[ 0.008024] Security Framework initialized [ 0.009425] AppArmor: AppArmor initialized [ 0.037421] evm: security.selinux [ 0.037749] evm: security.SMACK64 [ 0.038078] evm: security.SMACK64EXEC [ 0.038435] evm: security.SMACK64TRANSMUTE [ 0.038830] evm: security.SMACK64MMAP [ 0.039471] evm: security.ima [ 0.040010] evm: security.capability [ 0.219603] AppArmor: AppArmor Filesystem Enabled [ 0.817123] audit: type=2000 audit(1509635409.773:1): state=initialized audit_enabled=0 res=1 [ 1.021543] AppArmor: AppArmor sha1 policy hashing enabled [ 3.302292] systemd[1]: systemd 234 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN default-hierarchy=hybrid) [ 4.071342] audit: type=1400 audit(1509635412.545:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=444 comm="apparmor_parser" [ 4.071344] audit: type=1400 audit(1509635412.545:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=444 comm="apparmor_parser" [ 4.071346] audit: type=1400 audit(1509635412.545:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=444 comm="apparmor_parser" [ 4.071347] audit: type=1400 audit(1509635412.545:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=444 comm="apparmor_parser" [ 4.074498] audit: type=1400 audit(1509635412.548:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=445 comm="apparmor_parser" [ 4.077173] audit: type=1400 audit(1509635412.551:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd" pid=446 comm="apparmor_parser" [ 4.077176] audit: type=1400 audit(1509635412.551:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/libvirtd//qemu_bridge_helper" pid=446 comm="apparmor_parser" [ 4.080342] audit: type=1400 audit(1509635412.554:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/ntpd" pid=447 comm="apparmor_parser" [ 4.230402] audit: type=1400 audit(1509635412.704:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/sssd" pid=449 comm="apparmor_parser" [ 6.116259] audit: type=1400 audit(1509635414.590:11): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/pci0000:00/0000:00:0f.0/net/eth1/type" pid=496 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 [ 6.406255] audit: type=1400 audit(1509635414.880:12): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=946 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 [ 6.406457] audit: type=1400 audit(1509635414.880:13): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/passwd" pid=946 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 [ 6.414460] audit: type=1400 audit(1509635414.888:14): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=946 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 [ 6.420006] audit: type=1400 audit(1509635414.894:15): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/group" pid=946 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 [ 6.423746] audit: type=1400 audit(1509635414.898:16): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=946 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 [ 6.424354] audit: type=1400 audit(1509635414.898:17): apparmor="ALLOWED" operation="file_lock" profile="/usr/sbin/sssd" name="/var/lib/sss/mc/initgroups" pid=946 comm="sssd_nss" requested_mask="k" denied_mask="k" fsuid=0 ouid=0 [ 6.435621] audit: type=1400 audit(1509635414.909:18): apparmor="ALLOWED" operation="capable" profile="/usr/sbin/sssd" pid=496 comm="sssd" capability=12 capname="net_admin" [ 6.568715] audit: type=1400 audit(1509635415.043:19): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=496 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 [ 6.568896] audit: type=1400 audit(1509635415.043:20): apparmor="ALLOWED" operation="open" profile="/usr/sbin/sssd" name="/sys/devices/virtual/net/virbr0-nic/type" pid=496 comm="sssd" requested_mask="r" denied_mask="r" fsuid=0 ouid=0