation to fail. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: This may cause re-installation to fail. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: It should be safe to remove /var/lib/ipa-client/sysrestore.state but it may Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: It should be safe to remove /var/lib/ipa-client/sysrestore.state but it may Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: mean your system hasn't been restored to its pre-installation state. Nov 21 20:03:25 x0.cockpit.lan realmd[6876]: mean your system hasn't been restored to its pre-installation state. Nov 21 20:03:26 x0.cockpit.lan realmd[6876]: Systemwide CA database updated. Nov 21 20:03:26 x0.cockpit.lan realmd[6876]: Systemwide CA database updated. Nov 21 20:03:26 x0.cockpit.lan realmd[6876]: Client uninstall complete. Nov 21 20:03:26 x0.cockpit.lan realmd[6876]: Client uninstall complete. Nov 21 20:03:26 x0.cockpit.lan realmd[6876]: The ipa-client-install command failed. See /var/log/ipaclient-uninstall.log for more information Nov 21 20:03:26 x0.cockpit.lan realmd[6876]: The ipa-client-install command failed. See /var/log/ipaclient-uninstall.log for more information Nov 21 20:03:27 x0.cockpit.lan realmd[6876]: process exited: 12014 Nov 21 20:03:27 x0.cockpit.lan realmd[6876]: ! Running ipa-client-install failed Nov 21 20:03:27 x0.cockpit.lan realmd[6876]: ! Running ipa-client-install failed Nov 21 20:03:27 x0.cockpit.lan realmd[6876]: released daemon: current-invocation Nov 21 20:03:30 x0.cockpit.lan systemd[1]: systemd-hostnamed.service: Succeeded. Nov 21 20:03:35 x0.cockpit.lan realmd[6876]: Resolving nope failed: Temporarily unable to resolve “_kerberos._udp.nope” Nov 21 20:03:35 x0.cockpit.lan realmd[6876]: Temporarily unable to resolve “_ldap._tcp.nope” Nov 21 20:03:35 x0.cockpit.lan realmd[6876]: * Resolving: nope Nov 21 20:03:35 x0.cockpit.lan realmd[6876]: * Resolving: nope Nov 21 20:03:39 x0.cockpit.lan realmd[6876]: ! Discovery timed out after 15 seconds Nov 21 20:03:39 x0.cockpit.lan realmd[6876]: ! Discovery timed out after 15 seconds Nov 21 20:03:45 x0.cockpit.lan realmd[6876]: Error resolving “nope”: Temporary failure in name resolution Nov 21 20:03:45 x0.cockpit.lan realmd[6876]: * No results: nope Nov 21 20:03:45 x0.cockpit.lan realmd[6876]: * No results: nope Nov 21 20:03:45 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:03:45 x0.cockpit.lan realmd[6876]: * No default domain received via DHCP Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Resolving: _ldap._tcp.cockpit.lan Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Performing LDAP DSE lookup on: 10.111.112.100 Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Searching for (objectClass=*) Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Got defaultNamingContext: dc=cockpit,dc=lan Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=*) Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Got server software: ipa Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Got associatedDomain: cockpit.lan Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Searching dc=cockpit,dc=lan for (objectClass=krbRealmContainer) Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Found realm: COCKPIT.LAN Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Successfully discovered: cockpit.lan Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Using 'cockpit-1' operation for method 'Join' invocation on 'org.freedesktop.realmd.KerberosMembership' interface Nov 21 20:03:46 x0.cockpit.lan polkitd(authority=local)[368]: Operator of unix-session:13 successfully authenticated as unix-user:admin to gain ONE-SHOT authorization for action org.freedesktop.realmd.configure-realm for system-bus-name::1.88 [cockpit-bridge] (owned by unix-user:admin) Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: holding daemon: current-invocation Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Unconditionally checking packages Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Unconditionally checking packages Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Resolving required packages Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: * Resolving required packages Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: CreateTransaction call Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: SetHints call Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: call Resolve (262144, ['freeipa-client', 'sssd-tools', 'sssd', 'libnss-sss', 'libpam-sss']) Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: call Resolve completed Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: Cancelling operation 'cockpit-1' Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'freeipa-client;4.7.2-3;amd64;installed:debian-stable-main', 'FreeIPA centralized identity framework -- client') Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'libnss-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Nss library for the System Security Services Daemon') Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'libpam-sss;1.16.3-3.1;amd64;installed:debian-stable-main', 'Pam module for the System Security Services Daemon') Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'sssd;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- metapackage') Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: signal: Package (1, 'sssd-tools;1.16.3-3.1;amd64;installed:debian-stable-main', 'System Security Services Daemon -- tools') Nov 21 20:03:46 x0.cockpit.lan PackageKit[6911]: resolve transaction /13_dccaecdb from uid 0 finished with success after 463ms Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: signal: Finished (1, 463) Nov 21 20:03:46 x0.cockpit.lan realmd[6876]: packages: freeing transtaction Nov 21 20:03:58 x0.cockpit.lan cockpit-ws[11776]: cockpit-session: session timed out during authentication Nov 21 20:03:58 x0.cockpit.lan cockpit-ws[11776]: cockpit-session: didn't receive expected "authorize" message Nov 21 20:03:58 x0.cockpit.lan cockpit-ws[11776]: cockpit-session: authentication timed out Nov 21 20:03:58 x0.cockpit.lan cockpit-ws[11776]: ignoring failure from session process: Authentication failed: Timeout Nov 21 20:04:00 x0.cockpit.lan pcp-pmie[1783]: High aggregate context switch rate 4029ctxsw/s@debian