May 3 15:39:46 localhost kernel: Linux version 4.16.0-1.el7.elrepo.x86_64 (mockbuild@Build64R7) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC)) #1 SMP Sun Apr 1 20:13:35 EDT 2018 May 3 15:39:46 localhost kernel: Command line: BOOT_IMAGE=/vmlinuz-4.16.0-1.el7.elrepo.x86_64 root=/dev/mapper/centos-root ro crashkernel=auto rd.lvm.lv=centos/root rd.lvm.lv=centos/swap rhgb quiet drm.debug=0x1e May 3 15:39:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 3 15:39:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 3 15:39:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 3 15:39:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 3 15:39:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 3 15:39:46 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 3 15:39:46 localhost kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 3 15:39:46 localhost kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 3 15:39:46 localhost kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. May 3 15:39:46 localhost kernel: e820: BIOS-provided physical RAM map: May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000987ff] usable May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000000098800-0x000000000009ffff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x0000000086cf7fff] usable May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000086cf8000-0x0000000086cf8fff] ACPI NVS May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000086cf9000-0x0000000086cf9fff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000086cfa000-0x000000008c486fff] usable May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x000000008c487000-0x000000008c788fff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x000000008c789000-0x000000008c8effff] usable May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x000000008c8f0000-0x000000008cf94fff] ACPI NVS May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x000000008cf95000-0x000000008d3fefff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x000000008d3ff000-0x000000008d3fffff] usable May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x000000008d400000-0x000000008fffffff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000fed00000-0x00000000fed00fff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved May 3 15:39:46 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000016effffff] usable May 3 15:39:46 localhost kernel: NX (Execute Disable) protection: active May 3 15:39:46 localhost kernel: random: fast init done May 3 15:39:46 localhost kernel: SMBIOS 3.0.0 present. May 3 15:39:46 localhost kernel: DMI: MICRO-STAR INTERNATIONAL CO.,LTD MS-S162/MS-S162, BIOS 5.12 03/23/2018 May 3 15:39:46 localhost kernel: e820: last_pfn = 0x16f000 max_arch_pfn = 0x400000000 May 3 15:39:46 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 3 15:39:46 localhost kernel: e820: last_pfn = 0x8d400 max_arch_pfn = 0x400000000 May 3 15:39:46 localhost kernel: found SMP MP-table at [mem 0x000fcd30-0x000fcd3f] mapped at [ (ptrval)] May 3 15:39:46 localhost kernel: Using GB pages for direct mapping May 3 15:39:46 localhost kernel: RAMDISK: [mem 0x343c4000-0x361d9fff] May 3 15:39:46 localhost kernel: ACPI: Early table checksum verification disabled May 3 15:39:46 localhost kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 ALASKA) May 3 15:39:46 localhost kernel: ACPI: XSDT 0x000000008CBF00A8 0000D4 (v01 ALASKA A M I 01072009 AMI 00010013) May 3 15:39:46 localhost kernel: ACPI: FACP 0x000000008CC16870 000114 (v06 ALASKA A M I 01072009 AMI 00010013) May 3 15:39:46 localhost kernel: ACPI: DSDT 0x000000008CBF0218 026655 (v02 ALASKA A M I 01072009 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: FACS 0x000000008CF94C40 000040 May 3 15:39:46 localhost kernel: ACPI: APIC 0x000000008CC16988 000084 (v03 ALASKA A M I 01072009 AMI 00010013) May 3 15:39:46 localhost kernel: ACPI: FPDT 0x000000008CC16A10 000044 (v01 ALASKA A M I 01072009 AMI 00010013) May 3 15:39:46 localhost kernel: ACPI: MCFG 0x000000008CC16A58 00003C (v01 ALASKA A M I 01072009 MSFT 00000097) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC16A98 0003BC (v01 SataRe SataTabl 00001000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: FIDT 0x000000008CC16E58 00009C (v01 ALASKA A M I 01072009 AMI 00010013) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC16EF8 003159 (v02 SaSsdt SaSsdt 00003000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1A058 002599 (v02 PegSsd PegSsdt 00001000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: HPET 0x000000008CC1C5F8 000038 (v01 INTEL SKL 00000001 MSFT 0000005F) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1C630 000024 (v02 INTEL OEM_RTD3 00001000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1C658 000DE5 (v02 INTEL Ther_Rvp 00001000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1D440 000A2E (v02 INTEL xh_rvp08 00000000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: UEFI 0x000000008CC1DE70 000042 (v01 INTEL EDK2 00000002 01000013) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1DEB8 000EDE (v02 CpuRef CpuSsdt 00003000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: LPIT 0x000000008CC1ED98 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) May 3 15:39:46 localhost kernel: ACPI: WSMT 0x000000008CC1EE30 000028 (v01 INTEL SKL 00000000 MSFT 0000005F) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1EE58 000141 (v02 INTEL HdaDsp 00000000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1EFA0 00029F (v02 INTEL sensrhub 00000000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC1F240 003002 (v02 INTEL PtidDevc 00001000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: SSDT 0x000000008CC22248 000215 (v02 INTEL TbtTypeC 00000000 INTL 20160422) May 3 15:39:46 localhost kernel: ACPI: DBGP 0x000000008CC22460 000034 (v01 INTEL 00000002 MSFT 0000005F) May 3 15:39:46 localhost kernel: ACPI: DBG2 0x000000008CC22498 000054 (v00 INTEL 00000002 MSFT 0000005F) May 3 15:39:46 localhost kernel: No NUMA configuration found May 3 15:39:46 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000016effffff] May 3 15:39:46 localhost kernel: NODE_DATA(0) allocated [mem 0x16efda000-0x16effbfff] May 3 15:39:46 localhost kernel: crashkernel: memory value expected May 3 15:39:46 localhost kernel: Zone ranges: May 3 15:39:46 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 3 15:39:46 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 3 15:39:46 localhost kernel: Normal [mem 0x0000000100000000-0x000000016effffff] May 3 15:39:46 localhost kernel: Movable zone start for each node May 3 15:39:46 localhost kernel: Early memory node ranges May 3 15:39:46 localhost kernel: node 0: [mem 0x0000000000001000-0x0000000000097fff] May 3 15:39:46 localhost kernel: node 0: [mem 0x0000000000100000-0x0000000086cf7fff] May 3 15:39:46 localhost kernel: node 0: [mem 0x0000000086cfa000-0x000000008c486fff] May 3 15:39:46 localhost kernel: node 0: [mem 0x000000008c789000-0x000000008c8effff] May 3 15:39:46 localhost kernel: node 0: [mem 0x000000008d3ff000-0x000000008d3fffff] May 3 15:39:46 localhost kernel: node 0: [mem 0x0000000100000000-0x000000016effffff] May 3 15:39:46 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000016effffff] May 3 15:39:46 localhost kernel: Reserved but unavailable: 105 pages May 3 15:39:46 localhost kernel: Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff] May 3 15:39:46 localhost kernel: ACPI: PM-Timer IO Port: 0x1808 May 3 15:39:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 3 15:39:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 3 15:39:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 3 15:39:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 3 15:39:46 localhost kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 May 3 15:39:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 3 15:39:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 3 15:39:46 localhost kernel: Using ACPI (MADT) for SMP configuration information May 3 15:39:46 localhost kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 3 15:39:46 localhost kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x00098000-0x00098fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x00099000-0x0009ffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x86cf8000-0x86cf8fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x86cf9000-0x86cf9fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x8c487000-0x8c788fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x8c8f0000-0x8cf94fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x8cf95000-0x8d3fefff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x8d400000-0x8fffffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0x90000000-0xdfffffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xe0000000-0xefffffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xf0000000-0xfdffffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfe000000-0xfe010fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfe011000-0xfebfffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfec00000-0xfec00fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfec01000-0xfecfffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfed00000-0xfed00fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfed01000-0xfedfffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfee00000-0xfee00fff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xfee01000-0xfeffffff] May 3 15:39:46 localhost kernel: PM: Registered nosave memory: [mem 0xff000000-0xffffffff] May 3 15:39:46 localhost kernel: e820: [mem 0x90000000-0xdfffffff] available for PCI devices May 3 15:39:46 localhost kernel: Booting paravirtualized kernel on bare hardware May 3 15:39:46 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 3 15:39:46 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 May 3 15:39:46 localhost kernel: percpu: Embedded 45 pages/cpu @ (ptrval) s146968 r8192 d29160 u524288 May 3 15:39:46 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 1013399 May 3 15:39:46 localhost kernel: Policy zone: Normal May 3 15:39:46 localhost kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-4.16.0-1.el7.elrepo.x86_64 root=/dev/mapper/centos-root ro crashkernel=auto rd.lvm.lv=centos/root rd.lvm.lv=centos/swap rhgb quiet drm.debug=0x1e May 3 15:39:46 localhost kernel: Memory: 3929208K/4118032K available (12300K kernel code, 2240K rwdata, 3644K rodata, 2276K init, 2428K bss, 188824K reserved, 0K cma-reserved) May 3 15:39:46 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 3 15:39:46 localhost kernel: Kernel/User page tables isolation: enabled May 3 15:39:46 localhost kernel: ftrace: allocating 34700 entries in 136 pages May 3 15:39:46 localhost kernel: Hierarchical RCU implementation. May 3 15:39:46 localhost kernel: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=4. May 3 15:39:46 localhost kernel: RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 3 15:39:46 localhost kernel: NR_IRQS: 524544, nr_irqs: 1024, preallocated irqs: 16 May 3 15:39:46 localhost kernel: #011Offload RCU callbacks from CPUs: . May 3 15:39:46 localhost kernel: Console: colour VGA+ 80x25 May 3 15:39:46 localhost kernel: console [tty0] enabled May 3 15:39:46 localhost kernel: ACPI: Core revision 20180105 May 3 15:39:46 localhost kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded May 3 15:39:46 localhost kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns May 3 15:39:46 localhost kernel: APIC: Switch to symmetric I/O mode setup May 3 15:39:46 localhost kernel: x2apic: IRQ remapping doesn't support X2APIC mode May 3 15:39:46 localhost kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 3 15:39:46 localhost kernel: tsc: Detected 3700.000 MHz processor May 3 15:39:46 localhost kernel: tsc: Detected 3696.000 MHz TSC May 3 15:39:46 localhost kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6a8d280fdb9, max_idle_ns: 881591151302 ns May 3 15:39:46 localhost kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7392.00 BogoMIPS (lpj=3696000) May 3 15:39:46 localhost kernel: pid_max: default: 32768 minimum: 301 May 3 15:39:46 localhost kernel: Security Framework initialized May 3 15:39:46 localhost kernel: SELinux: Initializing. May 3 15:39:46 localhost kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) May 3 15:39:46 localhost kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) May 3 15:39:46 localhost kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes) May 3 15:39:46 localhost kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes) May 3 15:39:46 localhost kernel: CPU: Physical Processor ID: 0 May 3 15:39:46 localhost kernel: CPU: Processor Core ID: 0 May 3 15:39:46 localhost kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' May 3 15:39:46 localhost kernel: ENERGY_PERF_BIAS: View and update with x86_energy_perf_policy(8) May 3 15:39:46 localhost kernel: mce: CPU supports 8 MCE banks May 3 15:39:46 localhost kernel: CPU0: Thermal monitoring enabled (TM1) May 3 15:39:46 localhost kernel: process: using mwait in idle threads May 3 15:39:46 localhost kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 3 15:39:46 localhost kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 May 3 15:39:46 localhost kernel: Spectre V2 : Mitigation: Full generic retpoline May 3 15:39:46 localhost kernel: Spectre V2 : Spectre v2 mitigation: Filling RSB on context switch May 3 15:39:46 localhost kernel: Spectre V2 : Spectre v2 mitigation: Enabling Indirect Branch Prediction Barrier May 3 15:39:46 localhost kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 3 15:39:46 localhost kernel: Freeing SMP alternatives memory: 32K May 3 15:39:46 localhost kernel: smpboot: CPU0: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (family: 0x6, model: 0x5e, stepping: 0x3) May 3 15:39:46 localhost kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. May 3 15:39:46 localhost kernel: ... version: 4 May 3 15:39:46 localhost kernel: ... bit width: 48 May 3 15:39:46 localhost kernel: ... generic registers: 4 May 3 15:39:46 localhost kernel: ... value mask: 0000ffffffffffff May 3 15:39:46 localhost kernel: ... max period: 00007fffffffffff May 3 15:39:46 localhost kernel: ... fixed-purpose events: 3 May 3 15:39:46 localhost kernel: ... event mask: 000000070000000f May 3 15:39:46 localhost kernel: Hierarchical SRCU implementation. May 3 15:39:46 localhost kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. May 3 15:39:46 localhost kernel: smp: Bringing up secondary CPUs ... May 3 15:39:46 localhost kernel: x86: Booting SMP configuration: May 3 15:39:46 localhost kernel: .... node #0, CPUs: #1 #2 #3 May 3 15:39:46 localhost kernel: smp: Brought up 1 node, 4 CPUs May 3 15:39:46 localhost kernel: smpboot: Max logical packages: 1 May 3 15:39:46 localhost kernel: smpboot: Total of 4 processors activated (29568.00 BogoMIPS) May 3 15:39:46 localhost kernel: devtmpfs: initialized May 3 15:39:46 localhost kernel: x86/mm: Memory block size: 128MB May 3 15:39:46 localhost kernel: evm: security.selinux May 3 15:39:46 localhost kernel: evm: security.ima May 3 15:39:46 localhost kernel: evm: security.capability May 3 15:39:46 localhost kernel: PM: Registering ACPI NVS region [mem 0x86cf8000-0x86cf8fff] (4096 bytes) May 3 15:39:46 localhost kernel: PM: Registering ACPI NVS region [mem 0x8c8f0000-0x8cf94fff] (6967296 bytes) May 3 15:39:46 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 3 15:39:46 localhost kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) May 3 15:39:46 localhost kernel: pinctrl core: initialized pinctrl subsystem May 3 15:39:46 localhost kernel: NET: Registered protocol family 16 May 3 15:39:46 localhost kernel: audit: initializing netlink subsys (disabled) May 3 15:39:46 localhost kernel: audit: type=2000 audit(1525333185.015:1): state=initialized audit_enabled=0 res=1 May 3 15:39:46 localhost kernel: cpuidle: using governor menu May 3 15:39:46 localhost kernel: KVM setup pv remote TLB flush May 3 15:39:46 localhost kernel: ACPI FADT declares the system doesn't support PCIe ASPM, so disable it May 3 15:39:46 localhost kernel: ACPI: bus type PCI registered May 3 15:39:46 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 3 15:39:46 localhost kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) May 3 15:39:46 localhost kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 May 3 15:39:46 localhost kernel: PCI: Using configuration type 1 for base access May 3 15:39:46 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 3 15:39:46 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 3 15:39:46 localhost kernel: ACPI: Added _OSI(Module Device) May 3 15:39:46 localhost kernel: ACPI: Added _OSI(Processor Device) May 3 15:39:46 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 3 15:39:46 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) May 3 15:39:46 localhost kernel: ACPI: Executed 38 blocks of module-level executable AML code May 3 15:39:46 localhost kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 3 15:39:46 localhost kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked May 3 15:39:46 localhost kernel: ACPI: Interpreter enabled May 3 15:39:46 localhost kernel: ACPI: (supports S0 S3 S4 S5) May 3 15:39:46 localhost kernel: ACPI: Using IOAPIC for interrupt routing May 3 15:39:46 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 3 15:39:46 localhost kernel: ACPI: Enabled 6 GPEs in block 00 to 7F May 3 15:39:46 localhost kernel: ACPI: Power Resource [PG00] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [PG01] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [PG02] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:39:46 localhost kernel: ACPI: Power Resource [FN00] (off) May 3 15:39:46 localhost kernel: ACPI: Power Resource [FN01] (off) May 3 15:39:46 localhost kernel: ACPI: Power Resource [FN02] (off) May 3 15:39:46 localhost kernel: ACPI: Power Resource [FN03] (off) May 3 15:39:46 localhost kernel: ACPI: Power Resource [FN04] (off) May 3 15:39:46 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) May 3 15:39:46 localhost kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI] May 3 15:39:46 localhost kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 3 15:39:46 localhost kernel: acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration May 3 15:39:46 localhost kernel: PCI host bridge to bus 0000:00 May 3 15:39:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 3 15:39:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 3 15:39:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 3 15:39:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] May 3 15:39:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] May 3 15:39:46 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-fe] May 3 15:39:46 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 3 15:39:46 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] May 3 15:39:46 localhost kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] May 3 15:39:46 localhost kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] May 3 15:39:46 localhost kernel: pci 0000:00:1c.7: PCI bridge to [bus 05] May 3 15:39:46 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 06] May 3 15:39:46 localhost kernel: pci 0000:00:1d.1: PCI bridge to [bus 07] May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 *10 11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:39:46 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 3 15:39:46 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 3 15:39:46 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 3 15:39:46 localhost kernel: vgaarb: loaded May 3 15:39:46 localhost kernel: SCSI subsystem initialized May 3 15:39:46 localhost kernel: ACPI: bus type USB registered May 3 15:39:46 localhost kernel: usbcore: registered new interface driver usbfs May 3 15:39:46 localhost kernel: usbcore: registered new interface driver hub May 3 15:39:46 localhost kernel: usbcore: registered new device driver usb May 3 15:39:46 localhost kernel: EDAC MC: Ver: 3.0.0 May 3 15:39:46 localhost kernel: PCI: Using ACPI for IRQ routing May 3 15:39:46 localhost kernel: NetLabel: Initializing May 3 15:39:46 localhost kernel: NetLabel: domain hash size = 128 May 3 15:39:46 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO May 3 15:39:46 localhost kernel: NetLabel: unlabeled traffic allowed by default May 3 15:39:46 localhost kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 3 15:39:46 localhost kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter May 3 15:39:46 localhost kernel: clocksource: Switched to clocksource tsc-early May 3 15:39:46 localhost kernel: VFS: Disk quotas dquot_6.6.0 May 3 15:39:46 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 3 15:39:46 localhost kernel: pnp: PnP ACPI init May 3 15:39:46 localhost kernel: system 00:00: [io 0x0a00-0x0a0f] has been reserved May 3 15:39:46 localhost kernel: system 00:00: [io 0x0a10-0x0a1f] has been reserved May 3 15:39:46 localhost kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved May 3 15:39:46 localhost kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved May 3 15:39:46 localhost kernel: system 00:05: [io 0x0680-0x069f] has been reserved May 3 15:39:46 localhost kernel: system 00:05: [io 0xffff] has been reserved May 3 15:39:46 localhost kernel: system 00:05: [io 0xffff] has been reserved May 3 15:39:46 localhost kernel: system 00:05: [io 0xffff] has been reserved May 3 15:39:46 localhost kernel: system 00:05: [io 0x1800-0x18fe] has been reserved May 3 15:39:46 localhost kernel: system 00:05: [io 0x164e-0x164f] has been reserved May 3 15:39:46 localhost kernel: system 00:06: [io 0x0800-0x087f] has been reserved May 3 15:39:46 localhost kernel: system 00:08: [io 0x1854-0x1857] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfed10000-0xfed17fff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfed18000-0xfed18fff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfed19000-0xfed19fff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xe0000000-0xefffffff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfed20000-0xfed3ffff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfed90000-0xfed93fff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfed45000-0xfed8ffff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xff000000-0xffffffff] has been reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xfee00000-0xfeefffff] could not be reserved May 3 15:39:46 localhost kernel: system 00:09: [mem 0xdffc0000-0xdffdffff] has been reserved May 3 15:39:46 localhost kernel: system 00:0a: [mem 0xfd000000-0xfdabffff] has been reserved May 3 15:39:46 localhost kernel: system 00:0a: [mem 0xfdad0000-0xfdadffff] has been reserved May 3 15:39:46 localhost kernel: system 00:0a: [mem 0xfdb00000-0xfdffffff] has been reserved May 3 15:39:46 localhost kernel: system 00:0a: [mem 0xfe000000-0xfe01ffff] could not be reserved May 3 15:39:46 localhost kernel: system 00:0a: [mem 0xfe036000-0xfe03bfff] has been reserved May 3 15:39:46 localhost kernel: system 00:0a: [mem 0xfe03d000-0xfe3fffff] has been reserved May 3 15:39:46 localhost kernel: system 00:0b: [io 0xff00-0xfffe] has been reserved May 3 15:39:46 localhost kernel: pnp: PnP ACPI: found 13 devices May 3 15:39:46 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 3 15:39:46 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 3 15:39:46 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] May 3 15:39:46 localhost kernel: pci 0000:00:1c.0: bridge window [io 0xe000-0xefff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.0: bridge window [mem 0xdef00000-0xdf1fffff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] May 3 15:39:46 localhost kernel: pci 0000:00:1c.5: bridge window [io 0xd000-0xdfff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.5: bridge window [mem 0xdec00000-0xdeefffff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] May 3 15:39:46 localhost kernel: pci 0000:00:1c.6: bridge window [io 0xc000-0xcfff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.6: bridge window [mem 0xde900000-0xdebfffff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.7: PCI bridge to [bus 05] May 3 15:39:46 localhost kernel: pci 0000:00:1c.7: bridge window [io 0xb000-0xbfff] May 3 15:39:46 localhost kernel: pci 0000:00:1c.7: bridge window [mem 0xde600000-0xde8fffff] May 3 15:39:46 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 06] May 3 15:39:46 localhost kernel: pci 0000:00:1d.0: bridge window [io 0xa000-0xafff] May 3 15:39:46 localhost kernel: pci 0000:00:1d.0: bridge window [mem 0xde300000-0xde5fffff] May 3 15:39:46 localhost kernel: pci 0000:00:1d.1: PCI bridge to [bus 07] May 3 15:39:46 localhost kernel: pci 0000:00:1d.1: bridge window [io 0x9000-0x9fff] May 3 15:39:46 localhost kernel: pci 0000:00:1d.1: bridge window [mem 0xde000000-0xde2fffff] May 3 15:39:46 localhost kernel: NET: Registered protocol family 2 May 3 15:39:46 localhost kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes) May 3 15:39:46 localhost kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) May 3 15:39:46 localhost kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) May 3 15:39:46 localhost kernel: TCP: Hash tables configured (established 32768 bind 32768) May 3 15:39:46 localhost kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) May 3 15:39:46 localhost kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) May 3 15:39:46 localhost kernel: NET: Registered protocol family 1 May 3 15:39:46 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 3 15:39:46 localhost kernel: Unpacking initramfs... May 3 15:39:46 localhost kernel: Freeing initrd memory: 30808K May 3 15:39:46 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 3 15:39:46 localhost kernel: software IO TLB [mem 0x88487000-0x8c487000] (64MB) mapped at [00000000a698a405-000000007262f727] May 3 15:39:46 localhost kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6a8d280fdb9, max_idle_ns: 881591151302 ns May 3 15:39:46 localhost kernel: clocksource: Switched to clocksource tsc May 3 15:39:46 localhost kernel: Initialise system trusted keyrings May 3 15:39:46 localhost kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0 May 3 15:39:46 localhost kernel: zbud: loaded May 3 15:39:46 localhost kernel: NET: Registered protocol family 38 May 3 15:39:46 localhost kernel: Key type asymmetric registered May 3 15:39:46 localhost kernel: Asymmetric key parser 'x509' registered May 3 15:39:46 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 248) May 3 15:39:46 localhost kernel: io scheduler noop registered May 3 15:39:46 localhost kernel: io scheduler deadline registered (default) May 3 15:39:46 localhost kernel: io scheduler cfq registered May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.0: AER enabled with IRQ 121 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.5: AER enabled with IRQ 122 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.6: AER enabled with IRQ 123 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.7: AER enabled with IRQ 124 May 3 15:39:46 localhost kernel: pcieport 0000:00:1d.0: AER enabled with IRQ 125 May 3 15:39:46 localhost kernel: pcieport 0000:00:1d.1: AER enabled with IRQ 126 May 3 15:39:46 localhost kernel: pcieport 0000:00:01.0: Signaling PME with IRQ 120 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.0: Signaling PME with IRQ 121 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.5: Signaling PME with IRQ 122 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.6: Signaling PME with IRQ 123 May 3 15:39:46 localhost kernel: pcieport 0000:00:1c.7: Signaling PME with IRQ 124 May 3 15:39:46 localhost kernel: pcieport 0000:00:1d.0: Signaling PME with IRQ 125 May 3 15:39:46 localhost kernel: pcieport 0000:00:1d.1: Signaling PME with IRQ 126 May 3 15:39:46 localhost kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 May 3 15:39:46 localhost kernel: ACPI: Sleep Button [SLPB] May 3 15:39:46 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 May 3 15:39:46 localhost kernel: ACPI: Power Button [PWRB] May 3 15:39:46 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 3 15:39:46 localhost kernel: ACPI: Power Button [PWRF] May 3 15:39:46 localhost kernel: thermal LNXTHERM:00: registered as thermal_zone0 May 3 15:39:46 localhost kernel: ACPI: Thermal Zone [TZ00] (28 C) May 3 15:39:46 localhost kernel: thermal LNXTHERM:01: registered as thermal_zone1 May 3 15:39:46 localhost kernel: ACPI: Thermal Zone [TZ01] (30 C) May 3 15:39:46 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 3 15:39:46 localhost kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 3 15:39:46 localhost kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 3 15:39:46 localhost kernel: Non-volatile memory driver v1.3 May 3 15:39:46 localhost kernel: Linux agpgart interface v0.103 May 3 15:39:46 localhost kernel: rdac: device handler registered May 3 15:39:46 localhost kernel: hp_sw: device handler registered May 3 15:39:46 localhost kernel: emc: device handler registered May 3 15:39:46 localhost kernel: alua: device handler registered May 3 15:39:46 localhost kernel: libphy: Fixed MDIO Bus: probed May 3 15:39:46 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 3 15:39:46 localhost kernel: ehci-pci: EHCI PCI platform driver May 3 15:39:46 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver May 3 15:39:46 localhost kernel: ohci-pci: OHCI PCI platform driver May 3 15:39:46 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver May 3 15:39:46 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller May 3 15:39:46 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 May 3 15:39:46 localhost kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x00109810 May 3 15:39:46 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 May 3 15:39:46 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 May 3 15:39:46 localhost kernel: usb usb1: Product: xHCI Host Controller May 3 15:39:46 localhost kernel: usb usb1: Manufacturer: Linux 4.16.0-1.el7.elrepo.x86_64 xhci-hcd May 3 15:39:46 localhost kernel: usb usb1: SerialNumber: 0000:00:14.0 May 3 15:39:46 localhost kernel: hub 1-0:1.0: USB hub found May 3 15:39:46 localhost kernel: hub 1-0:1.0: 10 ports detected May 3 15:39:46 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller May 3 15:39:46 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 May 3 15:39:46 localhost kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003 May 3 15:39:46 localhost kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 May 3 15:39:46 localhost kernel: usb usb2: Product: xHCI Host Controller May 3 15:39:46 localhost kernel: usb usb2: Manufacturer: Linux 4.16.0-1.el7.elrepo.x86_64 xhci-hcd May 3 15:39:46 localhost kernel: usb usb2: SerialNumber: 0000:00:14.0 May 3 15:39:46 localhost kernel: hub 2-0:1.0: USB hub found May 3 15:39:46 localhost kernel: hub 2-0:1.0: 4 ports detected May 3 15:39:46 localhost kernel: usbcore: registered new interface driver usbserial_generic May 3 15:39:46 localhost kernel: usbserial: USB Serial support registered for generic May 3 15:39:46 localhost kernel: usbcore: registered new interface driver wishbone_serial May 3 15:39:46 localhost kernel: usbserial: USB Serial support registered for wishbone_serial May 3 15:39:46 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 May 3 15:39:46 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 3 15:39:46 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 3 15:39:46 localhost kernel: mousedev: PS/2 mouse device common for all mice May 3 15:39:46 localhost kernel: rtc_cmos 00:07: RTC can wake from S4 May 3 15:39:46 localhost kernel: rtc_cmos 00:07: rtc core: registered rtc_cmos as rtc0 May 3 15:39:46 localhost kernel: rtc_cmos 00:07: alarms up to one month, y3k, 242 bytes nvram, hpet irqs May 3 15:39:46 localhost kernel: intel_pstate: Intel P-state driver initializing May 3 15:39:46 localhost kernel: intel_pstate: HWP enabled May 3 15:39:46 localhost kernel: ledtrig-cpu: registered to indicate activity on CPUs May 3 15:39:46 localhost kernel: hidraw: raw HID events driver (C) Jiri Kosina May 3 15:39:46 localhost kernel: usbcore: registered new interface driver usbhid May 3 15:39:46 localhost kernel: usbhid: USB HID core driver May 3 15:39:46 localhost kernel: drop_monitor: Initializing network drop monitor service May 3 15:39:46 localhost kernel: Initializing XFRM netlink socket May 3 15:39:46 localhost kernel: NET: Registered protocol family 10 May 3 15:39:46 localhost kernel: Segment Routing with IPv6 May 3 15:39:46 localhost kernel: NET: Registered protocol family 17 May 3 15:39:46 localhost kernel: Bridge firewalling registered May 3 15:39:46 localhost kernel: microcode: sig=0x506e3, pf=0x2, revision=0xc2 May 3 15:39:46 localhost kernel: microcode: Microcode Update Driver: v2.2. May 3 15:39:46 localhost kernel: sched_clock: Marking stable (672604680, 0)->(665209298, 7395382) May 3 15:39:46 localhost kernel: registered taskstats version 1 May 3 15:39:46 localhost kernel: Loading compiled-in X.509 certificates May 3 15:39:46 localhost kernel: zswap: loaded using pool lzo/zbud May 3 15:39:46 localhost kernel: Key type big_key registered May 3 15:39:46 localhost kernel: Key type trusted registered May 3 15:39:46 localhost kernel: Key type encrypted registered May 3 15:39:46 localhost kernel: ima: No TPM chip found, activating TPM-bypass! (rc=-19) May 3 15:39:46 localhost kernel: evm: HMAC attrs: 0x1 May 3 15:39:46 localhost kernel: rtc_cmos 00:07: setting system clock to 2018-05-03 07:39:46 UTC (1525333186) May 3 15:39:46 localhost kernel: Freeing unused kernel memory: 2276K May 3 15:39:46 localhost kernel: Write protecting the kernel read-only data: 18432k May 3 15:39:46 localhost kernel: Freeing unused kernel memory: 2012K May 3 15:39:46 localhost kernel: Freeing unused kernel memory: 452K May 3 15:39:46 localhost systemd[1]: systemd 219 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN) May 3 15:39:46 localhost systemd[1]: Detected architecture x86-64. May 3 15:39:46 localhost systemd[1]: Running in initial RAM disk. May 3 15:39:46 localhost systemd[1]: Set hostname to . May 3 15:39:46 localhost systemd[1]: Reached target Timers. May 3 15:39:46 localhost systemd[1]: Starting Timers. May 3 15:39:46 localhost systemd[1]: Reached target Local File Systems. May 3 15:39:46 localhost systemd[1]: Starting Local File Systems. May 3 15:39:46 localhost systemd[1]: Created slice Root Slice. May 3 15:39:46 localhost systemd[1]: Starting Root Slice. May 3 15:39:46 localhost journal: Journal started May 3 15:39:46 localhost systemd: Started Setup Virtual Console. May 3 15:39:46 localhost systemd: Started dracut cmdline hook. May 3 15:39:46 localhost systemd: Starting dracut pre-udev hook... May 3 15:39:46 localhost kernel: device-mapper: uevent: version 1.0.3 May 3 15:39:46 localhost kernel: device-mapper: ioctl: 4.37.0-ioctl (2017-09-20) initialised: dm-devel@redhat.com May 3 15:39:46 localhost systemd: Started dracut pre-udev hook. May 3 15:39:46 localhost systemd: Starting udev Kernel Device Manager... May 3 15:39:46 localhost systemd-udevd: starting version 219 May 3 15:39:46 localhost systemd: Started udev Kernel Device Manager. May 3 15:39:46 localhost systemd: Starting udev Coldplug all Devices... May 3 15:39:46 localhost systemd: Mounting Configuration File System... May 3 15:39:46 localhost systemd: Mounted Configuration File System. May 3 15:39:46 localhost systemd: Started udev Coldplug all Devices. May 3 15:39:46 localhost systemd: Reached target System Initialization. May 3 15:39:46 localhost systemd: Starting System Initialization. May 3 15:39:46 localhost systemd: Starting dracut initqueue hook... May 3 15:39:46 localhost systemd: Starting Show Plymouth Boot Screen... May 3 15:39:46 localhost kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 4 ports 6 Gbps 0xf impl SATA mode May 3 15:39:46 localhost kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf pm led clo only pio slum part ems deso sadm sds apst May 3 15:39:46 localhost systemd: Started Show Plymouth Boot Screen. May 3 15:39:46 localhost systemd: Started Forward Password Requests to Plymouth Directory Watch. May 3 15:39:46 localhost systemd: Starting Forward Password Requests to Plymouth Directory Watch. May 3 15:39:46 localhost systemd: Reached target Paths. May 3 15:39:46 localhost systemd: Starting Paths. May 3 15:39:46 localhost systemd: Reached target Basic System. May 3 15:39:46 localhost systemd: Starting Basic System. May 3 15:39:46 localhost kernel: dca service started, version 1.12.1 May 3 15:39:46 localhost kernel: pps_core: LinuxPPS API ver. 1 registered May 3 15:39:46 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 3 15:39:46 localhost kernel: PTP clock support registered May 3 15:39:46 localhost kernel: igb: Intel(R) Gigabit Ethernet Network Driver - version 5.4.0-k May 3 15:39:46 localhost kernel: igb: Copyright (c) 2007-2014 Intel Corporation. May 3 15:39:46 localhost kernel: i915: unknown parameter 'enable_rc6' ignored May 3 15:39:46 localhost kernel: Setting dangerous option enable_fbc - tainting kernel May 3 15:39:46 localhost kernel: i915: unknown parameter 'lvds_downclock' ignored May 3 15:39:46 localhost kernel: i915: unknown parameter 'semaphores' ignored May 3 15:39:46 localhost kernel: scsi host0: ahci May 3 15:39:46 localhost kernel: scsi host1: ahci May 3 15:39:46 localhost kernel: scsi host2: ahci May 3 15:39:46 localhost kernel: scsi host3: ahci May 3 15:39:46 localhost kernel: ata1: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217100 irq 128 May 3 15:39:46 localhost kernel: ata2: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217180 irq 128 May 3 15:39:46 localhost kernel: ata3: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217200 irq 128 May 3 15:39:46 localhost kernel: ata4: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217280 irq 128 May 3 15:39:46 localhost kernel: [drm] Replacing VGA console driver May 3 15:39:46 localhost kernel: Console: switching to colour dummy device 80x25 May 3 15:39:46 localhost kernel: [drm] Supports vblank timestamp caching Rev 2 (21.10.2013). May 3 15:39:46 localhost kernel: [drm] Driver supports precise vblank timestamp query. May 3 15:39:46 localhost kernel: i915 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem May 3 15:39:46 localhost kernel: i915 0000:00:02.0: Direct firmware load for i915/skl_dmc_ver1_27.bin failed with error -2 May 3 15:39:46 localhost kernel: i915 0000:00:02.0: Failed to load DMC firmware i915/skl_dmc_ver1_27.bin. Disabling runtime power management. May 3 15:39:46 localhost kernel: i915 0000:00:02.0: DMC firmware homepage: https://01.org/linuxgraphics/downloads/firmware May 3 15:39:46 localhost kernel: [drm] Initialized i915 1.6.0 20171222 for 0000:00:02.0 on minor 0 May 3 15:39:46 localhost kernel: ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no) May 3 15:39:46 localhost kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input6 May 3 15:39:46 localhost kernel: usb 1-9: new low-speed USB device number 2 using xhci_hcd May 3 15:39:46 localhost kernel: [drm] Cannot find any crtc or sizes May 3 15:39:46 localhost kernel: pps pps0: new PPS source ptp0 May 3 15:39:46 localhost kernel: igb 0000:02:00.0: added PHC on eth0 May 3 15:39:46 localhost kernel: igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:39:46 localhost kernel: igb 0000:02:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:65 May 3 15:39:46 localhost kernel: igb 0000:02:00.0: eth0: PBA No: 000200-000 May 3 15:39:46 localhost kernel: igb 0000:02:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:39:46 localhost kernel: usb 1-9: New USB device found, idVendor=0e8f, idProduct=0020 May 3 15:39:46 localhost kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=0 May 3 15:39:46 localhost kernel: usb 1-9: Product: PS2toUSB Adapter May 3 15:39:46 localhost kernel: usb 1-9: Manufacturer: GASIA May 3 15:39:46 localhost kernel: input: GASIA PS2toUSB Adapter as /devices/pci0000:00/0000:00:14.0/usb1/1-9/1-9:1.0/0003:0E8F:0020.0001/input/input7 May 3 15:39:46 localhost kernel: ata3: SATA link down (SStatus 4 SControl 300) May 3 15:39:46 localhost kernel: ata1: SATA link down (SStatus 4 SControl 300) May 3 15:39:46 localhost kernel: ata4: SATA link up 3.0 Gbps (SStatus 123 SControl 300) May 3 15:39:46 localhost kernel: ata2: SATA link down (SStatus 4 SControl 300) May 3 15:39:46 localhost kernel: ACPI BIOS Error (bug): Failure looking up [\_SB.PCI0.SAT0.PRT3._GTF.DSSP], AE_NOT_FOUND (20180105/psargs-364) May 3 15:39:46 localhost kernel: ACPI Error: Method parse/execution failed \_SB.PCI0.SAT0.PRT3._GTF, AE_NOT_FOUND (20180105/psparse-550) May 3 15:39:46 localhost kernel: ata4.00: ATA-8: ST31000528AS, CC38, max UDMA/133 May 3 15:39:46 localhost kernel: ata4.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 31/32) May 3 15:39:46 localhost kernel: ACPI BIOS Error (bug): Failure looking up [\_SB.PCI0.SAT0.PRT3._GTF.DSSP], AE_NOT_FOUND (20180105/psargs-364) May 3 15:39:46 localhost kernel: ACPI Error: Method parse/execution failed \_SB.PCI0.SAT0.PRT3._GTF, AE_NOT_FOUND (20180105/psparse-550) May 3 15:39:46 localhost kernel: ata4.00: configured for UDMA/133 May 3 15:39:46 localhost kernel: scsi 3:0:0:0: Direct-Access ATA ST31000528AS CC38 PQ: 0 ANSI: 5 May 3 15:39:46 localhost kernel: sd 3:0:0:0: [sda] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) May 3 15:39:46 localhost kernel: sd 3:0:0:0: [sda] Write Protect is off May 3 15:39:46 localhost kernel: sd 3:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 3 15:39:46 localhost kernel: sda: sda1 sda2 May 3 15:39:46 localhost kernel: sd 3:0:0:0: [sda] Attached SCSI disk May 3 15:39:46 localhost kernel: hid-generic 0003:0E8F:0020.0001: input,hidraw0: USB HID v1.10 Keyboard [GASIA PS2toUSB Adapter] on usb-0000:00:14.0-9/input0 May 3 15:39:47 localhost kernel: input: GASIA PS2toUSB Adapter as /devices/pci0000:00/0000:00:14.0/usb1/1-9/1-9:1.1/0003:0E8F:0020.0002/input/input8 May 3 15:39:47 localhost kernel: hid-generic 0003:0E8F:0020.0002: input,hidraw1: USB HID v1.10 Mouse [GASIA PS2toUSB Adapter] on usb-0000:00:14.0-9/input1 May 3 15:39:47 localhost kernel: pps pps1: new PPS source ptp1 May 3 15:39:47 localhost kernel: igb 0000:03:00.0: added PHC on eth1 May 3 15:39:47 localhost kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:39:47 localhost kernel: igb 0000:03:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:66 May 3 15:39:47 localhost kernel: igb 0000:03:00.0: eth1: PBA No: 000200-000 May 3 15:39:47 localhost kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:39:47 localhost kernel: pps pps2: new PPS source ptp2 May 3 15:39:47 localhost kernel: igb 0000:04:00.0: added PHC on eth2 May 3 15:39:47 localhost kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:39:47 localhost kernel: igb 0000:04:00.0: eth2: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:67 May 3 15:39:47 localhost kernel: igb 0000:04:00.0: eth2: PBA No: 000200-000 May 3 15:39:47 localhost kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:39:47 localhost kernel: pps pps3: new PPS source ptp3 May 3 15:39:47 localhost kernel: igb 0000:05:00.0: added PHC on eth3 May 3 15:39:47 localhost kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:39:47 localhost kernel: igb 0000:05:00.0: eth3: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:68 May 3 15:39:47 localhost kernel: igb 0000:05:00.0: eth3: PBA No: 000200-000 May 3 15:39:47 localhost kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:39:47 localhost kernel: pps pps4: new PPS source ptp4 May 3 15:39:47 localhost kernel: igb 0000:06:00.0: added PHC on eth4 May 3 15:39:47 localhost kernel: igb 0000:06:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:39:47 localhost kernel: igb 0000:06:00.0: eth4: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:69 May 3 15:39:47 localhost kernel: igb 0000:06:00.0: eth4: PBA No: 000200-000 May 3 15:39:47 localhost kernel: igb 0000:06:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:39:48 localhost kernel: pps pps5: new PPS source ptp5 May 3 15:39:48 localhost kernel: igb 0000:07:00.0: added PHC on eth5 May 3 15:39:48 localhost kernel: igb 0000:07:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:39:48 localhost kernel: igb 0000:07:00.0: eth5: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:6a May 3 15:39:48 localhost kernel: igb 0000:07:00.0: eth5: PBA No: 000200-000 May 3 15:39:48 localhost kernel: igb 0000:07:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:39:48 localhost kernel: igb 0000:05:00.0 enp5s0: renamed from eth3 May 3 15:39:48 localhost kernel: igb 0000:04:00.0 enp4s0: renamed from eth2 May 3 15:39:48 localhost kernel: igb 0000:06:00.0 enp6s0: renamed from eth4 May 3 15:39:48 localhost kernel: igb 0000:07:00.0 enp7s0: renamed from eth5 May 3 15:39:48 localhost kernel: igb 0000:03:00.0 eno1: renamed from eth1 May 3 15:39:48 localhost systemd-udevd: Error changing net interface name 'eth0' to 'eno1': File exists May 3 15:39:48 localhost systemd-udevd: could not rename interface '2' from 'eth0' to 'eno1': File exists May 3 15:39:48 localhost systemd: Found device /dev/mapper/centos-root. May 3 15:39:48 localhost systemd: Starting File System Check on /dev/mapper/centos-root... May 3 15:39:48 localhost systemd-fsck: /sbin/fsck.xfs: XFS file system. May 3 15:39:48 localhost systemd: Started File System Check on /dev/mapper/centos-root. May 3 15:39:48 localhost systemd: Started dracut initqueue hook. May 3 15:39:48 localhost systemd: Reached target Remote File Systems (Pre). May 3 15:39:48 localhost systemd: Starting Remote File Systems (Pre). May 3 15:39:48 localhost systemd: Reached target Remote File Systems. May 3 15:39:48 localhost systemd: Starting Remote File Systems. May 3 15:39:48 localhost systemd: Mounting /sysroot... May 3 15:39:48 localhost kernel: random: crng init done May 3 15:39:48 localhost kernel: SGI XFS with ACLs, security attributes, no debug enabled May 3 15:39:48 localhost kernel: XFS (dm-0): Mounting V5 Filesystem May 3 15:39:49 localhost kernel: XFS (dm-0): Ending clean mount May 3 15:39:49 localhost systemd: Mounted /sysroot. May 3 15:39:49 localhost systemd: Reached target Initrd Root File System. May 3 15:39:49 localhost systemd: Starting Initrd Root File System. May 3 15:39:49 localhost systemd: Starting Reload Configuration from the Real Root... May 3 15:39:49 localhost systemd: Reloading. May 3 15:39:49 localhost systemd: Started Reload Configuration from the Real Root. May 3 15:39:49 localhost systemd: Reached target Initrd File Systems. May 3 15:39:49 localhost systemd: Starting Initrd File Systems. May 3 15:39:49 localhost systemd: Reached target Initrd Default Target. May 3 15:39:49 localhost systemd: Starting Initrd Default Target. May 3 15:39:49 localhost systemd: Starting dracut pre-pivot and cleanup hook... May 3 15:39:49 localhost systemd: Started dracut pre-pivot and cleanup hook. May 3 15:39:49 localhost systemd: Starting Cleaning Up and Shutting Down Daemons... May 3 15:39:49 localhost systemd: Starting Plymouth switch root service... May 3 15:39:49 localhost systemd: Stopped target Timers. May 3 15:39:49 localhost systemd: Stopping Timers. May 3 15:39:49 localhost systemd: Stopped Cleaning Up and Shutting Down Daemons. May 3 15:39:49 localhost systemd: Stopped dracut pre-pivot and cleanup hook. May 3 15:39:49 localhost systemd: Stopping dracut pre-pivot and cleanup hook... May 3 15:39:49 localhost systemd: Stopped target Remote File Systems. May 3 15:39:49 localhost systemd: Stopping Remote File Systems. May 3 15:39:49 localhost systemd: Stopped target Remote File Systems (Pre). May 3 15:39:49 localhost systemd: Stopping Remote File Systems (Pre). May 3 15:39:49 localhost systemd: Stopped dracut initqueue hook. May 3 15:39:49 localhost systemd: Stopping dracut initqueue hook... May 3 15:39:49 localhost systemd: Stopped target Initrd Default Target. May 3 15:39:49 localhost systemd: Stopping Initrd Default Target. May 3 15:39:49 localhost systemd: Stopped target Basic System. May 3 15:39:49 localhost systemd: Stopping Basic System. May 3 15:39:49 localhost systemd: Stopped target Paths. May 3 15:39:49 localhost systemd: Stopping Paths. May 3 15:39:49 localhost systemd: Stopped target Sockets. May 3 15:39:49 localhost systemd: Stopping Sockets. May 3 15:39:49 localhost systemd: Stopped target Slices. May 3 15:39:49 localhost systemd: Stopping Slices. May 3 15:39:49 localhost systemd: Stopped target System Initialization. May 3 15:39:49 localhost systemd: Stopping System Initialization. May 3 15:39:49 localhost systemd: Stopped udev Coldplug all Devices. May 3 15:39:49 localhost systemd: Stopping udev Coldplug all Devices... May 3 15:39:49 localhost systemd: Stopped target Local File Systems. May 3 15:39:49 localhost systemd: Stopping Local File Systems. May 3 15:39:49 localhost systemd: Stopping udev Kernel Device Manager... May 3 15:39:49 localhost systemd: Stopped target Swap. May 3 15:39:49 localhost systemd: Stopping Swap. May 3 15:39:49 localhost systemd: Stopped Apply Kernel Variables. May 3 15:39:49 localhost systemd: Stopping Apply Kernel Variables... May 3 15:39:49 localhost systemd: Stopped udev Kernel Device Manager. May 3 15:39:49 localhost systemd: Stopped Create Static Device Nodes in /dev. May 3 15:39:49 localhost systemd: Stopping Create Static Device Nodes in /dev... May 3 15:39:49 localhost systemd: Stopped Create list of required static device nodes for the current kernel. May 3 15:39:49 localhost systemd: Stopping Create list of required static device nodes for the current kernel... May 3 15:39:49 localhost systemd: Stopped dracut pre-udev hook. May 3 15:39:49 localhost systemd: Stopping dracut pre-udev hook... May 3 15:39:49 localhost systemd: Stopped dracut cmdline hook. May 3 15:39:49 localhost systemd: Stopping dracut cmdline hook... May 3 15:39:49 localhost systemd: Closed udev Kernel Socket. May 3 15:39:49 localhost systemd: Stopping udev Kernel Socket. May 3 15:39:49 localhost systemd: Closed udev Control Socket. May 3 15:39:49 localhost systemd: Stopping udev Control Socket. May 3 15:39:49 localhost systemd: Starting Cleanup udevd DB... May 3 15:39:49 localhost systemd: Started Cleanup udevd DB. May 3 15:39:49 localhost systemd: Reached target Switch Root. May 3 15:39:49 localhost systemd: Starting Switch Root. May 3 15:39:49 localhost systemd: Started Plymouth switch root service. May 3 15:39:49 localhost systemd: Starting Switch Root... May 3 15:39:49 localhost systemd: Switching root. May 3 15:39:49 localhost journal: Journal stopped May 3 15:39:52 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:39:52 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:39:52 localhost systemd-journald[149]: Received SIGTERM from PID 1 (systemd). May 3 15:39:52 localhost kernel: systemd: 24 output lines suppressed due to ratelimiting May 3 15:39:52 localhost kernel: audit: type=1404 audit(1525333189.866:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 May 3 15:39:52 localhost kernel: SELinux: Permission getrlimit in class process not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class process2 not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class file not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class dir not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class lnk_file not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class chr_file not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class blk_file not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class sock_file not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class fifo_file not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class tcp_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class udp_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class rawip_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class packet_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class key_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class unix_stream_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class unix_dgram_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_route_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_tcpdiag_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_nflog_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_xfrm_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_selinux_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_iscsi_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_audit_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_fib_lookup_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_connector_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_netfilter_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_dnrt_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_kobject_uevent_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_generic_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_scsitransport_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_rdma_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class netlink_crypto_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class appletalk_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class dccp_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Permission map in class tun_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class sctp_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class icmp_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class ax25_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class ipx_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class netrom_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class atmpvc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class x25_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class rose_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class decnet_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class atmsvc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class rds_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class irda_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class pppox_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class llc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class can_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class tipc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class bluetooth_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class iucv_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class rxrpc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class isdn_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class phonet_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class ieee802154_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class caif_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class alg_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class nfc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class vsock_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class kcm_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class qipcrtr_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class smc_socket not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class infiniband_pkey not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class infiniband_endport not defined in policy. May 3 15:39:52 localhost kernel: SELinux: Class bpf not defined in policy. May 3 15:39:52 localhost kernel: SELinux: the above unknown classes and permissions will be allowed May 3 15:39:52 localhost kernel: SELinux: policy capability network_peer_controls=1 May 3 15:39:52 localhost kernel: SELinux: policy capability open_perms=1 May 3 15:39:52 localhost kernel: SELinux: policy capability extended_socket_class=0 May 3 15:39:52 localhost kernel: SELinux: policy capability always_check_network=0 May 3 15:39:52 localhost kernel: SELinux: policy capability cgroup_seclabel=0 May 3 15:39:52 localhost kernel: SELinux: policy capability nnp_nosuid_transition=0 May 3 15:39:52 localhost kernel: audit: type=1403 audit(1525333190.039:3): policy loaded auid=4294967295 ses=4294967295 May 3 15:39:52 localhost systemd[1]: Successfully loaded SELinux policy in 188.392ms. May 3 15:39:52 localhost systemd[1]: Inserted module 'ip_tables' May 3 15:39:52 localhost systemd[1]: Relabelled /dev and /run in 20.619ms. May 3 15:39:52 localhost journal: Journal started May 3 15:39:52 localhost systemd: systemd 219 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN) May 3 15:39:52 localhost systemd: Detected architecture x86-64. May 3 15:39:52 localhost systemd: Set hostname to . May 3 15:39:52 localhost systemd: Started Create list of required static device nodes for the current kernel. May 3 15:39:52 localhost systemd: Mounted Debug File System. May 3 15:39:52 localhost systemd: Mounted POSIX Message Queue File System. May 3 15:39:52 localhost systemd: Mounted Huge Pages File System. May 3 15:39:52 localhost systemd: Started Collect Read-Ahead Data. May 3 15:39:52 localhost systemd: Started Replay Read-Ahead Data. May 3 15:39:52 localhost systemd: Starting Remount Root and Kernel File Systems... May 3 15:39:52 localhost systemd: Starting Apply Kernel Variables... May 3 15:39:52 localhost systemd: Starting Create Static Device Nodes in /dev... May 3 15:39:52 localhost systemd: Started Remount Root and Kernel File Systems. May 3 15:39:52 localhost systemd: Starting Configure read-only root support... May 3 15:39:52 localhost kernel: RPC: Registered named UNIX socket transport module. May 3 15:39:52 localhost kernel: RPC: Registered udp transport module. May 3 15:39:52 localhost kernel: RPC: Registered tcp transport module. May 3 15:39:52 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 3 15:39:52 localhost systemd: Starting udev Coldplug all Devices... May 3 15:39:52 localhost systemd: Starting Flush Journal to Persistent Storage... May 3 15:39:52 localhost systemd: Starting Load/Save Random Seed... May 3 15:39:52 localhost systemd: Started Apply Kernel Variables. May 3 15:39:52 localhost systemd: Started LVM2 metadata daemon. May 3 15:39:52 localhost systemd: Starting LVM2 metadata daemon... May 3 15:39:52 localhost kernel: Installing knfsd (copyright (C) 1996 okir@monad.swb.de). May 3 15:39:52 localhost systemd: Mounted NFSD configuration filesystem. May 3 15:39:52 localhost systemd: Started udev Coldplug all Devices. May 3 15:39:52 localhost systemd: Starting udev Wait for Complete Device Initialization... May 3 15:39:53 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:39:53 localhost systemd: Started Flush Journal to Persistent Storage. May 3 15:39:53 localhost systemd: Started Load/Save Random Seed. May 3 15:39:53 localhost systemd: Started Create Static Device Nodes in /dev. May 3 15:39:53 localhost systemd: Starting udev Kernel Device Manager... May 3 15:39:53 localhost systemd: Started Configure read-only root support. May 3 15:39:53 localhost systemd-udevd: starting version 219 May 3 15:39:55 localhost systemd: Started udev Kernel Device Manager. May 3 15:39:55 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 May 3 15:39:55 localhost kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) May 3 15:39:55 localhost kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set May 3 15:39:55 localhost kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt May 3 15:39:56 localhost kernel: ipmi message handler version 39.2 May 3 15:39:56 localhost kernel: ipmi device interface May 3 15:39:56 localhost kernel: sd 3:0:0:0: Attached scsi generic sg0 type 0 May 3 15:39:56 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input9 May 3 15:39:56 localhost kernel: IPMI System Interface driver. May 3 15:39:56 localhost kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS May 3 15:39:56 localhost kernel: ipmi_si: SMBIOS: mem 0x0 regsize 1 spacing 1 irq 0 May 3 15:39:56 localhost kernel: ipmi_si: Adding SMBIOS-specified kcs state machine May 3 15:39:56 localhost kernel: ipmi_si: Trying SMBIOS-specified kcs state machine at mem address 0x0, slave address 0x20, irq 0 May 3 15:39:56 localhost kernel: ipmi_si dmi-ipmi-si.0: Could not set up I/O space May 3 15:39:56 localhost kernel: iTCO_vendor_support: vendor-support=0 May 3 15:39:56 localhost kernel: iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11 May 3 15:39:56 localhost kernel: iTCO_wdt: Found a Intel PCH TCO device (Version=4, TCOBASE=0x0400) May 3 15:39:56 localhost kernel: iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) May 3 15:39:56 localhost mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" May 3 15:39:56 localhost mtp-probe: bus: 1, device: 2 was not an MTP device May 3 15:39:56 localhost kernel: RAPL PMU: API unit is 2^-32 Joules, 5 fixed counters, 655360 ms ovfl timer May 3 15:39:56 localhost kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules May 3 15:39:56 localhost kernel: RAPL PMU: hw unit of domain package 2^-14 Joules May 3 15:39:56 localhost kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules May 3 15:39:56 localhost kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules May 3 15:39:56 localhost kernel: RAPL PMU: hw unit of domain psys 2^-14 Joules May 3 15:39:57 localhost systemd-udevd: Error changing net interface name 'eth0' to 'eno1': File exists May 3 15:39:57 localhost systemd-udevd: could not rename interface '2' from 'eth0' to 'eno1': File exists May 3 15:39:57 localhost kernel: cryptd: max_cpu_qlen set to 1000 May 3 15:39:57 localhost kernel: AVX2 version of gcm_enc/dec engaged. May 3 15:39:57 localhost kernel: AES CTR mode by8 optimization enabled May 3 15:39:57 localhost kernel: alg: No test for pcbc(aes) (pcbc-aes-aesni) May 3 15:39:58 localhost kernel: resource sanity check: requesting [mem 0xfdffe800-0xfe0007ff], which spans more than pnp 00:0a [mem 0xfdb00000-0xfdffffff] May 3 15:39:58 localhost kernel: caller pmc_core_probe+0x94/0x1000 [intel_pmc_core] mapping multiple BARs May 3 15:39:58 localhost kernel: intel_pmc_core: initialized May 3 15:39:59 localhost systemd: Created slice system-lvm2\x2dpvscan.slice. May 3 15:39:59 localhost systemd: Starting system-lvm2\x2dpvscan.slice. May 3 15:39:59 localhost systemd: Starting LVM2 PV scan on device 8:2... May 3 15:39:59 localhost lvm: WARNING: lvmetad is being updated, retrying (setup) for 10 more seconds. May 3 15:39:59 localhost systemd: Found device /dev/mapper/centos-swap. May 3 15:39:59 localhost systemd: Activating swap /dev/mapper/centos-swap... May 3 15:39:59 localhost systemd: Found device ST31000528AS 1. May 3 15:39:59 localhost systemd: Started udev Wait for Complete Device Initialization. May 3 15:39:59 localhost systemd: Starting Activation of DM RAID sets... May 3 15:39:59 localhost kernel: Adding 8126460k swap on /dev/mapper/centos-swap. Priority:-2 extents:1 across:8126460k FS May 3 15:39:59 localhost systemd: Activated swap /dev/mapper/centos-swap. May 3 15:39:59 localhost systemd: Reached target Swap. May 3 15:39:59 localhost systemd: Starting Swap. May 3 15:39:59 localhost lvm: 2 logical volume(s) in volume group "centos" monitored May 3 15:39:59 localhost systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. May 3 15:39:59 localhost systemd: Reached target Local File Systems (Pre). May 3 15:39:59 localhost systemd: Starting Local File Systems (Pre). May 3 15:39:59 localhost systemd: Mounting /boot... May 3 15:39:59 localhost kernel: XFS (sda1): Mounting V5 Filesystem May 3 15:39:59 localhost systemd: Started Activation of DM RAID sets. May 3 15:39:59 localhost systemd: Reached target Encrypted Volumes. May 3 15:39:59 localhost systemd: Starting Encrypted Volumes. May 3 15:40:00 localhost kernel: XFS (sda1): Ending clean mount May 3 15:40:00 localhost systemd: Mounted /boot. May 3 15:40:03 localhost lvm: 3 logical volume(s) in volume group "centos" now active May 3 15:40:03 localhost systemd: Found device /dev/mapper/centos-home. May 3 15:40:03 localhost systemd: Started LVM2 PV scan on device 8:2. May 3 15:40:03 localhost systemd: Mounting /home... May 3 15:40:03 localhost kernel: XFS (dm-2): Mounting V5 Filesystem May 3 15:40:05 localhost kernel: XFS (dm-2): Ending clean mount May 3 15:40:05 localhost systemd: Mounted /home. May 3 15:40:05 localhost systemd: Reached target Local File Systems. May 3 15:40:05 localhost systemd: Starting Local File Systems. May 3 15:40:05 localhost systemd: Starting Tell Plymouth To Write Out Runtime Data... May 3 15:40:05 localhost systemd: Starting Preprocess NFS configuration... May 3 15:40:05 localhost systemd: Starting Import network configuration from initramfs... May 3 15:40:05 localhost systemd: Started Preprocess NFS configuration. May 3 15:40:05 localhost systemd: Started Tell Plymouth To Write Out Runtime Data. May 3 15:40:05 localhost systemd: Started Import network configuration from initramfs. May 3 15:40:05 localhost systemd: Starting Create Volatile Files and Directories... May 3 15:40:05 localhost kernel: audit: type=1400 audit(1525333205.343:4): avc: denied { dac_read_search } for pid=763 comm="systemd-tmpfile" capability=2 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=capability permissive=0 May 3 15:40:05 localhost systemd: Started Create Volatile Files and Directories. May 3 15:40:05 localhost systemd: Mounting RPC Pipe File System... May 3 15:40:05 localhost systemd: Starting Security Auditing Service... May 3 15:40:05 localhost systemd: Mounted RPC Pipe File System. May 3 15:40:05 localhost auditd[768]: Started dispatcher: /sbin/audispd pid: 770 May 3 15:40:05 localhost audispd: audispd initialized with q_depth=250 and 1 active plugins May 3 15:40:05 localhost auditd[768]: Init complete, auditd 2.7.6 listening for events (startup state enable) May 3 15:40:05 localhost augenrules: /sbin/augenrules: No change May 3 15:40:05 localhost augenrules: No rules May 3 15:40:05 localhost augenrules: enabled 1 May 3 15:40:05 localhost augenrules: failure 1 May 3 15:40:05 localhost augenrules: pid 768 May 3 15:40:05 localhost augenrules: rate_limit 0 May 3 15:40:05 localhost augenrules: backlog_limit 8192 May 3 15:40:05 localhost augenrules: lost 0 May 3 15:40:05 localhost augenrules: backlog 0 May 3 15:40:05 localhost augenrules: enabled 1 May 3 15:40:05 localhost augenrules: failure 1 May 3 15:40:05 localhost augenrules: pid 768 May 3 15:40:05 localhost augenrules: rate_limit 0 May 3 15:40:05 localhost augenrules: backlog_limit 8192 May 3 15:40:05 localhost augenrules: lost 0 May 3 15:40:05 localhost augenrules: backlog 1 May 3 15:40:05 localhost systemd: Started Security Auditing Service. May 3 15:40:05 localhost systemd: Starting Update UTMP about System Boot/Shutdown... May 3 15:40:05 localhost systemd: Started Update UTMP about System Boot/Shutdown. May 3 15:40:05 localhost systemd: Reached target System Initialization. May 3 15:40:05 localhost systemd: Starting System Initialization. May 3 15:40:05 localhost systemd: Listening on D-Bus System Message Bus Socket. May 3 15:40:05 localhost systemd: Starting D-Bus System Message Bus Socket. May 3 15:40:05 localhost systemd: Listening on Virtual machine log manager socket. May 3 15:40:05 localhost systemd: Starting Virtual machine log manager socket. May 3 15:40:05 localhost systemd: Listening on Open-iSCSI iscsiuio Socket. May 3 15:40:05 localhost systemd: Starting Open-iSCSI iscsiuio Socket. May 3 15:40:05 localhost systemd: Started Flexible branding. May 3 15:40:05 localhost systemd: Starting Flexible branding. May 3 15:40:05 localhost systemd: Started CUPS Printer Service Spool. May 3 15:40:05 localhost systemd: Starting CUPS Printer Service Spool. May 3 15:40:05 localhost systemd: Reached target Paths. May 3 15:40:05 localhost systemd: Starting Paths. May 3 15:40:05 localhost systemd: Started Daily Cleanup of Temporary Directories. May 3 15:40:05 localhost systemd: Starting Daily Cleanup of Temporary Directories. May 3 15:40:05 localhost systemd: Reached target Timers. May 3 15:40:05 localhost systemd: Starting Timers. May 3 15:40:05 localhost systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. May 3 15:40:05 localhost systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. May 3 15:40:05 localhost systemd: Listening on Open-iSCSI iscsid Socket. May 3 15:40:05 localhost systemd: Starting Open-iSCSI iscsid Socket. May 3 15:40:05 localhost systemd: Listening on PC/SC Smart Card Daemon Activation Socket. May 3 15:40:05 localhost systemd: Starting PC/SC Smart Card Daemon Activation Socket. May 3 15:40:05 localhost systemd: Listening on CUPS Printing Service Sockets. May 3 15:40:05 localhost systemd: Starting CUPS Printing Service Sockets. May 3 15:40:06 localhost systemd: Listening on RPCbind Server Activation Socket. May 3 15:40:06 localhost systemd: Starting RPCbind Server Activation Socket. May 3 15:40:06 localhost systemd: Listening on Virtual machine lock manager socket. May 3 15:40:06 localhost systemd: Starting Virtual machine lock manager socket. May 3 15:40:06 localhost systemd: Reached target Sockets. May 3 15:40:06 localhost systemd: Starting Sockets. May 3 15:40:06 localhost systemd: Reached target Basic System. May 3 15:40:06 localhost systemd: Starting Basic System. May 3 15:40:06 localhost systemd: Started libstoragemgmt plug-in server daemon. May 3 15:40:06 localhost systemd: Starting libstoragemgmt plug-in server daemon... May 3 15:40:06 localhost systemd: Starting Resets System Activity Logs... May 3 15:40:06 localhost systemd: Started irqbalance daemon. May 3 15:40:06 localhost systemd: Starting irqbalance daemon... May 3 15:40:06 localhost systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. May 3 15:40:06 localhost systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... May 3 15:40:06 localhost systemd: Starting Load CPU microcode update... May 3 15:40:06 localhost systemd: Starting Kernel Samepage Merging... May 3 15:40:06 localhost systemd: Started Manage Sound Card State (restore and store). May 3 15:40:06 localhost systemd: Starting Manage Sound Card State (restore and store)... May 3 15:40:06 localhost alsactl[801]: alsactl 1.1.3 daemon started May 3 15:40:06 localhost alsactl[801]: /usr/sbin/alsactl: load_state:1683Cannot open /var/lib/alsa/asound.state for reading: No such file or directory May 3 15:40:06 localhost smartd[796]: smartd 6.2 2017-02-27 r4394 [x86_64-linux-4.16.0-1.el7.elrepo.x86_64] (local build) May 3 15:40:06 localhost smartd[796]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org May 3 15:40:06 localhost smartd[796]: Opened configuration file /etc/smartmontools/smartd.conf May 3 15:40:06 localhost smartd[796]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices May 3 15:40:06 localhost smartd[796]: Device: /dev/sda, type changed from 'scsi' to 'sat' May 3 15:40:06 localhost smartd[796]: Device: /dev/sda [SAT], opened May 3 15:40:06 localhost smartd[796]: Device: /dev/sda [SAT], ST31000528AS, S/N:6VP8LQ2X, WWN:5-000c50-02b9aa3b6, FW:CC38, 1.00 TB May 3 15:40:06 localhost smartd[796]: Device: /dev/sda [SAT], found in smartd database: Seagate Barracuda 7200.12 May 3 15:40:06 localhost smartd[796]: Device: /dev/sda [SAT], WARNING: A firmware update for this drive may be available, May 3 15:40:06 localhost smartd[796]: see the following Seagate web pages: May 3 15:40:06 localhost smartd[796]: http://knowledge.seagate.com/articles/en_US/FAQ/207931en May 3 15:40:06 localhost smartd[796]: http://knowledge.seagate.com/articles/en_US/FAQ/213891en May 3 15:40:06 localhost smartd[796]: Device: /dev/sda [SAT], is SMART capable. Adding to "monitor" list. May 3 15:40:06 localhost smartd[796]: Monitoring 1 ATA and 0 SCSI devices May 3 15:40:07 localhost systemd: Starting NTP client/server... May 3 15:40:07 localhost systemd: Starting Avahi mDNS/DNS-SD Stack... May 3 15:40:07 localhost systemd: Starting Machine Check Exception Logging Daemon... May 3 15:40:07 localhost systemd: Starting Login Service... May 3 15:40:07 localhost systemd: Started ABRT Automated Bug Reporting Tool. May 3 15:40:07 localhost systemd: Starting ABRT Automated Bug Reporting Tool... May 3 15:40:07 localhost systemd: Started ABRT kernel log watcher. May 3 15:40:07 localhost systemd: Starting ABRT kernel log watcher... May 3 15:40:07 localhost systemd: Started ABRT Xorg log watcher. May 3 15:40:07 localhost systemd: Starting ABRT Xorg log watcher... May 3 15:40:07 localhost systemd: Starting Install ABRT coredump hook... May 3 15:40:07 localhost systemd: Starting Authorization Manager... May 3 15:40:07 localhost systemd: Starting System Logging Service... May 3 15:40:07 localhost systemd: Starting Modem Manager... May 3 15:40:07 localhost systemd: Starting GSSAPI Proxy Daemon... May 3 15:40:07 localhost systemd: Starting Dump dmesg to /var/log/dmesg... May 3 15:40:07 localhost systemd: Started Hardware RNG Entropy Gatherer Daemon. May 3 15:40:07 localhost systemd: Starting Hardware RNG Entropy Gatherer Daemon... May 3 15:40:07 localhost systemd: Starting RealtimeKit Scheduling Policy Service... May 3 15:40:07 localhost systemd: Starting Accounts Service... May 3 15:40:07 localhost systemd: Started D-Bus System Message Bus. May 3 15:40:07 localhost rngd: read error May 3 15:40:07 localhost rngd: hwrng: no available rng May 3 15:40:07 localhost rngd: Unable to open file: /dev/tpm0 May 3 15:40:07 localhost mcelog: warning: 8 bytes ignored in each record May 3 15:40:07 localhost mcelog: consider an update May 3 15:40:07 localhost avahi-daemon[809]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). May 3 15:40:07 localhost avahi-daemon[809]: Successfully dropped root privileges. May 3 15:40:07 localhost avahi-daemon[809]: avahi-daemon 0.6.31 starting up. May 3 15:40:07 localhost avahi-daemon[809]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! May 3 15:40:07 localhost rsyslogd: [origin software="rsyslogd" swVersion="8.24.0" x-pid="822" x-info="http://www.rsyslog.com"] start May 3 15:40:07 localhost ModemManager[823]: ModemManager (version 1.6.0-2.el7) starting in system bus... May 3 15:40:07 localhost chronyd[840]: chronyd version 3.1 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SECHASH +SIGND +ASYNCDNS +IPV6 +DEBUG) May 3 15:40:07 localhost chronyd[840]: Frequency 16.400 +/- 4.896 ppm read from /var/lib/chrony/drift May 3 15:40:07 localhost polkitd[821]: Started polkitd version 0.112 May 3 15:40:07 localhost avahi-daemon[809]: Successfully called chroot(). May 3 15:40:07 localhost avahi-daemon[809]: Successfully dropped remaining capabilities. May 3 15:40:07 localhost avahi-daemon[809]: No service file found in /etc/avahi/services. May 3 15:40:07 localhost systemd: Started Avahi mDNS/DNS-SD Stack. May 3 15:40:07 localhost avahi-daemon[809]: System host name is set to 'localhost'. This is not a suitable mDNS host name, looking for alternatives. May 3 15:40:07 localhost systemd: Started RealtimeKit Scheduling Policy Service. May 3 15:40:07 localhost systemd: Starting D-Bus System Message Bus... May 3 15:40:07 localhost systemd: Started System Logging Service. May 3 15:40:07 localhost systemd: Started Resets System Activity Logs. May 3 15:40:07 localhost systemd: Started Load CPU microcode update. May 3 15:40:07 localhost systemd: Started Kernel Samepage Merging. May 3 15:40:08 localhost systemd: Started Dump dmesg to /var/log/dmesg. May 3 15:40:08 localhost systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... May 3 15:40:08 localhost systemd: Started Machine Check Exception Logging Daemon. May 3 15:40:08 localhost systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. May 3 15:40:08 localhost systemd: Started NTP client/server. May 3 15:40:08 localhost systemd: Started Install ABRT coredump hook. May 3 15:40:08 localhost systemd: Started GSSAPI Proxy Daemon. May 3 15:40:08 localhost systemd: Reached target NFS client services. May 3 15:40:08 localhost systemd: Starting NFS client services. May 3 15:40:08 localhost systemd: Started Login Service. May 3 15:40:08 localhost systemd-logind: Watching system buttons on /dev/input/event2 (Power Button) May 3 15:40:08 localhost systemd-logind: Watching system buttons on /dev/input/event3 (Video Bus) May 3 15:40:08 localhost systemd-logind: Watching system buttons on /dev/input/event1 (Power Button) May 3 15:40:08 localhost systemd-logind: Watching system buttons on /dev/input/event0 (Sleep Button) May 3 15:40:08 localhost systemd-logind: New seat seat0. May 3 15:40:08 localhost avahi-daemon[809]: Network interface enumeration completed. May 3 15:40:08 localhost avahi-daemon[809]: Registering HINFO record with values 'X86_64'/'LINUX'. May 3 15:40:08 localhost avahi-daemon[809]: Server startup complete. Host name is linux.local. Local service cookie is 3436790119. May 3 15:40:08 localhost systemd: Started Modem Manager. May 3 15:40:08 localhost abrtd: '/var/spool/abrt/oops-2017-12-18-23:14:43-1785-0' is not a problem directory May 3 15:40:08 localhost systemd: Started Authorization Manager. May 3 15:40:08 localhost systemd: Starting firewalld - dynamic firewall daemon... May 3 15:40:08 localhost dbus-daemon: dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:40:08 localhost dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:40:08 localhost accounts-daemon[828]: started daemon version 0.6.45 May 3 15:40:08 localhost systemd: Started Accounts Service. May 3 15:40:09 localhost abrtd: '/var/spool/abrt/oops-2017-12-19-15:25:04-1871-0' is not a problem directory May 3 15:40:09 localhost abrtd: Init complete, entering main loop May 3 15:40:10 localhost systemd: Started firewalld - dynamic firewall daemon. May 3 15:40:10 localhost systemd: Reached target Network (Pre). May 3 15:40:10 localhost systemd: Starting Network (Pre). May 3 15:40:10 localhost systemd: Starting Network Manager... May 3 15:40:10 localhost ModemManager[823]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0': not supported by any plugin May 3 15:40:10 localhost ModemManager[823]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0': not supported by any plugin May 3 15:40:10 localhost ModemManager[823]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.6/0000:04:00.0': not supported by any plugin May 3 15:40:10 localhost ModemManager[823]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.7/0000:05:00.0': not supported by any plugin May 3 15:40:10 localhost ModemManager[823]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1d.0/0000:06:00.0': not supported by any plugin May 3 15:40:10 localhost ModemManager[823]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1d.1/0000:07:00.0': not supported by any plugin May 3 15:40:10 localhost firewalld[892]: WARNING: ICMP type 'beyond-scope' is not supported by the kernel for ipv6. May 3 15:40:10 localhost firewalld[892]: WARNING: beyond-scope: INVALID_ICMPTYPE: No supported ICMP type., ignoring for run-time. May 3 15:40:10 localhost firewalld[892]: WARNING: ICMP type 'failed-policy' is not supported by the kernel for ipv6. May 3 15:40:10 localhost firewalld[892]: WARNING: failed-policy: INVALID_ICMPTYPE: No supported ICMP type., ignoring for run-time. May 3 15:40:10 localhost firewalld[892]: WARNING: ICMP type 'reject-route' is not supported by the kernel for ipv6. May 3 15:40:10 localhost firewalld[892]: WARNING: reject-route: INVALID_ICMPTYPE: No supported ICMP type., ignoring for run-time. May 3 15:40:11 localhost NetworkManager[900]: [1525333211.3413] NetworkManager (version 1.8.0-9.el7) is starting... (for the first time) May 3 15:40:11 localhost NetworkManager[900]: [1525333211.3419] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 10-slaves-order.conf) May 3 15:40:11 localhost NetworkManager[900]: [1525333211.4639] manager[0x558ad58b90d0]: monitoring kernel firmware directory '/lib/firmware'. May 3 15:40:11 localhost NetworkManager[900]: [1525333211.5577] policy: hostname management mode: default May 3 15:40:11 localhost NetworkManager[900]: [1525333211.5580] dns-mgr[0x558ad58c0160]: init: dns=default, rc-manager=file May 3 15:40:11 localhost systemd: Started Network Manager. May 3 15:40:11 localhost systemd: Starting Network Manager Wait Online... May 3 15:40:11 localhost dbus-daemon: dbus[829]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' May 3 15:40:11 localhost dbus[829]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' May 3 15:40:11 localhost systemd: Starting Network Manager Script Dispatcher Service... May 3 15:40:11 localhost dbus[829]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' May 3 15:40:11 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' May 3 15:40:11 localhost systemd: Started Network Manager Script Dispatcher Service. May 3 15:40:11 localhost NetworkManager[900]: [1525333211.8950] settings: loaded plugin ifcfg-rh: (c) 2007 - 2015 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. (/usr/lib64/NetworkManager/libnm-settings-plugin-ifcfg-rh.so) May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9018] settings: loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. (/usr/lib64/NetworkManager/libnm-settings-plugin-ibft.so) May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9019] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9123] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-eno1 (b1c8f11b-8040-41a8-b9e7-3aaac7baa349,"eno1") May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9130] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp4s0 (de8a700c-d250-452f-bd56-55b5e3798588,"enp4s0") May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9136] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp5s0 (e01745c6-bb78-4d8e-b73a-06679525f5ef,"enp5s0") May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9142] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp6s0 (ab51025f-fbbe-4ed8-9910-b7d83de48487,"enp6s0") May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9148] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp7s0 (4d4a9641-ce62-4b40-884b-6b4b5d42faac,"enp7s0") May 3 15:40:11 localhost NetworkManager[900]: [1525333211.9154] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-eth0 (2855711d-98d0-4bfa-81aa-edd7acdc0f41,"eth0") May 3 15:40:12 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:40:12 localhost dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:40:12 localhost dbus[829]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' May 3 15:40:12 localhost dbus-daemon: dbus[829]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' May 3 15:40:12 localhost systemd: Starting Hostname Service... May 3 15:40:12 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.freedesktop.hostname1' May 3 15:40:12 localhost dbus[829]: [system] Successfully activated service 'org.freedesktop.hostname1' May 3 15:40:12 localhost systemd: Started Hostname Service. May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1498] settings: hostname: using hostnamed May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1498] settings: hostname changed from (none) to "localhost.localdomain" May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1504] dhcp-init: Using DHCP client 'dhclient' May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1505] manager: rfkill: WiFi enabled by radio killswitch; enabled by state file May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1505] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1505] manager: Networking is enabled by state file May 3 15:40:12 localhost nm-dispatcher: req:1 'hostname': new request (4 scripts) May 3 15:40:12 localhost nm-dispatcher: req:1 'hostname': start running ordered scripts... May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1786] Loaded device plugin: NMBondDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1786] Loaded device plugin: NMBridgeDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1786] Loaded device plugin: NMDummyDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1786] Loaded device plugin: NMEthernetDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1786] Loaded device plugin: NMInfinibandDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1786] Loaded device plugin: NMIPTunnelDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1787] Loaded device plugin: NMMacsecDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1794] Loaded device plugin: NMMacvlanDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1795] Loaded device plugin: NMTunDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1795] Loaded device plugin: NMVethDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1795] Loaded device plugin: NMVlanDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.1795] Loaded device plugin: NMVxlanDeviceFactory (internal) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2051] Loaded device plugin: NMAtmManager (/usr/lib64/NetworkManager/libnm-device-plugin-adsl.so) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2270] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/libnm-device-plugin-team.so) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2483] Loaded device plugin: NMWifiFactory (/usr/lib64/NetworkManager/libnm-device-plugin-wifi.so) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2506] device (lo): link connected May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2515] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2539] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.2558] device (eth0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready May 3 15:40:12 localhost NetworkManager[900]: [1525333212.3035] manager: (eno1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.3043] device (eno1): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready May 3 15:40:12 localhost NetworkManager[900]: [1525333212.3506] manager: (enp4s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/4) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.3512] device (enp4s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp4s0: link is not ready May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp4s0: link is not ready May 3 15:40:12 localhost NetworkManager[900]: [1525333212.3977] manager: (enp5s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/5) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.3983] device (enp5s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp5s0: link is not ready May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp5s0: link is not ready May 3 15:40:12 localhost NetworkManager[900]: [1525333212.4446] manager: (enp6s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/6) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.4453] device (enp6s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp6s0: link is not ready May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp6s0: link is not ready May 3 15:40:12 localhost NetworkManager[900]: [1525333212.4917] manager: (enp7s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/7) May 3 15:40:12 localhost NetworkManager[900]: [1525333212.4923] device (enp7s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp7s0: link is not ready May 3 15:40:12 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp7s0: link is not ready May 3 15:40:12 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:40:12 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:40:12 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:40:12 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:40:12 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:40:12 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:40:12 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:40:12 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:40:12 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:40:12 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:40:13 localhost kernel: igb 0000:02:00.0 eth0: igb: eth0 NIC Link is Up 100 Mbps Full Duplex, Flow Control: RX/TX May 3 15:40:13 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 3 15:40:13 localhost NetworkManager[900]: [1525333213.9283] device (eth0): link connected May 3 15:40:13 localhost NetworkManager[900]: [1525333213.9287] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed') [20 30 40] May 3 15:40:17 localhost NetworkManager[900]: [1525333217.8281] manager: startup complete May 3 15:40:17 localhost systemd: Started Network Manager Wait Online. May 3 15:40:17 localhost systemd: Starting LSB: Bring up/down networking... May 3 15:40:18 localhost network: Bringing up loopback interface: [ OK ] May 3 15:40:18 localhost systemd: Started LSB: Bring up/down networking. May 3 15:40:18 localhost systemd: Reached target Network. May 3 15:40:18 localhost systemd: Starting Network. May 3 15:40:18 localhost systemd: Starting /etc/rc.d/rc.local Compatibility... May 3 15:40:18 localhost systemd: Starting OpenSSH server daemon... May 3 15:40:18 localhost systemd: Starting Postfix Mail Transport Agent... May 3 15:40:18 localhost systemd: Starting Logout off all iSCSI sessions on shutdown... May 3 15:40:18 localhost systemd: Reached target Network is Online. May 3 15:40:18 localhost systemd: Starting Network is Online. May 3 15:40:18 localhost systemd: Starting Notify NFS peers of a restart... May 3 15:40:18 localhost systemd: Started CUPS Printing Service. May 3 15:40:18 localhost systemd: Starting CUPS Printing Service... May 3 15:40:18 localhost systemd: Starting Dynamic System Tuning Daemon... May 3 15:40:18 localhost systemd: Started Logout off all iSCSI sessions on shutdown. May 3 15:40:18 localhost systemd: Reached target Remote File Systems (Pre). May 3 15:40:18 localhost systemd: Starting Remote File Systems (Pre). May 3 15:40:18 localhost systemd: Reached target Remote File Systems. May 3 15:40:18 localhost systemd: Starting Remote File Systems. May 3 15:40:18 localhost systemd: Starting Virtualization daemon... May 3 15:40:18 localhost systemd: Starting Crash recovery kernel arming... May 3 15:40:18 localhost systemd: Starting Permit User Sessions... May 3 15:40:18 localhost systemd: Starting Availability of block devices... May 3 15:40:18 localhost systemd: Started Permit User Sessions. May 3 15:40:18 localhost systemd: Started Command Scheduler. May 3 15:40:18 localhost systemd: Starting Command Scheduler... May 3 15:40:18 localhost systemd: Started Job spooling tools. May 3 15:40:18 localhost systemd: Starting Job spooling tools... May 3 15:40:18 localhost systemd: Started Availability of block devices. May 3 15:40:18 localhost systemd: Started /etc/rc.d/rc.local Compatibility. May 3 15:40:18 localhost kdumpctl: No memory reserved for crash kernel May 3 15:40:18 localhost kdumpctl: Starting kdump: [FAILED] May 3 15:40:18 localhost systemd: kdump.service: main process exited, code=exited, status=1/FAILURE May 3 15:40:18 localhost systemd: Failed to start Crash recovery kernel arming. May 3 15:40:18 localhost systemd: Unit kdump.service entered failed state. May 3 15:40:18 localhost systemd: kdump.service failed. May 3 15:40:18 localhost systemd: Starting Wait for Plymouth Boot Screen to Quit... May 3 15:40:18 localhost systemd: Starting GNOME Display Manager... May 3 15:40:18 localhost systemd: Started OpenSSH server daemon. May 3 15:40:18 localhost systemd: Started Dynamic System Tuning Daemon. May 3 15:40:18 localhost sm-notify[1198]: Version 1.3.0 starting May 3 15:40:18 localhost systemd: Started Notify NFS peers of a restart. May 3 15:40:18 localhost systemd: Started GNOME Display Manager. May 3 15:40:18 localhost setroubleshoot: failed to retrieve rpm info for /dmesg.txt May 3 15:40:18 localhost setroubleshoot: SELinux is preventing /usr/bin/dmesg from write access on the file /dmesg.txt. For complete SELinux messages run: sealert -l cded0810-3e4e-440a-abe3-d2ff82d47a04 May 3 15:40:18 localhost python: SELinux is preventing /usr/bin/dmesg from write access on the file /dmesg.txt.#012#012***** Plugin leaks (86.2 confidence) suggests *****************************#012#012If you want to ignore dmesg trying to write access the dmesg.txt file, because you believe it should not need this access.#012Then you should report this as a bug. #012You can generate a local policy module to dontaudit this access.#012Do#012# ausearch -x /usr/bin/dmesg --raw | audit2allow -D -M my-dmesg#012# semodule -i my-dmesg.pp#012#012***** Plugin catchall (14.7 confidence) suggests **************************#012#012If you believe that dmesg should be allowed write access on the dmesg.txt file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dmesg' --raw | audit2allow -M my-dmesg#012# semodule -i my-dmesg.pp#012 May 3 15:40:18 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:40:18 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:40:18 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:40:18 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:40:18 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:40:18 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:40:18 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:40:18 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:40:19 localhost systemd: Started Postfix Mail Transport Agent. May 3 15:40:19 localhost systemd: Started Virtualization daemon. May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost NetworkManager[900]: [1525333220.4555] manager: (virbr0): new Bridge device (/org/freedesktop/NetworkManager/Devices/8) May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost kernel: tun: Universal TUN/TAP device driver, 1.6 May 3 15:40:20 localhost kernel: virbr0: port 1(virbr0-nic) entered blocking state May 3 15:40:20 localhost kernel: virbr0: port 1(virbr0-nic) entered disabled state May 3 15:40:20 localhost kernel: device virbr0-nic entered promiscuous mode May 3 15:40:20 localhost NetworkManager[900]: [1525333220.4628] manager: (virbr0-nic): new Tun device (/org/freedesktop/NetworkManager/Devices/9) May 3 15:40:20 localhost NetworkManager[900]: [1525333220.4661] device (virbr0-nic): state change: unmanaged -> unavailable (reason 'connection-assumed') [10 20 41] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.4669] device (virbr0-nic): state change: unavailable -> disconnected (reason 'none') [20 30 0] May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost kernel: virbr0: port 1(virbr0-nic) entered blocking state May 3 15:40:20 localhost kernel: virbr0: port 1(virbr0-nic) entered listening state May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5466] device (virbr0): state change: unmanaged -> unavailable (reason 'connection-assumed') [10 20 41] May 3 15:40:20 localhost avahi-daemon[809]: Joining mDNS multicast group on interface virbr0.IPv4 with address 192.168.122.1. May 3 15:40:20 localhost avahi-daemon[809]: New relevant interface virbr0.IPv4 for mDNS. May 3 15:40:20 localhost avahi-daemon[809]: Registering new address record for 192.168.122.1 on virbr0.IPv4. May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5487] ifcfg-rh: add connection in-memory (409f1b10-ec8a-423e-873b-9c2635a4e0a6,"virbr0") May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5492] device (virbr0): state change: unavailable -> disconnected (reason 'connection-assumed') [20 30 41] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5501] device (virbr0): Activation: starting connection 'virbr0' (409f1b10-ec8a-423e-873b-9c2635a4e0a6) May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5504] device (virbr0): state change: disconnected -> prepare (reason 'none') [30 40 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5509] device (virbr0): state change: prepare -> config (reason 'none') [40 50 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5518] keyfile: add connection in-memory (e97ca8f4-c73a-475e-bd2d-ff47ed8997fa,"virbr0-nic") May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5527] device (virbr0-nic): Activation: starting connection 'virbr0-nic' (e97ca8f4-c73a-475e-bd2d-ff47ed8997fa) May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5527] device (virbr0): state change: config -> ip-config (reason 'none') [50 70 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5534] device (virbr0-nic): state change: disconnected -> prepare (reason 'none') [30 40 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5743] device (virbr0): state change: ip-config -> ip-check (reason 'none') [70 80 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5749] device (virbr0-nic): state change: prepare -> config (reason 'none') [40 50 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5751] device (virbr0-nic): state change: config -> ip-config (reason 'none') [50 70 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5753] device (virbr0): bridge port virbr0-nic was attached May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5753] device (virbr0-nic): Activation: connection 'virbr0-nic' enslaved, continuing activation May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5753] device (virbr0): state change: ip-check -> secondaries (reason 'none') [80 90 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5756] device (virbr0-nic): state change: ip-config -> secondaries (reason 'none') [70 90 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5759] device (virbr0): state change: secondaries -> activated (reason 'none') [90 100 0] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.5760] manager: NetworkManager state is now CONNECTED_LOCAL May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost NetworkManager[900]: [1525333220.6510] device (virbr0): Activation: successful, device activated. May 3 15:40:20 localhost NetworkManager[900]: [1525333220.6518] device (virbr0-nic): state change: secondaries -> activated (reason 'none') [90 100 0] May 3 15:40:20 localhost nm-dispatcher: req:2 'up' [virbr0]: new request (4 scripts) May 3 15:40:20 localhost nm-dispatcher: req:2 'up' [virbr0]: start running ordered scripts... May 3 15:40:20 localhost dnsmasq[1428]: started, version 2.76 cachesize 150 May 3 15:40:20 localhost dnsmasq[1428]: compile time options: IPv6 GNU-getopt DBus no-i18n IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth no-DNSSEC loop-detect inotify May 3 15:40:20 localhost dnsmasq-dhcp[1428]: DHCP, IP range 192.168.122.2 -- 192.168.122.254, lease time 1h May 3 15:40:20 localhost dnsmasq-dhcp[1428]: DHCP, sockets bound exclusively to interface virbr0 May 3 15:40:20 localhost dnsmasq[1428]: no servers found in /etc/resolv.conf, will retry May 3 15:40:20 localhost dnsmasq[1428]: read /etc/hosts - 2 addresses May 3 15:40:20 localhost dnsmasq[1428]: read /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses May 3 15:40:20 localhost dnsmasq-dhcp[1428]: read /var/lib/libvirt/dnsmasq/default.hostsfile May 3 15:40:20 localhost kernel: virbr0: port 1(virbr0-nic) entered disabled state May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost systemd: Unit iscsi.service cannot be reloaded because it is inactive. May 3 15:40:20 localhost NetworkManager[900]: [1525333220.7093] device (virbr0-nic): Activation: successful, device activated. May 3 15:40:20 localhost nm-dispatcher: req:3 'up' [virbr0-nic]: new request (4 scripts) May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost NetworkManager[900]: [1525333220.7105] device (virbr0-nic): state change: activated -> unmanaged (reason 'connection-assumed') [100 10 41] May 3 15:40:20 localhost NetworkManager[900]: [1525333220.7107] device (virbr0): bridge port virbr0-nic was detached May 3 15:40:20 localhost NetworkManager[900]: [1525333220.7107] device (virbr0-nic): released from master device virbr0 May 3 15:40:20 localhost nm-dispatcher: req:3 'up' [virbr0-nic]: start running ordered scripts... May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost systemd: Unit iscsi.service cannot be reloaded because it is inactive. May 3 15:40:20 localhost nm-dispatcher: req:4 'down' [virbr0-nic]: new request (4 scripts) May 3 15:40:20 localhost nm-dispatcher: req:4 'down' [virbr0-nic]: start running ordered scripts... May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost systemd: Created slice User Slice of gdm. May 3 15:40:21 localhost systemd: Starting User Slice of gdm. May 3 15:40:21 localhost systemd-logind: New session c1 of user gdm. May 3 15:40:21 localhost systemd: Started Session c1 of user gdm. May 3 15:40:21 localhost systemd: Starting Session c1 of user gdm. May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost gnome-session: generating cookie with syscall May 3 15:40:21 localhost gnome-session: generating cookie with syscall May 3 15:40:21 localhost gnome-session: generating cookie with syscall May 3 15:40:21 localhost gnome-session: generating cookie with syscall May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:40:21 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:40:21 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:40:21 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:40:22 localhost dbus-daemon: dbus[829]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' May 3 15:40:22 localhost dbus[829]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' May 3 15:40:22 localhost systemd: Starting Daemon for power management... May 3 15:40:22 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.freedesktop.UPower' May 3 15:40:22 localhost dbus[829]: [system] Successfully activated service 'org.freedesktop.UPower' May 3 15:40:22 localhost systemd: Started Daemon for power management. May 3 15:40:22 localhost rtkit-daemon[827]: Successfully made thread 1613 of process 1613 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. May 3 15:40:23 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:40:23 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:40:23 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:40:23 localhost journal: JS WARNING: [resource:///org/gnome/shell/gdm/loginDialog.js 1027]: anonymous function does not always return a value May 3 15:40:23 localhost journal: JS ERROR: TypeError: Main.layoutManager.primaryMonitor is null#012LegacyTray<._sync@resource:///org/gnome/shell/ui/legacyTray.js:241#012wrapper@resource:///org/gnome/gjs/modules/lang.js:178#012LegacyTray<._init@resource:///org/gnome/shell/ui/legacyTray.js:137#012wrapper@resource:///org/gnome/gjs/modules/lang.js:178#012_Base.prototype._construct@resource:///org/gnome/gjs/modules/lang.js:110#012Class.prototype._construct/newClass@resource:///org/gnome/gjs/modules/lang.js:213#012_initializeUI@resource:///org/gnome/shell/ui/main.js:169#012start@resource:///org/gnome/shell/ui/main.js:125#012@
:1 May 3 15:40:23 localhost journal: Execution of main.js threw exception: JS_EvaluateScript() failed May 3 15:40:23 localhost gnome-session: gnome-session-binary[1525]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 May 3 15:40:23 localhost gnome-session-binary[1525]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 May 3 15:40:24 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:40:24 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:40:24 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:40:24 localhost journal: JS WARNING: [resource:///org/gnome/shell/gdm/loginDialog.js 1027]: anonymous function does not always return a value May 3 15:40:24 localhost journal: JS ERROR: TypeError: Main.layoutManager.primaryMonitor is null#012LegacyTray<._sync@resource:///org/gnome/shell/ui/legacyTray.js:241#012wrapper@resource:///org/gnome/gjs/modules/lang.js:178#012LegacyTray<._init@resource:///org/gnome/shell/ui/legacyTray.js:137#012wrapper@resource:///org/gnome/gjs/modules/lang.js:178#012_Base.prototype._construct@resource:///org/gnome/gjs/modules/lang.js:110#012Class.prototype._construct/newClass@resource:///org/gnome/gjs/modules/lang.js:213#012_initializeUI@resource:///org/gnome/shell/ui/main.js:169#012start@resource:///org/gnome/shell/ui/main.js:125#012@
:1 May 3 15:40:24 localhost journal: Execution of main.js threw exception: JS_EvaluateScript() failed May 3 15:40:24 localhost gnome-session: gnome-session-binary[1525]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 May 3 15:40:24 localhost gnome-session-binary[1525]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 May 3 15:40:24 localhost gnome-session-binary[1525]: WARNING: App 'org.gnome.Shell.desktop' respawning too quickly May 3 15:40:24 localhost gnome-session-binary: Unrecoverable failure in required component org.gnome.Shell.desktop May 3 15:40:24 localhost gnome-session: gnome-session-binary[1525]: WARNING: App 'org.gnome.Shell.desktop' respawning too quickly May 3 15:40:24 localhost spice-vdagent[1632]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 May 3 15:40:24 localhost gnome-session: gnome-session-binary[1525]: WARNING: App 'spice-vdagent.desktop' exited with code 1 May 3 15:40:24 localhost gnome-session-binary[1525]: WARNING: App 'spice-vdagent.desktop' exited with code 1 May 3 15:40:24 localhost gnome-session-binary: Entering running state May 3 15:40:24 localhost dbus[829]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' May 3 15:40:24 localhost dbus-daemon: dbus[829]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' May 3 15:40:24 localhost systemd: Starting Manage, Install and Generate Color Profiles... May 3 15:40:24 localhost gnome-settings-daemon: ObjectStore.cpp(59): Failed to enumerate object store in /var/lib/softhsm/tokens/ May 3 15:40:24 localhost gnome-settings-daemon: SoftHSM.cpp(476): Could not load the object store May 3 15:40:24 localhost gnome-settings-daemon: ObjectStore.cpp(59): Failed to enumerate object store in /var/lib/softhsm/tokens/ May 3 15:40:24 localhost gnome-settings-daemon: SoftHSM.cpp(476): Could not load the object store May 3 15:40:24 localhost systemd: Started PC/SC Smart Card Daemon. May 3 15:40:24 localhost systemd: Starting PC/SC Smart Card Daemon... May 3 15:40:24 localhost pcscd: 00000000 utils.c:53:GetDaemonPid() Can't open /var/run/pcscd/pcscd.pid: No such file or directory May 3 15:40:24 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.freedesktop.ColorManager' May 3 15:40:24 localhost dbus[829]: [system] Successfully activated service 'org.freedesktop.ColorManager' May 3 15:40:24 localhost systemd: Started Manage, Install and Generate Color Profiles. May 3 15:40:24 localhost dbus-daemon: dbus[829]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' May 3 15:40:24 localhost dbus[829]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' May 3 15:40:24 localhost systemd: Starting Locale Service... May 3 15:40:24 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.freedesktop.locale1' May 3 15:40:24 localhost dbus[829]: [system] Successfully activated service 'org.freedesktop.locale1' May 3 15:40:24 localhost systemd: Started Locale Service. May 3 15:41:22 localhost dbus-daemon: dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:41:22 localhost dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:41:22 localhost dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:41:22 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:41:22 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:41:22 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:42:22 localhost dbus-daemon: dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:42:22 localhost dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:42:22 localhost dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:42:22 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:42:23 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:42:23 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:43:19 localhost dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:43:19 localhost dbus-daemon: dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:43:19 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:43:19 localhost dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:43:20 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:43:20 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:43:23 localhost journal: failed to commit changes to dconf: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._g_2dfile_2derror_2dquark.Code17: Cannot open dconf database: invalid gvdb header May 3 15:44:22 localhost dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:44:22 localhost dbus-daemon: dbus[829]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:44:23 localhost dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:44:23 localhost dbus-daemon: dbus[829]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:44:23 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:44:23 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:10 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:46:10 localhost kernel: Linux version 4.16.0-1.el7.elrepo.x86_64 (mockbuild@Build64R7) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC)) #1 SMP Sun Apr 1 20:13:35 EDT 2018 May 3 15:46:10 localhost kernel: Command line: BOOT_IMAGE=/vmlinuz-4.16.0-1.el7.elrepo.x86_64 root=/dev/mapper/centos-root ro crashkernel=auto rd.lvm.lv=centos/root rd.lvm.lv=centos/swap rhgb quiet drm.debug=0x1e May 3 15:46:10 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 3 15:46:10 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 3 15:46:10 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 3 15:46:10 localhost kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 3 15:46:10 localhost kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 3 15:46:10 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 3 15:46:10 localhost kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 3 15:46:10 localhost kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 3 15:46:10 localhost kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. May 3 15:46:10 localhost kernel: e820: BIOS-provided physical RAM map: May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000987ff] usable May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000000098800-0x000000000009ffff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x0000000086cf7fff] usable May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000086cf8000-0x0000000086cf8fff] ACPI NVS May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000086cf9000-0x0000000086cf9fff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000086cfa000-0x000000008c486fff] usable May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x000000008c487000-0x000000008c788fff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x000000008c789000-0x000000008c8effff] usable May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x000000008c8f0000-0x000000008cf94fff] ACPI NVS May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x000000008cf95000-0x000000008d3fefff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x000000008d3ff000-0x000000008d3fffff] usable May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x000000008d400000-0x000000008fffffff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000fed00000-0x00000000fed00fff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved May 3 15:46:10 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000016effffff] usable May 3 15:46:10 localhost kernel: NX (Execute Disable) protection: active May 3 15:46:10 localhost kernel: random: fast init done May 3 15:46:10 localhost kernel: SMBIOS 3.0.0 present. May 3 15:46:10 localhost kernel: DMI: MICRO-STAR INTERNATIONAL CO.,LTD MS-S162/MS-S162, BIOS 5.12 03/23/2018 May 3 15:46:10 localhost kernel: e820: last_pfn = 0x16f000 max_arch_pfn = 0x400000000 May 3 15:46:10 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 3 15:46:10 localhost kernel: e820: last_pfn = 0x8d400 max_arch_pfn = 0x400000000 May 3 15:46:10 localhost kernel: found SMP MP-table at [mem 0x000fcd30-0x000fcd3f] mapped at [ (ptrval)] May 3 15:46:10 localhost kernel: Using GB pages for direct mapping May 3 15:46:10 localhost kernel: RAMDISK: [mem 0x343c4000-0x361d9fff] May 3 15:46:10 localhost kernel: ACPI: Early table checksum verification disabled May 3 15:46:10 localhost kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 ALASKA) May 3 15:46:10 localhost kernel: ACPI: XSDT 0x000000008CBF00A8 0000D4 (v01 ALASKA A M I 01072009 AMI 00010013) May 3 15:46:10 localhost kernel: ACPI: FACP 0x000000008CC16870 000114 (v06 ALASKA A M I 01072009 AMI 00010013) May 3 15:46:10 localhost kernel: ACPI: DSDT 0x000000008CBF0218 026655 (v02 ALASKA A M I 01072009 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: FACS 0x000000008CF94C40 000040 May 3 15:46:10 localhost kernel: ACPI: APIC 0x000000008CC16988 000084 (v03 ALASKA A M I 01072009 AMI 00010013) May 3 15:46:10 localhost kernel: ACPI: FPDT 0x000000008CC16A10 000044 (v01 ALASKA A M I 01072009 AMI 00010013) May 3 15:46:10 localhost kernel: ACPI: MCFG 0x000000008CC16A58 00003C (v01 ALASKA A M I 01072009 MSFT 00000097) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC16A98 0003BC (v01 SataRe SataTabl 00001000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: FIDT 0x000000008CC16E58 00009C (v01 ALASKA A M I 01072009 AMI 00010013) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC16EF8 003159 (v02 SaSsdt SaSsdt 00003000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1A058 002599 (v02 PegSsd PegSsdt 00001000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: HPET 0x000000008CC1C5F8 000038 (v01 INTEL SKL 00000001 MSFT 0000005F) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1C630 000024 (v02 INTEL OEM_RTD3 00001000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1C658 000DE5 (v02 INTEL Ther_Rvp 00001000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1D440 000A2E (v02 INTEL xh_rvp08 00000000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: UEFI 0x000000008CC1DE70 000042 (v01 INTEL EDK2 00000002 01000013) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1DEB8 000EDE (v02 CpuRef CpuSsdt 00003000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: LPIT 0x000000008CC1ED98 000094 (v01 INTEL SKL 00000000 MSFT 0000005F) May 3 15:46:10 localhost kernel: ACPI: WSMT 0x000000008CC1EE30 000028 (v01 INTEL SKL 00000000 MSFT 0000005F) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1EE58 000141 (v02 INTEL HdaDsp 00000000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1EFA0 00029F (v02 INTEL sensrhub 00000000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC1F240 003002 (v02 INTEL PtidDevc 00001000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: SSDT 0x000000008CC22248 000215 (v02 INTEL TbtTypeC 00000000 INTL 20160422) May 3 15:46:10 localhost kernel: ACPI: DBGP 0x000000008CC22460 000034 (v01 INTEL 00000002 MSFT 0000005F) May 3 15:46:10 localhost kernel: ACPI: DBG2 0x000000008CC22498 000054 (v00 INTEL 00000002 MSFT 0000005F) May 3 15:46:10 localhost kernel: No NUMA configuration found May 3 15:46:10 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000016effffff] May 3 15:46:10 localhost kernel: NODE_DATA(0) allocated [mem 0x16efda000-0x16effbfff] May 3 15:46:10 localhost kernel: crashkernel: memory value expected May 3 15:46:10 localhost kernel: Zone ranges: May 3 15:46:10 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 3 15:46:10 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 3 15:46:10 localhost kernel: Normal [mem 0x0000000100000000-0x000000016effffff] May 3 15:46:10 localhost kernel: Movable zone start for each node May 3 15:46:10 localhost kernel: Early memory node ranges May 3 15:46:10 localhost kernel: node 0: [mem 0x0000000000001000-0x0000000000097fff] May 3 15:46:10 localhost kernel: node 0: [mem 0x0000000000100000-0x0000000086cf7fff] May 3 15:46:10 localhost kernel: node 0: [mem 0x0000000086cfa000-0x000000008c486fff] May 3 15:46:10 localhost kernel: node 0: [mem 0x000000008c789000-0x000000008c8effff] May 3 15:46:10 localhost kernel: node 0: [mem 0x000000008d3ff000-0x000000008d3fffff] May 3 15:46:10 localhost kernel: node 0: [mem 0x0000000100000000-0x000000016effffff] May 3 15:46:10 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000016effffff] May 3 15:46:10 localhost kernel: Reserved but unavailable: 105 pages May 3 15:46:10 localhost kernel: Reserving Intel graphics memory at [mem 0x8e000000-0x8fffffff] May 3 15:46:10 localhost kernel: ACPI: PM-Timer IO Port: 0x1808 May 3 15:46:10 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 3 15:46:10 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 3 15:46:10 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 3 15:46:10 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 3 15:46:10 localhost kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 May 3 15:46:10 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 3 15:46:10 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 3 15:46:10 localhost kernel: Using ACPI (MADT) for SMP configuration information May 3 15:46:10 localhost kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 3 15:46:10 localhost kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x00098000-0x00098fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x00099000-0x0009ffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x86cf8000-0x86cf8fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x86cf9000-0x86cf9fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x8c487000-0x8c788fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x8c8f0000-0x8cf94fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x8cf95000-0x8d3fefff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x8d400000-0x8fffffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0x90000000-0xdfffffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xe0000000-0xefffffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xf0000000-0xfdffffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfe000000-0xfe010fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfe011000-0xfebfffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfec00000-0xfec00fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfec01000-0xfecfffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfed00000-0xfed00fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfed01000-0xfedfffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfee00000-0xfee00fff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xfee01000-0xfeffffff] May 3 15:46:10 localhost kernel: PM: Registered nosave memory: [mem 0xff000000-0xffffffff] May 3 15:46:10 localhost kernel: e820: [mem 0x90000000-0xdfffffff] available for PCI devices May 3 15:46:10 localhost kernel: Booting paravirtualized kernel on bare hardware May 3 15:46:10 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 3 15:46:10 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 May 3 15:46:10 localhost kernel: percpu: Embedded 45 pages/cpu @ (ptrval) s146968 r8192 d29160 u524288 May 3 15:46:10 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 1013399 May 3 15:46:10 localhost kernel: Policy zone: Normal May 3 15:46:10 localhost kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-4.16.0-1.el7.elrepo.x86_64 root=/dev/mapper/centos-root ro crashkernel=auto rd.lvm.lv=centos/root rd.lvm.lv=centos/swap rhgb quiet drm.debug=0x1e May 3 15:46:10 localhost kernel: Memory: 3929208K/4118032K available (12300K kernel code, 2240K rwdata, 3644K rodata, 2276K init, 2428K bss, 188824K reserved, 0K cma-reserved) May 3 15:46:10 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 3 15:46:10 localhost kernel: Kernel/User page tables isolation: enabled May 3 15:46:10 localhost kernel: ftrace: allocating 34700 entries in 136 pages May 3 15:46:10 localhost kernel: Hierarchical RCU implementation. May 3 15:46:10 localhost kernel: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=4. May 3 15:46:10 localhost kernel: RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 3 15:46:10 localhost kernel: NR_IRQS: 524544, nr_irqs: 1024, preallocated irqs: 16 May 3 15:46:10 localhost kernel: #011Offload RCU callbacks from CPUs: . May 3 15:46:10 localhost kernel: Console: colour VGA+ 80x25 May 3 15:46:10 localhost kernel: console [tty0] enabled May 3 15:46:10 localhost kernel: ACPI: Core revision 20180105 May 3 15:46:10 localhost kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded May 3 15:46:10 localhost kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns May 3 15:46:10 localhost kernel: APIC: Switch to symmetric I/O mode setup May 3 15:46:10 localhost kernel: x2apic: IRQ remapping doesn't support X2APIC mode May 3 15:46:10 localhost kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 3 15:46:10 localhost kernel: tsc: Detected 3700.000 MHz processor May 3 15:46:10 localhost kernel: tsc: Detected 3696.000 MHz TSC May 3 15:46:10 localhost kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6a8d280fdb9, max_idle_ns: 881591151302 ns May 3 15:46:10 localhost kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7392.00 BogoMIPS (lpj=3696000) May 3 15:46:10 localhost kernel: pid_max: default: 32768 minimum: 301 May 3 15:46:10 localhost kernel: Security Framework initialized May 3 15:46:10 localhost kernel: SELinux: Initializing. May 3 15:46:10 localhost kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) May 3 15:46:10 localhost kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) May 3 15:46:10 localhost kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes) May 3 15:46:10 localhost kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes) May 3 15:46:10 localhost kernel: CPU: Physical Processor ID: 0 May 3 15:46:10 localhost kernel: CPU: Processor Core ID: 0 May 3 15:46:10 localhost kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' May 3 15:46:10 localhost kernel: ENERGY_PERF_BIAS: View and update with x86_energy_perf_policy(8) May 3 15:46:10 localhost kernel: mce: CPU supports 8 MCE banks May 3 15:46:10 localhost kernel: CPU0: Thermal monitoring enabled (TM1) May 3 15:46:10 localhost kernel: process: using mwait in idle threads May 3 15:46:10 localhost kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 3 15:46:10 localhost kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 May 3 15:46:10 localhost kernel: Spectre V2 : Mitigation: Full generic retpoline May 3 15:46:10 localhost kernel: Spectre V2 : Spectre v2 mitigation: Filling RSB on context switch May 3 15:46:10 localhost kernel: Spectre V2 : Spectre v2 mitigation: Enabling Indirect Branch Prediction Barrier May 3 15:46:10 localhost kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 3 15:46:10 localhost kernel: Freeing SMP alternatives memory: 32K May 3 15:46:10 localhost kernel: smpboot: CPU0: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (family: 0x6, model: 0x5e, stepping: 0x3) May 3 15:46:10 localhost kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. May 3 15:46:10 localhost kernel: ... version: 4 May 3 15:46:10 localhost kernel: ... bit width: 48 May 3 15:46:10 localhost kernel: ... generic registers: 4 May 3 15:46:10 localhost kernel: ... value mask: 0000ffffffffffff May 3 15:46:10 localhost kernel: ... max period: 00007fffffffffff May 3 15:46:10 localhost kernel: ... fixed-purpose events: 3 May 3 15:46:10 localhost kernel: ... event mask: 000000070000000f May 3 15:46:10 localhost kernel: Hierarchical SRCU implementation. May 3 15:46:10 localhost kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. May 3 15:46:10 localhost kernel: smp: Bringing up secondary CPUs ... May 3 15:46:10 localhost kernel: x86: Booting SMP configuration: May 3 15:46:10 localhost kernel: .... node #0, CPUs: #1 #2 #3 May 3 15:46:10 localhost kernel: smp: Brought up 1 node, 4 CPUs May 3 15:46:10 localhost kernel: smpboot: Max logical packages: 1 May 3 15:46:10 localhost kernel: smpboot: Total of 4 processors activated (29568.00 BogoMIPS) May 3 15:46:10 localhost kernel: devtmpfs: initialized May 3 15:46:10 localhost kernel: x86/mm: Memory block size: 128MB May 3 15:46:10 localhost kernel: evm: security.selinux May 3 15:46:10 localhost kernel: evm: security.ima May 3 15:46:10 localhost kernel: evm: security.capability May 3 15:46:10 localhost kernel: PM: Registering ACPI NVS region [mem 0x86cf8000-0x86cf8fff] (4096 bytes) May 3 15:46:10 localhost kernel: PM: Registering ACPI NVS region [mem 0x8c8f0000-0x8cf94fff] (6967296 bytes) May 3 15:46:10 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 3 15:46:10 localhost kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) May 3 15:46:10 localhost kernel: pinctrl core: initialized pinctrl subsystem May 3 15:46:10 localhost kernel: NET: Registered protocol family 16 May 3 15:46:10 localhost kernel: audit: initializing netlink subsys (disabled) May 3 15:46:10 localhost kernel: audit: type=2000 audit(1525333569.015:1): state=initialized audit_enabled=0 res=1 May 3 15:46:10 localhost kernel: cpuidle: using governor menu May 3 15:46:10 localhost kernel: KVM setup pv remote TLB flush May 3 15:46:10 localhost kernel: ACPI FADT declares the system doesn't support PCIe ASPM, so disable it May 3 15:46:10 localhost kernel: ACPI: bus type PCI registered May 3 15:46:10 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 3 15:46:10 localhost kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) May 3 15:46:10 localhost kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 May 3 15:46:10 localhost kernel: PCI: Using configuration type 1 for base access May 3 15:46:10 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 3 15:46:10 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 3 15:46:10 localhost kernel: ACPI: Added _OSI(Module Device) May 3 15:46:10 localhost kernel: ACPI: Added _OSI(Processor Device) May 3 15:46:10 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 3 15:46:10 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) May 3 15:46:10 localhost kernel: ACPI: Executed 38 blocks of module-level executable AML code May 3 15:46:10 localhost kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 3 15:46:10 localhost kernel: ACPI: \_PR_.CPU0: _OSC native thermal LVT Acked May 3 15:46:10 localhost kernel: ACPI: Interpreter enabled May 3 15:46:10 localhost kernel: ACPI: (supports S0 S3 S4 S5) May 3 15:46:10 localhost kernel: ACPI: Using IOAPIC for interrupt routing May 3 15:46:10 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 3 15:46:10 localhost kernel: ACPI: Enabled 6 GPEs in block 00 to 7F May 3 15:46:10 localhost kernel: ACPI: Power Resource [PG00] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [PG01] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [PG02] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [WRST] (on) May 3 15:46:10 localhost kernel: ACPI: Power Resource [FN00] (off) May 3 15:46:10 localhost kernel: ACPI: Power Resource [FN01] (off) May 3 15:46:10 localhost kernel: ACPI: Power Resource [FN02] (off) May 3 15:46:10 localhost kernel: ACPI: Power Resource [FN03] (off) May 3 15:46:10 localhost kernel: ACPI: Power Resource [FN04] (off) May 3 15:46:10 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) May 3 15:46:10 localhost kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI] May 3 15:46:10 localhost kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 3 15:46:10 localhost kernel: acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration May 3 15:46:10 localhost kernel: PCI host bridge to bus 0000:00 May 3 15:46:10 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 3 15:46:10 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 3 15:46:10 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 3 15:46:10 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] May 3 15:46:10 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] May 3 15:46:10 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-fe] May 3 15:46:10 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 3 15:46:10 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] May 3 15:46:10 localhost kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] May 3 15:46:10 localhost kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] May 3 15:46:10 localhost kernel: pci 0000:00:1c.7: PCI bridge to [bus 05] May 3 15:46:10 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 06] May 3 15:46:10 localhost kernel: pci 0000:00:1d.1: PCI bridge to [bus 07] May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 *10 11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 *11 12 14 15) May 3 15:46:10 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 3 15:46:10 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 3 15:46:10 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 3 15:46:10 localhost kernel: vgaarb: loaded May 3 15:46:10 localhost kernel: SCSI subsystem initialized May 3 15:46:10 localhost kernel: ACPI: bus type USB registered May 3 15:46:10 localhost kernel: usbcore: registered new interface driver usbfs May 3 15:46:10 localhost kernel: usbcore: registered new interface driver hub May 3 15:46:10 localhost kernel: usbcore: registered new device driver usb May 3 15:46:10 localhost kernel: EDAC MC: Ver: 3.0.0 May 3 15:46:10 localhost kernel: PCI: Using ACPI for IRQ routing May 3 15:46:10 localhost kernel: NetLabel: Initializing May 3 15:46:10 localhost kernel: NetLabel: domain hash size = 128 May 3 15:46:10 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO May 3 15:46:10 localhost kernel: NetLabel: unlabeled traffic allowed by default May 3 15:46:10 localhost kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 3 15:46:10 localhost kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter May 3 15:46:10 localhost kernel: clocksource: Switched to clocksource tsc-early May 3 15:46:10 localhost kernel: VFS: Disk quotas dquot_6.6.0 May 3 15:46:10 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 3 15:46:10 localhost kernel: pnp: PnP ACPI init May 3 15:46:10 localhost kernel: system 00:00: [io 0x0a00-0x0a0f] has been reserved May 3 15:46:10 localhost kernel: system 00:00: [io 0x0a10-0x0a1f] has been reserved May 3 15:46:10 localhost kernel: system 00:00: [io 0x0a20-0x0a2f] has been reserved May 3 15:46:10 localhost kernel: system 00:00: [io 0x0a30-0x0a3f] has been reserved May 3 15:46:10 localhost kernel: system 00:05: [io 0x0680-0x069f] has been reserved May 3 15:46:10 localhost kernel: system 00:05: [io 0xffff] has been reserved May 3 15:46:10 localhost kernel: system 00:05: [io 0xffff] has been reserved May 3 15:46:10 localhost kernel: system 00:05: [io 0xffff] has been reserved May 3 15:46:10 localhost kernel: system 00:05: [io 0x1800-0x18fe] has been reserved May 3 15:46:10 localhost kernel: system 00:05: [io 0x164e-0x164f] has been reserved May 3 15:46:10 localhost kernel: system 00:06: [io 0x0800-0x087f] has been reserved May 3 15:46:10 localhost kernel: system 00:08: [io 0x1854-0x1857] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfed10000-0xfed17fff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfed18000-0xfed18fff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfed19000-0xfed19fff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xe0000000-0xefffffff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfed20000-0xfed3ffff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfed90000-0xfed93fff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfed45000-0xfed8ffff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xff000000-0xffffffff] has been reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xfee00000-0xfeefffff] could not be reserved May 3 15:46:10 localhost kernel: system 00:09: [mem 0xdffc0000-0xdffdffff] has been reserved May 3 15:46:10 localhost kernel: system 00:0a: [mem 0xfd000000-0xfdabffff] has been reserved May 3 15:46:10 localhost kernel: system 00:0a: [mem 0xfdad0000-0xfdadffff] has been reserved May 3 15:46:10 localhost kernel: system 00:0a: [mem 0xfdb00000-0xfdffffff] has been reserved May 3 15:46:10 localhost kernel: system 00:0a: [mem 0xfe000000-0xfe01ffff] could not be reserved May 3 15:46:10 localhost kernel: system 00:0a: [mem 0xfe036000-0xfe03bfff] has been reserved May 3 15:46:10 localhost kernel: system 00:0a: [mem 0xfe03d000-0xfe3fffff] has been reserved May 3 15:46:10 localhost kernel: system 00:0b: [io 0xff00-0xfffe] has been reserved May 3 15:46:10 localhost kernel: pnp: PnP ACPI: found 13 devices May 3 15:46:10 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 3 15:46:10 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 3 15:46:10 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] May 3 15:46:10 localhost kernel: pci 0000:00:1c.0: bridge window [io 0xe000-0xefff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.0: bridge window [mem 0xdef00000-0xdf1fffff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] May 3 15:46:10 localhost kernel: pci 0000:00:1c.5: bridge window [io 0xd000-0xdfff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.5: bridge window [mem 0xdec00000-0xdeefffff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.6: PCI bridge to [bus 04] May 3 15:46:10 localhost kernel: pci 0000:00:1c.6: bridge window [io 0xc000-0xcfff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.6: bridge window [mem 0xde900000-0xdebfffff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.7: PCI bridge to [bus 05] May 3 15:46:10 localhost kernel: pci 0000:00:1c.7: bridge window [io 0xb000-0xbfff] May 3 15:46:10 localhost kernel: pci 0000:00:1c.7: bridge window [mem 0xde600000-0xde8fffff] May 3 15:46:10 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 06] May 3 15:46:10 localhost kernel: pci 0000:00:1d.0: bridge window [io 0xa000-0xafff] May 3 15:46:10 localhost kernel: pci 0000:00:1d.0: bridge window [mem 0xde300000-0xde5fffff] May 3 15:46:10 localhost kernel: pci 0000:00:1d.1: PCI bridge to [bus 07] May 3 15:46:10 localhost kernel: pci 0000:00:1d.1: bridge window [io 0x9000-0x9fff] May 3 15:46:10 localhost kernel: pci 0000:00:1d.1: bridge window [mem 0xde000000-0xde2fffff] May 3 15:46:10 localhost kernel: NET: Registered protocol family 2 May 3 15:46:10 localhost kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes) May 3 15:46:10 localhost kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) May 3 15:46:10 localhost kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) May 3 15:46:10 localhost kernel: TCP: Hash tables configured (established 32768 bind 32768) May 3 15:46:10 localhost kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) May 3 15:46:10 localhost kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) May 3 15:46:10 localhost kernel: NET: Registered protocol family 1 May 3 15:46:10 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 3 15:46:10 localhost kernel: Unpacking initramfs... May 3 15:46:10 localhost kernel: Freeing initrd memory: 30808K May 3 15:46:10 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 3 15:46:10 localhost kernel: software IO TLB [mem 0x88487000-0x8c487000] (64MB) mapped at [0000000020483abc-00000000a2dd0064] May 3 15:46:10 localhost kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6a8d280fdb9, max_idle_ns: 881591151302 ns May 3 15:46:10 localhost kernel: clocksource: Switched to clocksource tsc May 3 15:46:10 localhost kernel: Initialise system trusted keyrings May 3 15:46:10 localhost kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0 May 3 15:46:10 localhost kernel: zbud: loaded May 3 15:46:10 localhost kernel: NET: Registered protocol family 38 May 3 15:46:10 localhost kernel: Key type asymmetric registered May 3 15:46:10 localhost kernel: Asymmetric key parser 'x509' registered May 3 15:46:10 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 248) May 3 15:46:10 localhost kernel: io scheduler noop registered May 3 15:46:10 localhost kernel: io scheduler deadline registered (default) May 3 15:46:10 localhost kernel: io scheduler cfq registered May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.0: AER enabled with IRQ 121 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.5: AER enabled with IRQ 122 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.6: AER enabled with IRQ 123 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.7: AER enabled with IRQ 124 May 3 15:46:10 localhost kernel: pcieport 0000:00:1d.0: AER enabled with IRQ 125 May 3 15:46:10 localhost kernel: pcieport 0000:00:1d.1: AER enabled with IRQ 126 May 3 15:46:10 localhost kernel: pcieport 0000:00:01.0: Signaling PME with IRQ 120 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.0: Signaling PME with IRQ 121 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.5: Signaling PME with IRQ 122 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.6: Signaling PME with IRQ 123 May 3 15:46:10 localhost kernel: pcieport 0000:00:1c.7: Signaling PME with IRQ 124 May 3 15:46:10 localhost kernel: pcieport 0000:00:1d.0: Signaling PME with IRQ 125 May 3 15:46:10 localhost kernel: pcieport 0000:00:1d.1: Signaling PME with IRQ 126 May 3 15:46:10 localhost kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 May 3 15:46:10 localhost kernel: ACPI: Sleep Button [SLPB] May 3 15:46:10 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 May 3 15:46:10 localhost kernel: ACPI: Power Button [PWRB] May 3 15:46:10 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 3 15:46:10 localhost kernel: ACPI: Power Button [PWRF] May 3 15:46:10 localhost kernel: thermal LNXTHERM:00: registered as thermal_zone0 May 3 15:46:10 localhost kernel: ACPI: Thermal Zone [TZ00] (28 C) May 3 15:46:10 localhost kernel: thermal LNXTHERM:01: registered as thermal_zone1 May 3 15:46:10 localhost kernel: ACPI: Thermal Zone [TZ01] (30 C) May 3 15:46:10 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 3 15:46:10 localhost kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 3 15:46:10 localhost kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 3 15:46:10 localhost kernel: Non-volatile memory driver v1.3 May 3 15:46:10 localhost kernel: Linux agpgart interface v0.103 May 3 15:46:10 localhost kernel: rdac: device handler registered May 3 15:46:10 localhost kernel: hp_sw: device handler registered May 3 15:46:10 localhost kernel: emc: device handler registered May 3 15:46:10 localhost kernel: alua: device handler registered May 3 15:46:10 localhost kernel: libphy: Fixed MDIO Bus: probed May 3 15:46:10 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 3 15:46:10 localhost kernel: ehci-pci: EHCI PCI platform driver May 3 15:46:10 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver May 3 15:46:10 localhost kernel: ohci-pci: OHCI PCI platform driver May 3 15:46:10 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver May 3 15:46:10 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller May 3 15:46:10 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 May 3 15:46:10 localhost kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x00109810 May 3 15:46:10 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 May 3 15:46:10 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 May 3 15:46:10 localhost kernel: usb usb1: Product: xHCI Host Controller May 3 15:46:10 localhost kernel: usb usb1: Manufacturer: Linux 4.16.0-1.el7.elrepo.x86_64 xhci-hcd May 3 15:46:10 localhost kernel: usb usb1: SerialNumber: 0000:00:14.0 May 3 15:46:10 localhost kernel: hub 1-0:1.0: USB hub found May 3 15:46:10 localhost kernel: hub 1-0:1.0: 10 ports detected May 3 15:46:10 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller May 3 15:46:10 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 May 3 15:46:10 localhost kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003 May 3 15:46:10 localhost kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 May 3 15:46:10 localhost kernel: usb usb2: Product: xHCI Host Controller May 3 15:46:10 localhost kernel: usb usb2: Manufacturer: Linux 4.16.0-1.el7.elrepo.x86_64 xhci-hcd May 3 15:46:10 localhost kernel: usb usb2: SerialNumber: 0000:00:14.0 May 3 15:46:10 localhost kernel: hub 2-0:1.0: USB hub found May 3 15:46:10 localhost kernel: hub 2-0:1.0: 4 ports detected May 3 15:46:10 localhost kernel: usbcore: registered new interface driver usbserial_generic May 3 15:46:10 localhost kernel: usbserial: USB Serial support registered for generic May 3 15:46:10 localhost kernel: usbcore: registered new interface driver wishbone_serial May 3 15:46:10 localhost kernel: usbserial: USB Serial support registered for wishbone_serial May 3 15:46:10 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f03:PS2M] at 0x60,0x64 irq 1,12 May 3 15:46:10 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 3 15:46:10 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 3 15:46:10 localhost kernel: mousedev: PS/2 mouse device common for all mice May 3 15:46:10 localhost kernel: rtc_cmos 00:07: RTC can wake from S4 May 3 15:46:10 localhost kernel: rtc_cmos 00:07: rtc core: registered rtc_cmos as rtc0 May 3 15:46:10 localhost kernel: rtc_cmos 00:07: alarms up to one month, y3k, 242 bytes nvram, hpet irqs May 3 15:46:10 localhost kernel: intel_pstate: Intel P-state driver initializing May 3 15:46:10 localhost kernel: intel_pstate: HWP enabled May 3 15:46:10 localhost kernel: ledtrig-cpu: registered to indicate activity on CPUs May 3 15:46:10 localhost kernel: hidraw: raw HID events driver (C) Jiri Kosina May 3 15:46:10 localhost kernel: usbcore: registered new interface driver usbhid May 3 15:46:10 localhost kernel: usbhid: USB HID core driver May 3 15:46:10 localhost kernel: drop_monitor: Initializing network drop monitor service May 3 15:46:10 localhost kernel: Initializing XFRM netlink socket May 3 15:46:10 localhost kernel: NET: Registered protocol family 10 May 3 15:46:10 localhost kernel: Segment Routing with IPv6 May 3 15:46:10 localhost kernel: NET: Registered protocol family 17 May 3 15:46:10 localhost kernel: Bridge firewalling registered May 3 15:46:10 localhost kernel: microcode: sig=0x506e3, pf=0x2, revision=0xc2 May 3 15:46:10 localhost kernel: microcode: Microcode Update Driver: v2.2. May 3 15:46:10 localhost kernel: sched_clock: Marking stable (673236630, 0)->(665826515, 7410115) May 3 15:46:10 localhost kernel: registered taskstats version 1 May 3 15:46:10 localhost kernel: Loading compiled-in X.509 certificates May 3 15:46:10 localhost kernel: zswap: loaded using pool lzo/zbud May 3 15:46:10 localhost kernel: Key type big_key registered May 3 15:46:10 localhost kernel: Key type trusted registered May 3 15:46:10 localhost kernel: Key type encrypted registered May 3 15:46:10 localhost kernel: ima: No TPM chip found, activating TPM-bypass! (rc=-19) May 3 15:46:10 localhost kernel: evm: HMAC attrs: 0x1 May 3 15:46:10 localhost kernel: rtc_cmos 00:07: setting system clock to 2018-05-03 07:46:10 UTC (1525333570) May 3 15:46:10 localhost kernel: Freeing unused kernel memory: 2276K May 3 15:46:10 localhost kernel: Write protecting the kernel read-only data: 18432k May 3 15:46:10 localhost kernel: Freeing unused kernel memory: 2012K May 3 15:46:10 localhost kernel: Freeing unused kernel memory: 452K May 3 15:46:10 localhost systemd[1]: systemd 219 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN) May 3 15:46:10 localhost systemd[1]: Detected architecture x86-64. May 3 15:46:10 localhost systemd[1]: Running in initial RAM disk. May 3 15:46:10 localhost systemd[1]: Set hostname to . May 3 15:46:10 localhost systemd[1]: Reached target Local File Systems. May 3 15:46:10 localhost systemd[1]: Starting Local File Systems. May 3 15:46:10 localhost systemd[1]: Reached target Swap. May 3 15:46:10 localhost systemd[1]: Starting Swap. May 3 15:46:10 localhost systemd[1]: Created slice Root Slice. May 3 15:46:10 localhost systemd[1]: Starting Root Slice. May 3 15:46:10 localhost journal: Journal started May 3 15:46:10 localhost systemd: Started Setup Virtual Console. May 3 15:46:10 localhost systemd: Started dracut cmdline hook. May 3 15:46:10 localhost systemd: Starting dracut pre-udev hook... May 3 15:46:10 localhost kernel: device-mapper: uevent: version 1.0.3 May 3 15:46:10 localhost kernel: device-mapper: ioctl: 4.37.0-ioctl (2017-09-20) initialised: dm-devel@redhat.com May 3 15:46:10 localhost systemd: Started dracut pre-udev hook. May 3 15:46:10 localhost systemd: Starting udev Kernel Device Manager... May 3 15:46:10 localhost systemd-udevd: starting version 219 May 3 15:46:10 localhost systemd: Started udev Kernel Device Manager. May 3 15:46:10 localhost systemd: Starting udev Coldplug all Devices... May 3 15:46:10 localhost systemd: Mounting Configuration File System... May 3 15:46:10 localhost systemd: Mounted Configuration File System. May 3 15:46:10 localhost systemd: Started udev Coldplug all Devices. May 3 15:46:10 localhost systemd: Reached target System Initialization. May 3 15:46:10 localhost systemd: Starting System Initialization. May 3 15:46:10 localhost systemd: Starting dracut initqueue hook... May 3 15:46:10 localhost systemd: Starting Show Plymouth Boot Screen... May 3 15:46:10 localhost kernel: dca service started, version 1.12.1 May 3 15:46:10 localhost kernel: pps_core: LinuxPPS API ver. 1 registered May 3 15:46:10 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 3 15:46:10 localhost kernel: PTP clock support registered May 3 15:46:10 localhost systemd: Started Show Plymouth Boot Screen. May 3 15:46:10 localhost systemd: Reached target Paths. May 3 15:46:10 localhost systemd: Starting Paths. May 3 15:46:10 localhost systemd: Started Forward Password Requests to Plymouth Directory Watch. May 3 15:46:10 localhost systemd: Starting Forward Password Requests to Plymouth Directory Watch. May 3 15:46:10 localhost systemd: Reached target Basic System. May 3 15:46:10 localhost systemd: Starting Basic System. May 3 15:46:10 localhost kernel: igb: Intel(R) Gigabit Ethernet Network Driver - version 5.4.0-k May 3 15:46:10 localhost kernel: igb: Copyright (c) 2007-2014 Intel Corporation. May 3 15:46:10 localhost kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 4 ports 6 Gbps 0xf impl SATA mode May 3 15:46:10 localhost kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf pm led clo only pio slum part ems deso sadm sds apst May 3 15:46:10 localhost kernel: i915: unknown parameter 'enable_rc6' ignored May 3 15:46:10 localhost kernel: Setting dangerous option enable_fbc - tainting kernel May 3 15:46:10 localhost kernel: i915: unknown parameter 'lvds_downclock' ignored May 3 15:46:10 localhost kernel: i915: unknown parameter 'semaphores' ignored May 3 15:46:10 localhost kernel: scsi host0: ahci May 3 15:46:10 localhost kernel: scsi host1: ahci May 3 15:46:10 localhost kernel: scsi host2: ahci May 3 15:46:10 localhost kernel: scsi host3: ahci May 3 15:46:10 localhost kernel: ata1: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217100 irq 128 May 3 15:46:10 localhost kernel: ata2: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217180 irq 128 May 3 15:46:10 localhost kernel: ata3: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217200 irq 128 May 3 15:46:10 localhost kernel: ata4: SATA max UDMA/133 abar m2048@0xdf217000 port 0xdf217280 irq 128 May 3 15:46:10 localhost kernel: [drm] Replacing VGA console driver May 3 15:46:10 localhost kernel: Console: switching to colour dummy device 80x25 May 3 15:46:10 localhost kernel: [drm] Supports vblank timestamp caching Rev 2 (21.10.2013). May 3 15:46:10 localhost kernel: [drm] Driver supports precise vblank timestamp query. May 3 15:46:10 localhost kernel: i915 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem May 3 15:46:10 localhost kernel: i915 0000:00:02.0: Direct firmware load for i915/skl_dmc_ver1_27.bin failed with error -2 May 3 15:46:10 localhost kernel: i915 0000:00:02.0: Failed to load DMC firmware i915/skl_dmc_ver1_27.bin. Disabling runtime power management. May 3 15:46:10 localhost kernel: i915 0000:00:02.0: DMC firmware homepage: https://01.org/linuxgraphics/downloads/firmware May 3 15:46:10 localhost kernel: [drm] Initialized i915 1.6.0 20171222 for 0000:00:02.0 on minor 0 May 3 15:46:10 localhost kernel: ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no) May 3 15:46:10 localhost kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input6 May 3 15:46:10 localhost kernel: usb 1-9: new low-speed USB device number 2 using xhci_hcd May 3 15:46:10 localhost kernel: fbcon: inteldrmfb (fb0) is primary device May 3 15:46:10 localhost kernel: Console: switching to colour frame buffer device 180x56 May 3 15:46:10 localhost kernel: pps pps0: new PPS source ptp0 May 3 15:46:10 localhost kernel: igb 0000:02:00.0: added PHC on eth0 May 3 15:46:10 localhost kernel: igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:46:10 localhost kernel: igb 0000:02:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:65 May 3 15:46:10 localhost kernel: igb 0000:02:00.0: eth0: PBA No: 000200-000 May 3 15:46:10 localhost kernel: igb 0000:02:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:46:10 localhost kernel: i915 0000:00:02.0: fb0: inteldrmfb frame buffer device May 3 15:46:10 localhost kernel: usb 1-9: New USB device found, idVendor=0e8f, idProduct=0020 May 3 15:46:10 localhost kernel: usb 1-9: New USB device strings: Mfr=1, Product=2, SerialNumber=0 May 3 15:46:10 localhost kernel: usb 1-9: Product: PS2toUSB Adapter May 3 15:46:10 localhost kernel: usb 1-9: Manufacturer: GASIA May 3 15:46:10 localhost kernel: input: GASIA PS2toUSB Adapter as /devices/pci0000:00/0000:00:14.0/usb1/1-9/1-9:1.0/0003:0E8F:0020.0001/input/input7 May 3 15:46:10 localhost kernel: ata1: SATA link down (SStatus 4 SControl 300) May 3 15:46:10 localhost kernel: ata2: SATA link down (SStatus 4 SControl 300) May 3 15:46:10 localhost kernel: ata3: SATA link down (SStatus 4 SControl 300) May 3 15:46:10 localhost kernel: ata4: SATA link up 3.0 Gbps (SStatus 123 SControl 300) May 3 15:46:10 localhost kernel: ACPI BIOS Error (bug): Failure looking up [\_SB.PCI0.SAT0.PRT3._GTF.DSSP], AE_NOT_FOUND (20180105/psargs-364) May 3 15:46:10 localhost kernel: ACPI Error: Method parse/execution failed \_SB.PCI0.SAT0.PRT3._GTF, AE_NOT_FOUND (20180105/psparse-550) May 3 15:46:10 localhost kernel: ata4.00: ATA-8: ST31000528AS, CC38, max UDMA/133 May 3 15:46:10 localhost kernel: ata4.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 31/32) May 3 15:46:10 localhost kernel: ACPI BIOS Error (bug): Failure looking up [\_SB.PCI0.SAT0.PRT3._GTF.DSSP], AE_NOT_FOUND (20180105/psargs-364) May 3 15:46:10 localhost kernel: ACPI Error: Method parse/execution failed \_SB.PCI0.SAT0.PRT3._GTF, AE_NOT_FOUND (20180105/psparse-550) May 3 15:46:10 localhost kernel: ata4.00: configured for UDMA/133 May 3 15:46:10 localhost kernel: scsi 3:0:0:0: Direct-Access ATA ST31000528AS CC38 PQ: 0 ANSI: 5 May 3 15:46:10 localhost kernel: sd 3:0:0:0: [sda] 1953525168 512-byte logical blocks: (1.00 TB/932 GiB) May 3 15:46:10 localhost kernel: sd 3:0:0:0: [sda] Write Protect is off May 3 15:46:10 localhost kernel: sd 3:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 3 15:46:10 localhost kernel: sda: sda1 sda2 May 3 15:46:10 localhost kernel: sd 3:0:0:0: [sda] Attached SCSI disk May 3 15:46:11 localhost kernel: hid-generic 0003:0E8F:0020.0001: input,hidraw0: USB HID v1.10 Keyboard [GASIA PS2toUSB Adapter] on usb-0000:00:14.0-9/input0 May 3 15:46:11 localhost kernel: input: GASIA PS2toUSB Adapter as /devices/pci0000:00/0000:00:14.0/usb1/1-9/1-9:1.1/0003:0E8F:0020.0002/input/input8 May 3 15:46:11 localhost kernel: hid-generic 0003:0E8F:0020.0002: input,hidraw1: USB HID v1.10 Mouse [GASIA PS2toUSB Adapter] on usb-0000:00:14.0-9/input1 May 3 15:46:11 localhost kernel: pps pps1: new PPS source ptp1 May 3 15:46:11 localhost kernel: igb 0000:03:00.0: added PHC on eth1 May 3 15:46:11 localhost kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:46:11 localhost kernel: igb 0000:03:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:66 May 3 15:46:11 localhost kernel: igb 0000:03:00.0: eth1: PBA No: 000200-000 May 3 15:46:11 localhost kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:46:11 localhost kernel: pps pps2: new PPS source ptp2 May 3 15:46:11 localhost kernel: igb 0000:04:00.0: added PHC on eth2 May 3 15:46:11 localhost kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:46:11 localhost kernel: igb 0000:04:00.0: eth2: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:67 May 3 15:46:11 localhost kernel: igb 0000:04:00.0: eth2: PBA No: 000200-000 May 3 15:46:11 localhost kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:46:11 localhost kernel: pps pps3: new PPS source ptp3 May 3 15:46:11 localhost kernel: igb 0000:05:00.0: added PHC on eth3 May 3 15:46:11 localhost kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:46:11 localhost kernel: igb 0000:05:00.0: eth3: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:68 May 3 15:46:11 localhost kernel: igb 0000:05:00.0: eth3: PBA No: 000200-000 May 3 15:46:11 localhost kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:46:11 localhost kernel: pps pps4: new PPS source ptp4 May 3 15:46:11 localhost kernel: igb 0000:06:00.0: added PHC on eth4 May 3 15:46:11 localhost kernel: igb 0000:06:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:46:11 localhost kernel: igb 0000:06:00.0: eth4: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:69 May 3 15:46:11 localhost kernel: igb 0000:06:00.0: eth4: PBA No: 000200-000 May 3 15:46:11 localhost kernel: igb 0000:06:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:46:12 localhost kernel: pps pps5: new PPS source ptp5 May 3 15:46:12 localhost kernel: igb 0000:07:00.0: added PHC on eth5 May 3 15:46:12 localhost kernel: igb 0000:07:00.0: Intel(R) Gigabit Ethernet Network Connection May 3 15:46:12 localhost kernel: igb 0000:07:00.0: eth5: (PCIe:2.5Gb/s:Width x1) 4c:cc:6a:85:b7:6a May 3 15:46:12 localhost kernel: igb 0000:07:00.0: eth5: PBA No: 000200-000 May 3 15:46:12 localhost kernel: igb 0000:07:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 3 15:46:12 localhost kernel: igb 0000:02:00.0 eno1: renamed from eth0 May 3 15:46:12 localhost kernel: igb 0000:04:00.0 enp4s0: renamed from eth2 May 3 15:46:12 localhost kernel: igb 0000:06:00.0 enp6s0: renamed from eth4 May 3 15:46:12 localhost systemd-udevd: Error changing net interface name 'eth1' to 'eno1': File exists May 3 15:46:12 localhost systemd-udevd: could not rename interface '3' from 'eth1' to 'eno1': File exists May 3 15:46:12 localhost kernel: igb 0000:05:00.0 enp5s0: renamed from eth3 May 3 15:46:12 localhost kernel: igb 0000:07:00.0 enp7s0: renamed from eth5 May 3 15:46:12 localhost systemd: Found device /dev/mapper/centos-root. May 3 15:46:12 localhost systemd: Starting File System Check on /dev/mapper/centos-root... May 3 15:46:12 localhost systemd-fsck: /sbin/fsck.xfs: XFS file system. May 3 15:46:12 localhost systemd: Started File System Check on /dev/mapper/centos-root. May 3 15:46:12 localhost kernel: random: crng init done May 3 15:46:12 localhost systemd: Started dracut initqueue hook. May 3 15:46:12 localhost systemd: Reached target Remote File Systems (Pre). May 3 15:46:12 localhost systemd: Starting Remote File Systems (Pre). May 3 15:46:12 localhost systemd: Reached target Remote File Systems. May 3 15:46:12 localhost systemd: Starting Remote File Systems. May 3 15:46:12 localhost systemd: Mounting /sysroot... May 3 15:46:12 localhost kernel: SGI XFS with ACLs, security attributes, no debug enabled May 3 15:46:12 localhost kernel: XFS (dm-0): Mounting V5 Filesystem May 3 15:46:13 localhost kernel: XFS (dm-0): Starting recovery (logdev: internal) May 3 15:46:13 localhost kernel: XFS (dm-0): Ending recovery (logdev: internal) May 3 15:46:13 localhost systemd: Mounted /sysroot. May 3 15:46:13 localhost systemd: Reached target Initrd Root File System. May 3 15:46:13 localhost systemd: Starting Initrd Root File System. May 3 15:46:13 localhost systemd: Starting Reload Configuration from the Real Root... May 3 15:46:13 localhost systemd: Reloading. May 3 15:46:13 localhost systemd: Started Reload Configuration from the Real Root. May 3 15:46:13 localhost systemd: Reached target Initrd File Systems. May 3 15:46:13 localhost systemd: Starting Initrd File Systems. May 3 15:46:13 localhost systemd: Reached target Initrd Default Target. May 3 15:46:13 localhost systemd: Starting Initrd Default Target. May 3 15:46:13 localhost systemd: Starting dracut pre-pivot and cleanup hook... May 3 15:46:13 localhost systemd: Started dracut pre-pivot and cleanup hook. May 3 15:46:13 localhost systemd: Starting Cleaning Up and Shutting Down Daemons... May 3 15:46:13 localhost systemd: Stopped target Timers. May 3 15:46:13 localhost systemd: Stopping Timers. May 3 15:46:13 localhost systemd: Starting Plymouth switch root service... May 3 15:46:13 localhost systemd: Stopped Cleaning Up and Shutting Down Daemons. May 3 15:46:13 localhost systemd: Stopped dracut pre-pivot and cleanup hook. May 3 15:46:13 localhost systemd: Stopping dracut pre-pivot and cleanup hook... May 3 15:46:13 localhost systemd: Stopped target Initrd Default Target. May 3 15:46:13 localhost systemd: Stopping Initrd Default Target. May 3 15:46:13 localhost systemd: Stopped target Basic System. May 3 15:46:13 localhost systemd: Stopping Basic System. May 3 15:46:13 localhost systemd: Stopped target Sockets. May 3 15:46:13 localhost systemd: Stopping Sockets. May 3 15:46:13 localhost systemd: Stopped target System Initialization. May 3 15:46:13 localhost systemd: Stopping System Initialization. May 3 15:46:13 localhost systemd: Stopped target Local File Systems. May 3 15:46:13 localhost systemd: Stopping Local File Systems. May 3 15:46:13 localhost systemd: Stopping udev Kernel Device Manager... May 3 15:46:13 localhost systemd: Stopped Apply Kernel Variables. May 3 15:46:13 localhost systemd: Stopping Apply Kernel Variables... May 3 15:46:13 localhost systemd: Stopped target Swap. May 3 15:46:13 localhost systemd: Stopping Swap. May 3 15:46:13 localhost systemd: Stopped target Paths. May 3 15:46:13 localhost systemd: Stopping Paths. May 3 15:46:13 localhost systemd: Stopped target Slices. May 3 15:46:13 localhost systemd: Stopping Slices. May 3 15:46:13 localhost systemd: Stopped target Remote File Systems. May 3 15:46:13 localhost systemd: Stopping Remote File Systems. May 3 15:46:13 localhost systemd: Stopped target Remote File Systems (Pre). May 3 15:46:13 localhost systemd: Stopping Remote File Systems (Pre). May 3 15:46:13 localhost systemd: Stopped dracut initqueue hook. May 3 15:46:13 localhost systemd: Stopping dracut initqueue hook... May 3 15:46:13 localhost systemd: Stopped udev Coldplug all Devices. May 3 15:46:13 localhost systemd: Stopping udev Coldplug all Devices... May 3 15:46:13 localhost systemd: Stopped udev Kernel Device Manager. May 3 15:46:13 localhost systemd: Stopped dracut pre-udev hook. May 3 15:46:13 localhost systemd: Stopping dracut pre-udev hook... May 3 15:46:13 localhost systemd: Stopped dracut cmdline hook. May 3 15:46:13 localhost systemd: Stopping dracut cmdline hook... May 3 15:46:13 localhost systemd: Stopped Create Static Device Nodes in /dev. May 3 15:46:13 localhost systemd: Stopping Create Static Device Nodes in /dev... May 3 15:46:13 localhost systemd: Stopped Create list of required static device nodes for the current kernel. May 3 15:46:13 localhost systemd: Stopping Create list of required static device nodes for the current kernel... May 3 15:46:13 localhost systemd: Closed udev Kernel Socket. May 3 15:46:13 localhost systemd: Stopping udev Kernel Socket. May 3 15:46:13 localhost systemd: Closed udev Control Socket. May 3 15:46:13 localhost systemd: Stopping udev Control Socket. May 3 15:46:13 localhost systemd: Starting Cleanup udevd DB... May 3 15:46:13 localhost systemd: Started Cleanup udevd DB. May 3 15:46:13 localhost systemd: Reached target Switch Root. May 3 15:46:13 localhost systemd: Starting Switch Root. May 3 15:46:13 localhost systemd: Started Plymouth switch root service. May 3 15:46:13 localhost systemd: Starting Switch Root... May 3 15:46:13 localhost systemd: Switching root. May 3 15:46:13 localhost journal: Journal stopped May 3 15:46:16 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:46:16 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:46:16 localhost systemd-journald[149]: Received SIGTERM from PID 1 (systemd). May 3 15:46:16 localhost kernel: systemd: 24 output lines suppressed due to ratelimiting May 3 15:46:16 localhost kernel: audit: type=1404 audit(1525333574.155:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 May 3 15:46:16 localhost kernel: SELinux: Permission getrlimit in class process not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class process2 not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class file not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class dir not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class lnk_file not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class chr_file not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class blk_file not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class sock_file not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class fifo_file not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class tcp_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class udp_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class rawip_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class packet_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class key_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class unix_stream_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class unix_dgram_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_route_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_tcpdiag_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_nflog_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_xfrm_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_selinux_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_iscsi_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_audit_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_fib_lookup_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_connector_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_netfilter_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_dnrt_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_kobject_uevent_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_generic_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_scsitransport_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_rdma_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class netlink_crypto_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class appletalk_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class dccp_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Permission map in class tun_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class sctp_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class icmp_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class ax25_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class ipx_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class netrom_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class atmpvc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class x25_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class rose_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class decnet_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class atmsvc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class rds_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class irda_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class pppox_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class llc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class can_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class tipc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class bluetooth_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class iucv_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class rxrpc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class isdn_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class phonet_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class ieee802154_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class caif_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class alg_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class nfc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class vsock_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class kcm_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class qipcrtr_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class smc_socket not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class infiniband_pkey not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class infiniband_endport not defined in policy. May 3 15:46:16 localhost kernel: SELinux: Class bpf not defined in policy. May 3 15:46:16 localhost kernel: SELinux: the above unknown classes and permissions will be allowed May 3 15:46:16 localhost kernel: SELinux: policy capability network_peer_controls=1 May 3 15:46:16 localhost kernel: SELinux: policy capability open_perms=1 May 3 15:46:16 localhost kernel: SELinux: policy capability extended_socket_class=0 May 3 15:46:16 localhost kernel: SELinux: policy capability always_check_network=0 May 3 15:46:16 localhost kernel: SELinux: policy capability cgroup_seclabel=0 May 3 15:46:16 localhost kernel: SELinux: policy capability nnp_nosuid_transition=0 May 3 15:46:16 localhost kernel: audit: type=1403 audit(1525333574.320:3): policy loaded auid=4294967295 ses=4294967295 May 3 15:46:16 localhost systemd[1]: Successfully loaded SELinux policy in 180.739ms. May 3 15:46:16 localhost systemd[1]: Inserted module 'ip_tables' May 3 15:46:16 localhost systemd[1]: Relabelled /dev and /run in 20.766ms. May 3 15:46:16 localhost journal: Journal started May 3 15:46:16 localhost systemd: systemd 219 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN) May 3 15:46:16 localhost systemd: Detected architecture x86-64. May 3 15:46:16 localhost systemd: Set hostname to . May 3 15:46:16 localhost systemd: Mounted Debug File System. May 3 15:46:16 localhost systemd: Mounted POSIX Message Queue File System. May 3 15:46:16 localhost systemd: Mounted Huge Pages File System. May 3 15:46:16 localhost systemd: Started Remount Root and Kernel File Systems. May 3 15:46:16 localhost systemd: Starting Configure read-only root support... May 3 15:46:16 localhost systemd: Starting Load/Save Random Seed... May 3 15:46:16 localhost systemd: Starting udev Coldplug all Devices... May 3 15:46:16 localhost systemd: Starting Flush Journal to Persistent Storage... May 3 15:46:16 localhost systemd: Started Load/Save Random Seed. May 3 15:46:16 localhost systemd: Started udev Coldplug all Devices. May 3 15:46:16 localhost systemd: Starting udev Wait for Complete Device Initialization... May 3 15:46:17 localhost systemd: Started LVM2 metadata daemon. May 3 15:46:17 localhost systemd: Starting LVM2 metadata daemon... May 3 15:46:17 localhost systemd: Started Apply Kernel Variables. May 3 15:46:17 localhost journal: Runtime journal is using 8.0M (max allowed 193.5M, trying to leave 290.3M free of 1.8G available → current limit 193.5M). May 3 15:46:17 localhost systemd: Started Flush Journal to Persistent Storage. May 3 15:46:17 localhost systemd: Started Configure read-only root support. May 3 15:46:17 localhost kernel: RPC: Registered named UNIX socket transport module. May 3 15:46:17 localhost kernel: RPC: Registered udp transport module. May 3 15:46:17 localhost kernel: RPC: Registered tcp transport module. May 3 15:46:17 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 3 15:46:17 localhost systemd: Started Create Static Device Nodes in /dev. May 3 15:46:17 localhost systemd: Starting udev Kernel Device Manager... May 3 15:46:17 localhost systemd-udevd: starting version 219 May 3 15:46:17 localhost kernel: Installing knfsd (copyright (C) 1996 okir@monad.swb.de). May 3 15:46:17 localhost systemd: Mounted NFSD configuration filesystem. May 3 15:46:19 localhost systemd: Started udev Kernel Device Manager. May 3 15:46:20 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 May 3 15:46:20 localhost kernel: sd 3:0:0:0: Attached scsi generic sg0 type 0 May 3 15:46:20 localhost kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set May 3 15:46:20 localhost kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt May 3 15:46:20 localhost kernel: ipmi message handler version 39.2 May 3 15:46:20 localhost mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:14.0/usb1/1-9" May 3 15:46:20 localhost mtp-probe: bus: 1, device: 2 was not an MTP device May 3 15:46:20 localhost kernel: ipmi device interface May 3 15:46:20 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input9 May 3 15:46:20 localhost kernel: IPMI System Interface driver. May 3 15:46:20 localhost kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS May 3 15:46:20 localhost kernel: ipmi_si: SMBIOS: mem 0x0 regsize 1 spacing 1 irq 0 May 3 15:46:20 localhost kernel: ipmi_si: Adding SMBIOS-specified kcs state machine May 3 15:46:20 localhost kernel: ipmi_si: Trying SMBIOS-specified kcs state machine at mem address 0x0, slave address 0x20, irq 0 May 3 15:46:20 localhost kernel: ipmi_si dmi-ipmi-si.0: Could not set up I/O space May 3 15:46:20 localhost kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) May 3 15:46:20 localhost kernel: RAPL PMU: API unit is 2^-32 Joules, 5 fixed counters, 655360 ms ovfl timer May 3 15:46:20 localhost kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules May 3 15:46:20 localhost kernel: RAPL PMU: hw unit of domain package 2^-14 Joules May 3 15:46:20 localhost kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules May 3 15:46:20 localhost kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules May 3 15:46:20 localhost kernel: RAPL PMU: hw unit of domain psys 2^-14 Joules May 3 15:46:20 localhost kernel: iTCO_vendor_support: vendor-support=0 May 3 15:46:20 localhost kernel: iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11 May 3 15:46:20 localhost kernel: iTCO_wdt: Found a Intel PCH TCO device (Version=4, TCOBASE=0x0400) May 3 15:46:20 localhost kernel: iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) May 3 15:46:20 localhost systemd-udevd: Error changing net interface name 'eth1' to 'eno1': File exists May 3 15:46:20 localhost systemd-udevd: could not rename interface '3' from 'eth1' to 'eno1': File exists May 3 15:46:21 localhost kernel: cryptd: max_cpu_qlen set to 1000 May 3 15:46:21 localhost kernel: AVX2 version of gcm_enc/dec engaged. May 3 15:46:21 localhost kernel: AES CTR mode by8 optimization enabled May 3 15:46:21 localhost kernel: alg: No test for pcbc(aes) (pcbc-aes-aesni) May 3 15:46:22 localhost kernel: resource sanity check: requesting [mem 0xfdffe800-0xfe0007ff], which spans more than pnp 00:0a [mem 0xfdb00000-0xfdffffff] May 3 15:46:22 localhost kernel: caller pmc_core_probe+0x94/0x1000 [intel_pmc_core] mapping multiple BARs May 3 15:46:22 localhost kernel: intel_pmc_core: initialized May 3 15:46:23 localhost systemd: Created slice system-lvm2\x2dpvscan.slice. May 3 15:46:23 localhost systemd: Starting system-lvm2\x2dpvscan.slice. May 3 15:46:23 localhost systemd: Starting LVM2 PV scan on device 8:2... May 3 15:46:23 localhost lvm: WARNING: lvmetad is being updated, retrying (setup) for 10 more seconds. May 3 15:46:23 localhost systemd: Found device ST31000528AS 1. May 3 15:46:23 localhost lvm: 2 logical volume(s) in volume group "centos" monitored May 3 15:46:23 localhost systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. May 3 15:46:23 localhost systemd: Reached target Local File Systems (Pre). May 3 15:46:23 localhost systemd: Starting Local File Systems (Pre). May 3 15:46:23 localhost systemd: Mounting /boot... May 3 15:46:23 localhost kernel: XFS (sda1): Mounting V5 Filesystem May 3 15:46:23 localhost systemd: Found device /dev/mapper/centos-swap. May 3 15:46:23 localhost systemd: Activating swap /dev/mapper/centos-swap... May 3 15:46:23 localhost systemd: Started udev Wait for Complete Device Initialization. May 3 15:46:23 localhost systemd: Starting Activation of DM RAID sets... May 3 15:46:23 localhost kernel: Adding 8126460k swap on /dev/mapper/centos-swap. Priority:-2 extents:1 across:8126460k FS May 3 15:46:23 localhost systemd: Activated swap /dev/mapper/centos-swap. May 3 15:46:23 localhost systemd: Reached target Swap. May 3 15:46:23 localhost systemd: Starting Swap. May 3 15:46:23 localhost systemd: Started Activation of DM RAID sets. May 3 15:46:23 localhost systemd: Reached target Encrypted Volumes. May 3 15:46:23 localhost systemd: Starting Encrypted Volumes. May 3 15:46:24 localhost kernel: XFS (sda1): Ending clean mount May 3 15:46:24 localhost systemd: Mounted /boot. May 3 15:46:27 localhost lvm: 3 logical volume(s) in volume group "centos" now active May 3 15:46:27 localhost systemd: Found device /dev/mapper/centos-home. May 3 15:46:27 localhost systemd: Started LVM2 PV scan on device 8:2. May 3 15:46:27 localhost systemd: Mounting /home... May 3 15:46:27 localhost kernel: XFS (dm-2): Mounting V5 Filesystem May 3 15:46:28 localhost kernel: XFS (dm-2): Ending clean mount May 3 15:46:28 localhost systemd: Mounted /home. May 3 15:46:28 localhost systemd: Reached target Local File Systems. May 3 15:46:28 localhost systemd: Starting Local File Systems. May 3 15:46:28 localhost systemd: Starting Preprocess NFS configuration... May 3 15:46:28 localhost systemd: Starting Import network configuration from initramfs... May 3 15:46:28 localhost systemd: Starting Tell Plymouth To Write Out Runtime Data... May 3 15:46:28 localhost systemd: Started Preprocess NFS configuration. May 3 15:46:28 localhost systemd: Started Tell Plymouth To Write Out Runtime Data. May 3 15:46:29 localhost systemd: Started Import network configuration from initramfs. May 3 15:46:29 localhost systemd: Starting Create Volatile Files and Directories... May 3 15:46:29 localhost kernel: audit: type=1400 audit(1525333589.271:4): avc: denied { dac_read_search } for pid=771 comm="systemd-tmpfile" capability=2 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=capability permissive=0 May 3 15:46:29 localhost systemd: Started Create Volatile Files and Directories. May 3 15:46:29 localhost systemd: Mounting RPC Pipe File System... May 3 15:46:29 localhost systemd: Starting Security Auditing Service... May 3 15:46:29 localhost systemd: Mounted RPC Pipe File System. May 3 15:46:29 localhost auditd[776]: Started dispatcher: /sbin/audispd pid: 778 May 3 15:46:29 localhost audispd: audispd initialized with q_depth=250 and 1 active plugins May 3 15:46:29 localhost auditd[776]: Init complete, auditd 2.7.6 listening for events (startup state enable) May 3 15:46:29 localhost augenrules: /sbin/augenrules: No change May 3 15:46:29 localhost augenrules: No rules May 3 15:46:29 localhost augenrules: enabled 1 May 3 15:46:29 localhost augenrules: failure 1 May 3 15:46:29 localhost augenrules: pid 776 May 3 15:46:29 localhost augenrules: rate_limit 0 May 3 15:46:29 localhost augenrules: backlog_limit 8192 May 3 15:46:29 localhost augenrules: lost 0 May 3 15:46:29 localhost augenrules: backlog 0 May 3 15:46:29 localhost augenrules: enabled 1 May 3 15:46:29 localhost augenrules: failure 1 May 3 15:46:29 localhost augenrules: pid 776 May 3 15:46:29 localhost augenrules: rate_limit 0 May 3 15:46:29 localhost augenrules: backlog_limit 8192 May 3 15:46:29 localhost augenrules: lost 0 May 3 15:46:29 localhost augenrules: backlog 0 May 3 15:46:29 localhost systemd: Started Security Auditing Service. May 3 15:46:29 localhost systemd: Starting Update UTMP about System Boot/Shutdown... May 3 15:46:29 localhost systemd: Started Update UTMP about System Boot/Shutdown. May 3 15:46:29 localhost systemd: Reached target System Initialization. May 3 15:46:29 localhost systemd: Starting System Initialization. May 3 15:46:29 localhost systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. May 3 15:46:29 localhost systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. May 3 15:46:29 localhost systemd: Started Flexible branding. May 3 15:46:29 localhost systemd: Starting Flexible branding. May 3 15:46:29 localhost systemd: Listening on D-Bus System Message Bus Socket. May 3 15:46:29 localhost systemd: Starting D-Bus System Message Bus Socket. May 3 15:46:29 localhost systemd: Listening on PC/SC Smart Card Daemon Activation Socket. May 3 15:46:29 localhost systemd: Starting PC/SC Smart Card Daemon Activation Socket. May 3 15:46:29 localhost systemd: Started CUPS Printer Service Spool. May 3 15:46:29 localhost systemd: Starting CUPS Printer Service Spool. May 3 15:46:29 localhost systemd: Reached target Paths. May 3 15:46:29 localhost systemd: Starting Paths. May 3 15:46:29 localhost systemd: Listening on Open-iSCSI iscsid Socket. May 3 15:46:29 localhost systemd: Starting Open-iSCSI iscsid Socket. May 3 15:46:29 localhost systemd: Listening on Open-iSCSI iscsiuio Socket. May 3 15:46:29 localhost systemd: Starting Open-iSCSI iscsiuio Socket. May 3 15:46:29 localhost systemd: Listening on Virtual machine lock manager socket. May 3 15:46:29 localhost systemd: Starting Virtual machine lock manager socket. May 3 15:46:29 localhost systemd: Started Daily Cleanup of Temporary Directories. May 3 15:46:29 localhost systemd: Starting Daily Cleanup of Temporary Directories. May 3 15:46:29 localhost systemd: Reached target Timers. May 3 15:46:29 localhost systemd: Starting Timers. May 3 15:46:29 localhost systemd: Listening on CUPS Printing Service Sockets. May 3 15:46:29 localhost systemd: Starting CUPS Printing Service Sockets. May 3 15:46:29 localhost systemd: Listening on RPCbind Server Activation Socket. May 3 15:46:29 localhost systemd: Starting RPCbind Server Activation Socket. May 3 15:46:29 localhost systemd: Listening on Virtual machine log manager socket. May 3 15:46:29 localhost systemd: Starting Virtual machine log manager socket. May 3 15:46:29 localhost systemd: Reached target Sockets. May 3 15:46:29 localhost systemd: Starting Sockets. May 3 15:46:29 localhost systemd: Reached target Basic System. May 3 15:46:29 localhost systemd: Starting Basic System. May 3 15:46:29 localhost systemd: Starting Machine Check Exception Logging Daemon... May 3 15:46:29 localhost systemd: Starting Dump dmesg to /var/log/dmesg... May 3 15:46:29 localhost systemd: Starting Accounts Service... May 3 15:46:29 localhost systemd: Starting Authorization Manager... May 3 15:46:29 localhost systemd: Started D-Bus System Message Bus. May 3 15:46:29 localhost mcelog: warning: 8 bytes ignored in each record May 3 15:46:29 localhost mcelog: consider an update May 3 15:46:30 localhost systemd: Starting D-Bus System Message Bus... May 3 15:46:30 localhost systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. May 3 15:46:30 localhost systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... May 3 15:46:30 localhost systemd: Started Hardware RNG Entropy Gatherer Daemon. May 3 15:46:30 localhost systemd: Starting Hardware RNG Entropy Gatherer Daemon... May 3 15:46:30 localhost systemd: Starting Login Service... May 3 15:46:30 localhost rngd: read error May 3 15:46:30 localhost rngd: hwrng: no available rng May 3 15:46:30 localhost rngd: Unable to open file: /dev/tpm0 May 3 15:46:30 localhost systemd: Started ABRT Automated Bug Reporting Tool. May 3 15:46:30 localhost systemd: Starting ABRT Automated Bug Reporting Tool... May 3 15:46:30 localhost systemd: Started ABRT Xorg log watcher. May 3 15:46:30 localhost systemd: Starting ABRT Xorg log watcher... May 3 15:46:30 localhost systemd: Started ABRT kernel log watcher. May 3 15:46:30 localhost systemd: Starting ABRT kernel log watcher... May 3 15:46:30 localhost systemd: Starting Kernel Samepage Merging... May 3 15:46:30 localhost polkitd[805]: Started polkitd version 0.112 May 3 15:46:30 localhost smartd[813]: smartd 6.2 2017-02-27 r4394 [x86_64-linux-4.16.0-1.el7.elrepo.x86_64] (local build) May 3 15:46:30 localhost smartd[813]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org May 3 15:46:30 localhost smartd[813]: Opened configuration file /etc/smartmontools/smartd.conf May 3 15:46:30 localhost smartd[813]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices May 3 15:46:30 localhost smartd[813]: Device: /dev/sda, type changed from 'scsi' to 'sat' May 3 15:46:30 localhost smartd[813]: Device: /dev/sda [SAT], opened May 3 15:46:30 localhost smartd[813]: Device: /dev/sda [SAT], ST31000528AS, S/N:6VP8LQ2X, WWN:5-000c50-02b9aa3b6, FW:CC38, 1.00 TB May 3 15:46:30 localhost smartd[813]: Device: /dev/sda [SAT], found in smartd database: Seagate Barracuda 7200.12 May 3 15:46:30 localhost smartd[813]: Device: /dev/sda [SAT], WARNING: A firmware update for this drive may be available, May 3 15:46:30 localhost smartd[813]: see the following Seagate web pages: May 3 15:46:30 localhost smartd[813]: http://knowledge.seagate.com/articles/en_US/FAQ/207931en May 3 15:46:30 localhost smartd[813]: http://knowledge.seagate.com/articles/en_US/FAQ/213891en May 3 15:46:31 localhost dbus-daemon: dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:46:31 localhost dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:46:31 localhost smartd[813]: Device: /dev/sda [SAT], is SMART capable. Adding to "monitor" list. May 3 15:46:31 localhost smartd[813]: Monitoring 1 ATA and 0 SCSI devices May 3 15:46:31 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' May 3 15:46:31 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' May 3 15:46:31 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 3 15:46:31 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 3 15:46:31 localhost accounts-daemon[803]: started daemon version 0.6.45 May 3 15:46:31 localhost systemd: Starting NTP client/server... May 3 15:46:31 localhost systemd: Starting Avahi mDNS/DNS-SD Stack... May 3 15:46:31 localhost systemd: Starting RealtimeKit Scheduling Policy Service... May 3 15:46:31 localhost systemd: Starting Load CPU microcode update... May 3 15:46:31 localhost systemd: Starting System Logging Service... May 3 15:46:31 localhost systemd: Started irqbalance daemon. May 3 15:46:31 localhost systemd: Starting irqbalance daemon... May 3 15:46:31 localhost systemd: Starting GSSAPI Proxy Daemon... May 3 15:46:31 localhost systemd: Started Manage Sound Card State (restore and store). May 3 15:46:31 localhost systemd: Starting Manage Sound Card State (restore and store)... May 3 15:46:31 localhost systemd: Starting Install ABRT coredump hook... May 3 15:46:31 localhost systemd: Started libstoragemgmt plug-in server daemon. May 3 15:46:31 localhost systemd: Starting libstoragemgmt plug-in server daemon... May 3 15:46:31 localhost alsactl[846]: alsactl 1.1.3 daemon started May 3 15:46:31 localhost systemd: Starting Modem Manager... May 3 15:46:31 localhost alsactl[846]: /usr/sbin/alsactl: load_state:1683Cannot open /var/lib/alsa/asound.state for reading: No such file or directory May 3 15:46:31 localhost systemd: Starting Resets System Activity Logs... May 3 15:46:31 localhost systemd: Started Dump dmesg to /var/log/dmesg. May 3 15:46:31 localhost systemd: Started Kernel Samepage Merging. May 3 15:46:31 localhost systemd: Started Machine Check Exception Logging Daemon. May 3 15:46:31 localhost systemd: Started Resets System Activity Logs. May 3 15:46:31 localhost systemd-logind: New seat seat0. May 3 15:46:31 localhost systemd: Started Authorization Manager. May 3 15:46:31 localhost systemd-logind: Watching system buttons on /dev/input/event2 (Power Button) May 3 15:46:31 localhost systemd-logind: Watching system buttons on /dev/input/event3 (Video Bus) May 3 15:46:31 localhost systemd-logind: Watching system buttons on /dev/input/event1 (Power Button) May 3 15:46:31 localhost systemd-logind: Watching system buttons on /dev/input/event0 (Sleep Button) May 3 15:46:31 localhost systemd: Started Accounts Service. May 3 15:46:31 localhost systemd: Started Login Service. May 3 15:46:31 localhost systemd: Starting firewalld - dynamic firewall daemon... May 3 15:46:31 localhost systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... May 3 15:46:31 localhost systemd: Started RealtimeKit Scheduling Policy Service. May 3 15:46:31 localhost systemd: Started Install ABRT coredump hook. May 3 15:46:31 localhost systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. May 3 15:46:31 localhost avahi-daemon[838]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). May 3 15:46:31 localhost avahi-daemon[838]: Successfully dropped root privileges. May 3 15:46:31 localhost avahi-daemon[838]: avahi-daemon 0.6.31 starting up. May 3 15:46:31 localhost avahi-daemon[838]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! May 3 15:46:31 localhost systemd: Started Avahi mDNS/DNS-SD Stack. May 3 15:46:31 localhost avahi-daemon[838]: Successfully called chroot(). May 3 15:46:31 localhost avahi-daemon[838]: Successfully dropped remaining capabilities. May 3 15:46:31 localhost avahi-daemon[838]: No service file found in /etc/avahi/services. May 3 15:46:31 localhost avahi-daemon[838]: System host name is set to 'localhost'. This is not a suitable mDNS host name, looking for alternatives. May 3 15:46:31 localhost chronyd[882]: chronyd version 3.1 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SECHASH +SIGND +ASYNCDNS +IPV6 +DEBUG) May 3 15:46:31 localhost rsyslogd: [origin software="rsyslogd" swVersion="8.24.0" x-pid="841" x-info="http://www.rsyslog.com"] start May 3 15:46:31 localhost rsyslogd: imjournal: fscanf on state file `/var/lib/rsyslog/imjournal.state' failed [v8.24.0 try http://www.rsyslog.com/e/2027 ] May 3 15:46:31 localhost rsyslogd: imjournal: ignoring invalid state file [v8.24.0] May 3 15:46:31 localhost systemd: Started System Logging Service. May 3 15:46:31 localhost avahi-daemon[838]: Network interface enumeration completed. May 3 15:46:31 localhost avahi-daemon[838]: Registering HINFO record with values 'X86_64'/'LINUX'. May 3 15:46:31 localhost avahi-daemon[838]: Server startup complete. Host name is linux.local. Local service cookie is 4093284668. May 3 15:46:32 localhost chronyd[882]: Frequency 16.400 +/- 4.896 ppm read from /var/lib/chrony/drift May 3 15:46:32 localhost systemd: Started NTP client/server. May 3 15:46:32 localhost ModemManager[850]: ModemManager (version 1.6.0-2.el7) starting in system bus... May 3 15:46:32 localhost systemd: Started GSSAPI Proxy Daemon. May 3 15:46:32 localhost systemd: Reached target NFS client services. May 3 15:46:32 localhost systemd: Starting NFS client services. May 3 15:46:32 localhost abrtd: '/var/spool/abrt/oops-2017-12-18-23:14:43-1785-0' is not a problem directory May 3 15:46:32 localhost systemd: Started Load CPU microcode update. May 3 15:46:32 localhost systemd: Started Modem Manager. May 3 15:46:32 localhost abrtd: '/var/spool/abrt/oops-2017-12-19-15:25:04-1871-0' is not a problem directory May 3 15:46:32 localhost abrtd: Init complete, entering main loop May 3 15:46:33 localhost systemd: Started firewalld - dynamic firewall daemon. May 3 15:46:33 localhost systemd: Reached target Network (Pre). May 3 15:46:33 localhost systemd: Starting Network (Pre). May 3 15:46:33 localhost systemd: Starting Network Manager... May 3 15:46:34 localhost firewalld[863]: WARNING: ICMP type 'beyond-scope' is not supported by the kernel for ipv6. May 3 15:46:34 localhost firewalld[863]: WARNING: beyond-scope: INVALID_ICMPTYPE: No supported ICMP type., ignoring for run-time. May 3 15:46:34 localhost firewalld[863]: WARNING: ICMP type 'failed-policy' is not supported by the kernel for ipv6. May 3 15:46:34 localhost firewalld[863]: WARNING: failed-policy: INVALID_ICMPTYPE: No supported ICMP type., ignoring for run-time. May 3 15:46:34 localhost firewalld[863]: WARNING: ICMP type 'reject-route' is not supported by the kernel for ipv6. May 3 15:46:34 localhost firewalld[863]: WARNING: reject-route: INVALID_ICMPTYPE: No supported ICMP type., ignoring for run-time. May 3 15:46:34 localhost NetworkManager[908]: [1525333594.5395] NetworkManager (version 1.8.0-9.el7) is starting... (for the first time) May 3 15:46:34 localhost NetworkManager[908]: [1525333594.5400] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 10-slaves-order.conf) May 3 15:46:34 localhost NetworkManager[908]: [1525333594.6787] manager[0x5567b190e0d0]: monitoring kernel firmware directory '/lib/firmware'. May 3 15:46:34 localhost NetworkManager[908]: [1525333594.7236] policy: hostname management mode: default May 3 15:46:34 localhost ModemManager[850]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.0/0000:02:00.0': not supported by any plugin May 3 15:46:34 localhost ModemManager[850]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0': not supported by any plugin May 3 15:46:34 localhost ModemManager[850]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.6/0000:04:00.0': not supported by any plugin May 3 15:46:34 localhost ModemManager[850]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.7/0000:05:00.0': not supported by any plugin May 3 15:46:34 localhost NetworkManager[908]: [1525333594.7239] dns-mgr[0x5567b1915960]: init: dns=default, rc-manager=file May 3 15:46:34 localhost ModemManager[850]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1d.0/0000:06:00.0': not supported by any plugin May 3 15:46:34 localhost ModemManager[850]: Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1d.1/0000:07:00.0': not supported by any plugin May 3 15:46:34 localhost systemd: Started Network Manager. May 3 15:46:34 localhost systemd: Starting Network Manager Wait Online... May 3 15:46:34 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' May 3 15:46:34 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' May 3 15:46:34 localhost systemd: Starting Network Manager Script Dispatcher Service... May 3 15:46:34 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' May 3 15:46:34 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' May 3 15:46:34 localhost systemd: Started Network Manager Script Dispatcher Service. May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9565] settings: loaded plugin ifcfg-rh: (c) 2007 - 2015 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. (/usr/lib64/NetworkManager/libnm-settings-plugin-ifcfg-rh.so) May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9684] settings: loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. (/usr/lib64/NetworkManager/libnm-settings-plugin-ibft.so) May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9685] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9703] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-eno1 (b1c8f11b-8040-41a8-b9e7-3aaac7baa349,"eno1") May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9714] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp4s0 (de8a700c-d250-452f-bd56-55b5e3798588,"enp4s0") May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9725] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp5s0 (e01745c6-bb78-4d8e-b73a-06679525f5ef,"enp5s0") May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9736] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp6s0 (ab51025f-fbbe-4ed8-9910-b7d83de48487,"enp6s0") May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9746] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-enp7s0 (4d4a9641-ce62-4b40-884b-6b4b5d42faac,"enp7s0") May 3 15:46:34 localhost NetworkManager[908]: [1525333594.9756] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-eth0 (2855711d-98d0-4bfa-81aa-edd7acdc0f41,"eth0") May 3 15:46:35 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' May 3 15:46:35 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' May 3 15:46:35 localhost systemd: Starting Hostname Service... May 3 15:46:35 localhost dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:46:35 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:46:35 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.hostname1' May 3 15:46:35 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.hostname1' May 3 15:46:35 localhost systemd: Started Hostname Service. May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2193] settings: hostname: using hostnamed May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2194] settings: hostname changed from (none) to "localhost.localdomain" May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2201] dhcp-init: Using DHCP client 'dhclient' May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2201] manager: rfkill: WiFi enabled by radio killswitch; enabled by state file May 3 15:46:35 localhost nm-dispatcher: req:1 'hostname': new request (4 scripts) May 3 15:46:35 localhost nm-dispatcher: req:1 'hostname': start running ordered scripts... May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2201] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2202] manager: Networking is enabled by state file May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2611] Loaded device plugin: NMBondDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2612] Loaded device plugin: NMBridgeDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2613] Loaded device plugin: NMDummyDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2613] Loaded device plugin: NMEthernetDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2613] Loaded device plugin: NMInfinibandDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2613] Loaded device plugin: NMIPTunnelDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2613] Loaded device plugin: NMMacsecDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2619] Loaded device plugin: NMMacvlanDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2619] Loaded device plugin: NMTunDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2619] Loaded device plugin: NMVethDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2620] Loaded device plugin: NMVlanDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.2620] Loaded device plugin: NMVxlanDeviceFactory (internal) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3042] Loaded device plugin: NMAtmManager (/usr/lib64/NetworkManager/libnm-device-plugin-adsl.so) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3504] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/libnm-device-plugin-team.so) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3880] Loaded device plugin: NMWifiFactory (/usr/lib64/NetworkManager/libnm-device-plugin-wifi.so) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3902] device (lo): link connected May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3912] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3930] manager: (eno1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.3948] device (eno1): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready May 3 15:46:35 localhost NetworkManager[908]: [1525333595.4426] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.4434] ifcfg-rh: add connection in-memory (d6456e75-7877-3694-a088-ad3b5d9c2f86,"Wired connection 1") May 3 15:46:35 localhost NetworkManager[908]: [1525333595.4438] settings: (eth1): created default wired connection 'Wired connection 1' May 3 15:46:35 localhost NetworkManager[908]: [1525333595.4443] device (eth1): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready May 3 15:46:35 localhost NetworkManager[908]: [1525333595.4913] manager: (enp4s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/4) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.4921] device (enp4s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp4s0: link is not ready May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp4s0: link is not ready May 3 15:46:35 localhost NetworkManager[908]: [1525333595.5391] manager: (enp5s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/5) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.5398] device (enp5s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp5s0: link is not ready May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp5s0: link is not ready May 3 15:46:35 localhost NetworkManager[908]: [1525333595.5861] manager: (enp6s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/6) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.5867] device (enp6s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp6s0: link is not ready May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp6s0: link is not ready May 3 15:46:35 localhost NetworkManager[908]: [1525333595.6334] manager: (enp7s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/7) May 3 15:46:35 localhost NetworkManager[908]: [1525333595.6341] device (enp7s0): state change: unmanaged -> unavailable (reason 'managed') [10 20 2] May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp7s0: link is not ready May 3 15:46:35 localhost kernel: IPv6: ADDRCONF(NETDEV_UP): enp7s0: link is not ready May 3 15:46:35 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:35 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:35 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:35 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:35 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:35 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:35 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:35 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:35 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:35 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:37 localhost kernel: igb 0000:02:00.0 eno1: igb: eno1 NIC Link is Up 100 Mbps Full Duplex, Flow Control: RX/TX May 3 15:46:37 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eno1: link becomes ready May 3 15:46:37 localhost NetworkManager[908]: [1525333597.0677] device (eno1): link connected May 3 15:46:37 localhost NetworkManager[908]: [1525333597.0682] device (eno1): state change: unavailable -> disconnected (reason 'carrier-changed') [20 30 40] May 3 15:46:40 localhost NetworkManager[908]: [1525333600.8265] manager: startup complete May 3 15:46:40 localhost systemd: Started Network Manager Wait Online. May 3 15:46:40 localhost systemd: Starting LSB: Bring up/down networking... May 3 15:46:41 localhost network: Bringing up loopback interface: [ OK ] May 3 15:46:41 localhost systemd: Started LSB: Bring up/down networking. May 3 15:46:41 localhost systemd: Reached target Network. May 3 15:46:41 localhost systemd: Starting Network. May 3 15:46:41 localhost systemd: Started CUPS Printing Service. May 3 15:46:41 localhost systemd: Starting CUPS Printing Service... May 3 15:46:41 localhost systemd: Starting OpenSSH server daemon... May 3 15:46:41 localhost systemd: Starting Postfix Mail Transport Agent... May 3 15:46:41 localhost systemd: Starting /etc/rc.d/rc.local Compatibility... May 3 15:46:41 localhost systemd: Starting Dynamic System Tuning Daemon... May 3 15:46:41 localhost systemd: Starting Logout off all iSCSI sessions on shutdown... May 3 15:46:41 localhost systemd: Reached target Network is Online. May 3 15:46:41 localhost systemd: Starting Network is Online. May 3 15:46:41 localhost systemd: Starting Notify NFS peers of a restart... May 3 15:46:41 localhost systemd: Started Logout off all iSCSI sessions on shutdown. May 3 15:46:41 localhost systemd: Reached target Remote File Systems (Pre). May 3 15:46:41 localhost systemd: Starting Remote File Systems (Pre). May 3 15:46:41 localhost systemd: Reached target Remote File Systems. May 3 15:46:41 localhost systemd: Starting Remote File Systems. May 3 15:46:41 localhost systemd: Starting Virtualization daemon... May 3 15:46:41 localhost systemd: Starting Permit User Sessions... May 3 15:46:41 localhost systemd: Starting Crash recovery kernel arming... May 3 15:46:41 localhost systemd: Starting Availability of block devices... May 3 15:46:41 localhost systemd: Started Availability of block devices. May 3 15:46:41 localhost systemd: Started Permit User Sessions. May 3 15:46:41 localhost systemd: Started Job spooling tools. May 3 15:46:41 localhost systemd: Starting Job spooling tools... May 3 15:46:41 localhost systemd: Started Command Scheduler. May 3 15:46:41 localhost systemd: Starting Command Scheduler... May 3 15:46:41 localhost kdumpctl: No memory reserved for crash kernel May 3 15:46:41 localhost kdumpctl: Starting kdump: [FAILED] May 3 15:46:41 localhost systemd: kdump.service: main process exited, code=exited, status=1/FAILURE May 3 15:46:41 localhost systemd: Failed to start Crash recovery kernel arming. May 3 15:46:41 localhost systemd: Unit kdump.service entered failed state. May 3 15:46:41 localhost systemd: kdump.service failed. May 3 15:46:41 localhost systemd: Started OpenSSH server daemon. May 3 15:46:41 localhost systemd: Started Dynamic System Tuning Daemon. May 3 15:46:41 localhost systemd: Started /etc/rc.d/rc.local Compatibility. May 3 15:46:41 localhost systemd: Starting GNOME Display Manager... May 3 15:46:41 localhost systemd: Starting Wait for Plymouth Boot Screen to Quit... May 3 15:46:41 localhost sm-notify[1211]: Version 1.3.0 starting May 3 15:46:41 localhost systemd: Started Notify NFS peers of a restart. May 3 15:46:41 localhost setroubleshoot: failed to retrieve rpm info for /dmesg.txt May 3 15:46:41 localhost systemd: Started GNOME Display Manager. May 3 15:46:41 localhost setroubleshoot: SELinux is preventing /usr/bin/dmesg from write access on the file /dmesg.txt. For complete SELinux messages run: sealert -l cded0810-3e4e-440a-abe3-d2ff82d47a04 May 3 15:46:41 localhost python: SELinux is preventing /usr/bin/dmesg from write access on the file /dmesg.txt.#012#012***** Plugin leaks (86.2 confidence) suggests *****************************#012#012If you want to ignore dmesg trying to write access the dmesg.txt file, because you believe it should not need this access.#012Then you should report this as a bug. #012You can generate a local policy module to dontaudit this access.#012Do#012# ausearch -x /usr/bin/dmesg --raw | audit2allow -D -M my-dmesg#012# semodule -i my-dmesg.pp#012#012***** Plugin catchall (14.7 confidence) suggests **************************#012#012If you believe that dmesg should be allowed write access on the dmesg.txt file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'dmesg' --raw | audit2allow -M my-dmesg#012# semodule -i my-dmesg.pp#012 May 3 15:46:41 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:46:41 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:46:41 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:46:41 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:46:41 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:46:41 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:46:41 localhost setroubleshoot: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability. For complete SELinux messages run: sealert -l 4b046f9b-effc-417c-a8a2-7a51b3c4301f May 3 15:46:41 localhost python: SELinux is preventing /usr/sbin/sm-notify from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that sm-notify should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify#012# semodule -i my-smnotify.pp#012 May 3 15:46:42 localhost systemd: Started Postfix Mail Transport Agent. May 3 15:46:42 localhost systemd: Started Virtualization daemon. May 3 15:46:42 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:42 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:42 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:42 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:42 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:42 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:42 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:42 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:42 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:42 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:42 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:42 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost NetworkManager[908]: [1525333603.0553] manager: (virbr0): new Bridge device (/org/freedesktop/NetworkManager/Devices/8) May 3 15:46:43 localhost kernel: tun: Universal TUN/TAP device driver, 1.6 May 3 15:46:43 localhost kernel: virbr0: port 1(virbr0-nic) entered blocking state May 3 15:46:43 localhost kernel: virbr0: port 1(virbr0-nic) entered disabled state May 3 15:46:43 localhost kernel: device virbr0-nic entered promiscuous mode May 3 15:46:43 localhost NetworkManager[908]: [1525333603.0612] manager: (virbr0-nic): new Tun device (/org/freedesktop/NetworkManager/Devices/9) May 3 15:46:43 localhost NetworkManager[908]: [1525333603.0644] device (virbr0-nic): state change: unmanaged -> unavailable (reason 'connection-assumed') [10 20 41] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.0651] device (virbr0-nic): state change: unavailable -> disconnected (reason 'none') [20 30 0] May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost kernel: virbr0: port 1(virbr0-nic) entered blocking state May 3 15:46:43 localhost kernel: virbr0: port 1(virbr0-nic) entered listening state May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1515] device (virbr0): state change: unmanaged -> unavailable (reason 'connection-assumed') [10 20 41] May 3 15:46:43 localhost avahi-daemon[838]: Joining mDNS multicast group on interface virbr0.IPv4 with address 192.168.122.1. May 3 15:46:43 localhost avahi-daemon[838]: New relevant interface virbr0.IPv4 for mDNS. May 3 15:46:43 localhost avahi-daemon[838]: Registering new address record for 192.168.122.1 on virbr0.IPv4. May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1535] ifcfg-rh: add connection in-memory (98868537-cb0e-4273-9252-6d8885111c08,"virbr0") May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1541] device (virbr0): state change: unavailable -> disconnected (reason 'connection-assumed') [20 30 41] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1571] device (virbr0): Activation: starting connection 'virbr0' (98868537-cb0e-4273-9252-6d8885111c08) May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1582] device (virbr0): state change: disconnected -> prepare (reason 'none') [30 40 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1588] device (virbr0): state change: prepare -> config (reason 'none') [40 50 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1599] keyfile: add connection in-memory (856f438e-9485-45f2-8657-76cbdb751802,"virbr0-nic") May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1611] device (virbr0-nic): Activation: starting connection 'virbr0-nic' (856f438e-9485-45f2-8657-76cbdb751802) May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1612] device (virbr0): state change: config -> ip-config (reason 'none') [50 70 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1643] device (virbr0-nic): state change: disconnected -> prepare (reason 'none') [30 40 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1742] device (virbr0): state change: ip-config -> ip-check (reason 'none') [70 80 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1749] device (virbr0-nic): state change: prepare -> config (reason 'none') [40 50 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1752] device (virbr0-nic): state change: config -> ip-config (reason 'none') [50 70 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1753] device (virbr0): bridge port virbr0-nic was attached May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1753] device (virbr0-nic): Activation: connection 'virbr0-nic' enslaved, continuing activation May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1754] device (virbr0): state change: ip-check -> secondaries (reason 'none') [80 90 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1758] device (virbr0-nic): state change: ip-config -> secondaries (reason 'none') [70 90 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1759] device (virbr0): state change: secondaries -> activated (reason 'none') [90 100 0] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.1760] manager: NetworkManager state is now CONNECTED_LOCAL May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost dnsmasq[1444]: started, version 2.76 cachesize 150 May 3 15:46:43 localhost dnsmasq[1444]: compile time options: IPv6 GNU-getopt DBus no-i18n IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth no-DNSSEC loop-detect inotify May 3 15:46:43 localhost dnsmasq-dhcp[1444]: DHCP, IP range 192.168.122.2 -- 192.168.122.254, lease time 1h May 3 15:46:43 localhost dnsmasq-dhcp[1444]: DHCP, sockets bound exclusively to interface virbr0 May 3 15:46:43 localhost dnsmasq[1444]: no servers found in /etc/resolv.conf, will retry May 3 15:46:43 localhost dnsmasq[1444]: read /etc/hosts - 2 addresses May 3 15:46:43 localhost dnsmasq[1444]: read /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses May 3 15:46:43 localhost dnsmasq-dhcp[1444]: read /var/lib/libvirt/dnsmasq/default.hostsfile May 3 15:46:43 localhost kernel: virbr0: port 1(virbr0-nic) entered disabled state May 3 15:46:43 localhost NetworkManager[908]: [1525333603.2362] device (virbr0): Activation: successful, device activated. May 3 15:46:43 localhost NetworkManager[908]: [1525333603.2374] device (virbr0-nic): state change: secondaries -> activated (reason 'none') [90 100 0] May 3 15:46:43 localhost nm-dispatcher: req:2 'up' [virbr0]: new request (4 scripts) May 3 15:46:43 localhost nm-dispatcher: req:2 'up' [virbr0]: start running ordered scripts... May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost systemd: Unit iscsi.service cannot be reloaded because it is inactive. May 3 15:46:43 localhost NetworkManager[908]: [1525333603.2612] device (virbr0-nic): Activation: successful, device activated. May 3 15:46:43 localhost NetworkManager[908]: [1525333603.2621] device (virbr0-nic): state change: activated -> unmanaged (reason 'connection-assumed') [100 10 41] May 3 15:46:43 localhost NetworkManager[908]: [1525333603.2623] device (virbr0): bridge port virbr0-nic was detached May 3 15:46:43 localhost NetworkManager[908]: [1525333603.2623] device (virbr0-nic): released from master device virbr0 May 3 15:46:43 localhost nm-dispatcher: req:3 'up' [virbr0-nic]: new request (4 scripts) May 3 15:46:43 localhost nm-dispatcher: req:3 'up' [virbr0-nic]: start running ordered scripts... May 3 15:46:43 localhost systemd: Unit iscsi.service cannot be reloaded because it is inactive. May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost nm-dispatcher: req:4 'down' [virbr0-nic]: new request (4 scripts) May 3 15:46:43 localhost nm-dispatcher: req:4 'down' [virbr0-nic]: start running ordered scripts... May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:44 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:44 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:44 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:46:44 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:46:44 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:44 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:44 localhost systemd: Created slice User Slice of gdm. May 3 15:46:44 localhost systemd: Starting User Slice of gdm. May 3 15:46:44 localhost systemd-logind: New session c1 of user gdm. May 3 15:46:44 localhost systemd: Started Session c1 of user gdm. May 3 15:46:44 localhost systemd: Starting Session c1 of user gdm. May 3 15:46:45 localhost gnome-session: generating cookie with syscall May 3 15:46:45 localhost gnome-session: generating cookie with syscall May 3 15:46:45 localhost gnome-session: generating cookie with syscall May 3 15:46:45 localhost gnome-session: generating cookie with syscall May 3 15:46:45 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' May 3 15:46:45 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' May 3 15:46:45 localhost systemd: Starting Daemon for power management... May 3 15:46:45 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.UPower' May 3 15:46:45 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.UPower' May 3 15:46:45 localhost systemd: Started Daemon for power management. May 3 15:46:46 localhost rtkit-daemon[839]: Successfully made thread 1623 of process 1623 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. May 3 15:46:46 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:46:46 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:46:46 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:46:46 localhost journal: JS WARNING: [resource:///org/gnome/shell/gdm/loginDialog.js 1027]: anonymous function does not always return a value May 3 15:46:47 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' May 3 15:46:47 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' May 3 15:46:47 localhost systemd: Starting Locale Service... May 3 15:46:47 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.locale1' May 3 15:46:47 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.locale1' May 3 15:46:47 localhost systemd: Started Locale Service. May 3 15:46:47 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' May 3 15:46:47 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' May 3 15:46:48 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' May 3 15:46:48 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' May 3 15:46:48 localhost spice-vdagent[1647]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 May 3 15:46:48 localhost gnome-session: gnome-session-binary[1574]: WARNING: App 'spice-vdagent.desktop' exited with code 1 May 3 15:46:48 localhost gnome-session-binary[1574]: WARNING: App 'spice-vdagent.desktop' exited with code 1 May 3 15:46:48 localhost systemd: Starting PackageKit Daemon... May 3 15:46:48 localhost systemd: Starting Location Lookup Service... May 3 15:46:48 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service' May 3 15:46:48 localhost dbus[806]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service' May 3 15:46:48 localhost gnome-session-binary: Entering running state May 3 15:46:48 localhost systemd: Starting WPA Supplicant daemon... May 3 15:46:48 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' May 3 15:46:48 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' May 3 15:46:48 localhost systemd: Starting Manage, Install and Generate Color Profiles... May 3 15:46:48 localhost gnome-settings-daemon: ObjectStore.cpp(59): Failed to enumerate object store in /var/lib/softhsm/tokens/ May 3 15:46:48 localhost gnome-settings-daemon: SoftHSM.cpp(476): Could not load the object store May 3 15:46:48 localhost gnome-settings-daemon: ObjectStore.cpp(59): Failed to enumerate object store in /var/lib/softhsm/tokens/ May 3 15:46:48 localhost gnome-settings-daemon: SoftHSM.cpp(476): Could not load the object store May 3 15:46:48 localhost systemd: Started PC/SC Smart Card Daemon. May 3 15:46:48 localhost systemd: Starting PC/SC Smart Card Daemon... May 3 15:46:48 localhost pcscd: 00000000 utils.c:53:GetDaemonPid() Can't open /var/run/pcscd/pcscd.pid: No such file or directory May 3 15:46:48 localhost journal: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory May 3 15:46:48 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.ColorManager' May 3 15:46:48 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.ColorManager' May 3 15:46:48 localhost systemd: Started Manage, Install and Generate Color Profiles. May 3 15:46:48 localhost dbus[806]: [system] Successfully activated service 'fi.w1.wpa_supplicant1' May 3 15:46:48 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'fi.w1.wpa_supplicant1' May 3 15:46:48 localhost systemd: Started WPA Supplicant daemon. May 3 15:46:48 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.GeoClue2' May 3 15:46:48 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.GeoClue2' May 3 15:46:48 localhost systemd: Started Location Lookup Service. May 3 15:46:49 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.PackageKit' May 3 15:46:49 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.PackageKit' May 3 15:46:49 localhost systemd: Started PackageKit Daemon. May 3 15:46:49 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' May 3 15:46:49 localhost dbus[806]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' May 3 15:46:49 localhost systemd: Starting Fingerprint Authentication Daemon... May 3 15:46:49 localhost dbus[806]: [system] Successfully activated service 'net.reactivated.Fprint' May 3 15:46:49 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'net.reactivated.Fprint' May 3 15:46:49 localhost systemd: Started Fingerprint Authentication Daemon. May 3 15:46:49 localhost fprintd: Launching FprintObject May 3 15:46:49 localhost journal: D-Bus service launched with name: net.reactivated.Fprint May 3 15:46:49 localhost journal: entering main loop May 3 15:46:49 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' May 3 15:46:49 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' May 3 15:46:49 localhost systemd: Starting Realm and Domain Configuration... May 3 15:46:49 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.realmd' May 3 15:46:49 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.realmd' May 3 15:46:49 localhost systemd: Started Realm and Domain Configuration. May 3 15:46:50 localhost systemd: Received SIGRTMIN+21 from PID 334 (plymouthd). May 3 15:46:50 localhost systemd: Started Wait for Plymouth Boot Screen to Quit. May 3 15:46:50 localhost systemd: Reached target Multi-User System. May 3 15:46:50 localhost systemd: Starting Multi-User System. May 3 15:46:50 localhost systemd: Reached target Graphical Interface. May 3 15:46:50 localhost systemd: Starting Graphical Interface. May 3 15:46:50 localhost systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. May 3 15:46:50 localhost systemd: Starting Stop Read-Ahead Data Collection 10s After Completed Startup. May 3 15:46:50 localhost systemd: Starting Update UTMP about System Runlevel Changes... May 3 15:46:50 localhost systemd: Started Update UTMP about System Runlevel Changes. May 3 15:46:50 localhost systemd: Startup finished in 680ms (kernel) + 3.624s (initrd) + 36.242s (userspace) = 40.547s. May 3 15:46:51 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:51 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:51 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:51 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:51 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:51 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:51 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:51 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:51 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:51 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:51 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:51 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:54 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:46:54 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:46:57 localhost setroubleshoot: SELinux is preventing unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 293c7286-1da2-4b6c-884f-f8bb54f8f2e4 May 3 15:46:57 localhost python: SELinux is preventing unix_chkpwd from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that unix_chkpwd should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd#012# semodule -i my-unixchkpwd.pp#012 May 3 15:46:58 localhost setroubleshoot: SELinux is preventing unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 293c7286-1da2-4b6c-884f-f8bb54f8f2e4 May 3 15:46:58 localhost python: SELinux is preventing unix_chkpwd from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that unix_chkpwd should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd#012# semodule -i my-unixchkpwd.pp#012 May 3 15:46:58 localhost setroubleshoot: SELinux is preventing unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 293c7286-1da2-4b6c-884f-f8bb54f8f2e4 May 3 15:46:58 localhost python: SELinux is preventing unix_chkpwd from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that unix_chkpwd should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd#012# semodule -i my-unixchkpwd.pp#012 May 3 15:46:58 localhost systemd: Created slice User Slice of root. May 3 15:46:58 localhost systemd: Starting User Slice of root. May 3 15:46:58 localhost systemd-logind: New session 1 of user root. May 3 15:46:58 localhost systemd: Started Session 1 of user root. May 3 15:46:58 localhost systemd: Starting Session 1 of user root. May 3 15:47:01 localhost gnome-session-binary[1574]: WARNING: Lost name on bus: org.gnome.SessionManager May 3 15:47:01 localhost gnome-session: gnome-session-binary[1574]: WARNING: Lost name on bus: org.gnome.SessionManager May 3 15:47:01 localhost journal: Error releasing name org.gnome.SettingsDaemon: The connection is closed May 3 15:47:01 localhost journal: Invalid id 5 passed to g_bus_unown_name() May 3 15:47:01 localhost kernel: fuse init (API version 7.26) May 3 15:47:01 localhost systemd: Mounting FUSE Control File System... May 3 15:47:01 localhost systemd: Mounted FUSE Control File System. May 3 15:47:02 localhost setroubleshoot: SELinux is preventing /usr/libexec/gdm-session-worker from create access on the directory gdm. For complete SELinux messages run: sealert -l 20c05753-dff0-445e-ad49-c540a5dab921 May 3 15:47:02 localhost python: SELinux is preventing /usr/libexec/gdm-session-worker from create access on the directory gdm.#012#012***** Plugin catchall_boolean (89.3 confidence) suggests ******************#012#012If you want to allow polyinstantiation to enabled#012Then you must tell SELinux about this by enabling the 'polyinstantiation_enabled' boolean.#012#012Do#012setsebool -P polyinstantiation_enabled 1#012#012***** Plugin catchall (11.6 confidence) suggests **************************#012#012If you believe that gdm-session-worker should be allowed create access on the gdm directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor#012# semodule -i my-gdmsessionwor.pp#012 May 3 15:47:02 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:02 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:02 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:02 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:02 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:02 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:02 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:02 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:02 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:02 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:02 localhost gnome-session: generating cookie with syscall May 3 15:47:02 localhost gnome-session: generating cookie with syscall May 3 15:47:02 localhost gnome-session: generating cookie with syscall May 3 15:47:02 localhost gnome-session: generating cookie with syscall May 3 15:47:02 localhost gnome-keyring-ssh.desktop: SSH_AUTH_SOCK=/run/user/0/keyring/ssh May 3 15:47:03 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:47:03 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:47:03 localhost journal: JS WARNING: [resource:///org/gnome/shell/ui/extensionSystem.js 301]: octal literals and octal escape sequences are deprecated May 3 15:47:03 localhost journal: JS WARNING: [resource:///org/gnome/shell/gdm/loginDialog.js 1027]: anonymous function does not always return a value May 3 15:47:03 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' May 3 15:47:03 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' May 3 15:47:03 localhost systemd: Starting Location Lookup Service... May 3 15:47:03 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.GeoClue2' May 3 15:47:03 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.GeoClue2' May 3 15:47:03 localhost systemd: Started Location Lookup Service. May 3 15:47:03 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:03 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:03 localhost setroubleshoot: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability. For complete SELinux messages run: sealert -l 9a79ce45-15dd-4eb0-9ade-a207a2c13460 May 3 15:47:03 localhost python: SELinux is preventing /usr/libexec/accounts-daemon from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that accounts-daemon should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon#012# semodule -i my-accountsdaemon.pp#012 May 3 15:47:03 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' May 3 15:47:03 localhost dbus[806]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' May 3 15:47:03 localhost systemd: Starting Disk Manager... May 3 15:47:03 localhost udisksd[2088]: udisks daemon version 2.1.2 starting May 3 15:47:04 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.freedesktop.UDisks2' May 3 15:47:04 localhost dbus[806]: [system] Successfully activated service 'org.freedesktop.UDisks2' May 3 15:47:04 localhost udisksd[2088]: Acquired the name org.freedesktop.UDisks2 on the system message bus May 3 15:47:04 localhost systemd: Started Disk Manager. May 3 15:47:05 localhost spice-vdagent[2149]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 May 3 15:47:05 localhost gnome-session: gnome-session-binary[1797]: WARNING: App 'spice-vdagent.desktop' exited with code 1 May 3 15:47:05 localhost gnome-session-binary[1797]: WARNING: App 'spice-vdagent.desktop' exited with code 1 May 3 15:47:05 localhost pulseaudio.desktop: W: [pulseaudio] main.c: This program is not intended to be run as root (unless --system is specified). May 3 15:47:06 localhost journal: JS WARNING: [/usr/share/gnome-shell/extensions/apps-menu@gnome-shell-extensions.gcampax.github.com/extension.js 367]: octal literals and octal escape sequences are deprecated May 3 15:47:06 localhost journal: JS WARNING: [/usr/share/gnome-shell/extensions/apps-menu@gnome-shell-extensions.gcampax.github.com/extension.js 367]: octal literals and octal escape sequences are deprecated May 3 15:47:06 localhost journal: JS WARNING: [/usr/share/gnome-shell/extensions/apps-menu@gnome-shell-extensions.gcampax.github.com/extension.js 367]: octal literals and octal escape sequences are deprecated May 3 15:47:06 localhost dbus-daemon: dbus[806]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' May 3 15:47:06 localhost dbus[806]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' May 3 15:47:06 localhost journal: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory May 3 15:47:07 localhost tracker-store.desktop: (uint32 1,) May 3 15:47:07 localhost vmware-user.desktop: vmware-user: could not open /proc/fs/vmblock/dev May 3 15:47:07 localhost libcanberra-login-sound.desktop: Failed to play sound: File or data not found May 3 15:47:07 localhost imsettings-start.desktop: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._imsettings_2derror_2dquark.Code5: Current desktop isn't targeted by IMSettings. May 3 15:47:07 localhost gnome-session-binary: Entering running state May 3 15:47:07 localhost gnome-shell: GNOME Shell started at Thu May 03 2018 15:47:05 GMT+0800 (CST) May 3 15:47:09 localhost journal: STACK_OP_ADD: window 0x1c00001 already in stack May 3 15:47:09 localhost journal: STACK_OP_ADD: window 0x1c00001 already in stack May 3 15:47:19 localhost journal: No devices in use, exit May 3 15:47:20 localhost systemd: Starting Stop Read-Ahead Data Collection... May 3 15:47:20 localhost systemd: Started Stop Read-Ahead Data Collection. May 3 15:47:21 localhost systemd-logind: Removed session c1. May 3 15:47:21 localhost systemd: Removed slice User Slice of gdm. May 3 15:47:21 localhost systemd: Stopping User Slice of gdm. May 3 15:47:21 localhost dbus-daemon: dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:47:21 localhost dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:47:21 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:47:21 localhost dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:47:21 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:21 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:21 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:21 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:21 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:21 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:22 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:22 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:24 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:24 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:31 localhost dbus-daemon: dbus[806]: [system] Failed to activate service 'org.bluez': timed out May 3 15:47:31 localhost dbus[806]: [system] Failed to activate service 'org.bluez': timed out May 3 15:47:31 localhost pulseaudio: GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. May 3 15:47:34 localhost setroubleshoot: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability. For complete SELinux messages run: sealert -l 55a3867c-e630-4dea-90a1-93984fa0116e May 3 15:47:34 localhost python: SELinux is preventing /usr/lib/systemd/systemd-logind from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that systemd-logind should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind#012# semodule -i my-systemdlogind.pp#012 May 3 15:47:45 localhost dbus-daemon: dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:47:45 localhost dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:47:45 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:47:45 localhost dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:47:45 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:47:45 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:56:32 localhost rsyslogd: imjournal: 121951 messages lost due to rate-limiting May 3 15:56:42 localhost dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:56:42 localhost dbus-daemon: dbus[806]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) May 3 15:56:43 localhost dbus-daemon: dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:56:43 localhost dbus[806]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' May 3 15:56:43 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:56:43 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:56:46 localhost setroubleshoot: SELinux is preventing /usr/bin/find from using the dac_read_search capability. For complete SELinux messages run: sealert -l b38ab664-99c0-4636-949e-6b358e712d77 May 3 15:56:46 localhost python: SELinux is preventing /usr/bin/find from using the dac_read_search capability.#012#012***** Plugin dac_override (91.4 confidence) suggests **********************#012#012If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system#012Then turn on full auditing to get path information about the offending file and generate the error again.#012Do#012#012Turn on full auditing#012# auditctl -w /etc/shadow -p w#012Try to recreate AVC. Then execute#012# ausearch -m avc -ts recent#012If you see PATH record check ownership/permissions on file, and fix it,#012otherwise report as a bugzilla.#012#012***** Plugin catchall (9.59 confidence) suggests **************************#012#012If you believe that find should have the dac_read_search capability by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'find' --raw | audit2allow -M my-find#012# semodule -i my-find.pp#012 May 3 15:56:47 localhost rsyslogd: imjournal: journal reloaded... [v8.24.0 try http://www.rsyslog.com/e/0 ]