Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1454811 Details for
Bug 1595041
firewalld fails to start at boot with kernel 4.17.2-200.fc28.x86_64
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Output of "journalctl -b --no-hostname" with hostnames and ip addresses replaced with kernel 4.16.16-300.fc28.x86_64
journalctl-b-no-hostname-firewalld-problem-4.16.16-300.fc28.x86_64.txt (text/plain), 446.11 KB, created by
Edgar Hoch
on 2018-06-26 21:29:20 UTC
(
hide
)
Description:
Output of "journalctl -b --no-hostname" with hostnames and ip addresses replaced with kernel 4.16.16-300.fc28.x86_64
Filename:
MIME Type:
Creator:
Edgar Hoch
Created:
2018-06-26 21:29:20 UTC
Size:
446.11 KB
patch
obsolete
>-- Logs begin at Mon 2018-06-25 13:46:50 CEST, end at Tue 2018-06-26 23:22:58 CEST. -- >Jun 26 23:15:53 kernel: Linux version 4.16.16-300.fc28.x86_64 (mockbuild@bkernel02.phx2.fedoraproject.org) (gcc version 8.1.1 20180502 (Red Hat 8.1.1-1) (GCC)) #1 SMP Sun Jun 17 03:02:42 UTC 2018 >Jun 26 23:15:53 kernel: Command line: BOOT_IMAGE=/vmlinuz-4.16.16-300.fc28.x86_64 root=/dev/mapper/system-root ro resume=/dev/mapper/system-swap rd.lvm.lv=system/root rd.lvm.lv=system/swap nomodeset rhgb quiet rd.shell=0 >Jun 26 23:15:53 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' >Jun 26 23:15:53 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' >Jun 26 23:15:53 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' >Jun 26 23:15:53 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 >Jun 26 23:15:53 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. >Jun 26 23:15:53 kernel: e820: BIOS-provided physical RAM map: >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009d3ff] usable >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x000000000009d400-0x000000000009ffff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000de6bafff] usable >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000de6bb000-0x00000000de7c7fff] ACPI NVS >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000de7c8000-0x00000000de8fefff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000de8ff000-0x00000000deb01fff] ACPI NVS >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000deb02000-0x00000000dee0dfff] usable >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000dee0e000-0x00000000dee13fff] ACPI NVS >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000dee14000-0x00000000dee1cfff] ACPI data >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000dee1d000-0x00000000def4ffff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000def50000-0x00000000def60fff] ACPI NVS >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000def61000-0x00000000def82fff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000def83000-0x00000000def83fff] usable >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000def84000-0x00000000def84fff] ACPI NVS >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000def85000-0x00000000defd1fff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000defd2000-0x00000000defdbfff] ACPI NVS >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000defdc000-0x00000000deff6fff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000deff7000-0x00000000deffffff] usable >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved >Jun 26 23:15:53 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000081fffffff] usable >Jun 26 23:15:53 kernel: NX (Execute Disable) protection: active >Jun 26 23:15:53 kernel: random: fast init done >Jun 26 23:15:53 kernel: SMBIOS 2.7 present. >Jun 26 23:15:53 kernel: DMI: System manufacturer System Product Name/P9X79 PRO, BIOS 0906 12/22/2011 >Jun 26 23:15:53 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved >Jun 26 23:15:53 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable >Jun 26 23:15:53 kernel: e820: last_pfn = 0x820000 max_arch_pfn = 0x400000000 >Jun 26 23:15:53 kernel: MTRR default type: uncachable >Jun 26 23:15:53 kernel: MTRR fixed ranges enabled: >Jun 26 23:15:53 kernel: 00000-9FFFF write-back >Jun 26 23:15:53 kernel: A0000-BFFFF uncachable >Jun 26 23:15:53 kernel: C0000-CFFFF write-protect >Jun 26 23:15:53 kernel: D0000-E7FFF uncachable >Jun 26 23:15:53 kernel: E8000-FFFFF write-protect >Jun 26 23:15:53 kernel: MTRR variable ranges enabled: >Jun 26 23:15:53 kernel: 0 base 000000000000 mask 3FF800000000 write-back >Jun 26 23:15:53 kernel: 1 base 000800000000 mask 3FFFE0000000 write-back >Jun 26 23:15:53 kernel: 2 base 0000DF800000 mask 3FFFFF800000 uncachable >Jun 26 23:15:53 kernel: 3 base 0000E0000000 mask 3FFFE0000000 uncachable >Jun 26 23:15:53 kernel: 4 disabled >Jun 26 23:15:53 kernel: 5 disabled >Jun 26 23:15:53 kernel: 6 disabled >Jun 26 23:15:53 kernel: 7 disabled >Jun 26 23:15:53 kernel: 8 disabled >Jun 26 23:15:53 kernel: 9 disabled >Jun 26 23:15:53 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT >Jun 26 23:15:53 kernel: e820: update [mem 0xdf800000-0xffffffff] usable ==> reserved >Jun 26 23:15:53 kernel: e820: last_pfn = 0xdf000 max_arch_pfn = 0x400000000 >Jun 26 23:15:53 kernel: found SMP MP-table at [mem 0x000fcff0-0x000fcfff] mapped at [ (ptrval)] >Jun 26 23:15:53 kernel: Base memory trampoline at [ (ptrval)] 97000 size 24576 >Jun 26 23:15:53 kernel: Using GB pages for direct mapping >Jun 26 23:15:53 kernel: BRK [0x6dfa80000, 0x6dfa80fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa81000, 0x6dfa81fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa82000, 0x6dfa82fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa83000, 0x6dfa83fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa84000, 0x6dfa84fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa85000, 0x6dfa85fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa86000, 0x6dfa86fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa87000, 0x6dfa87fff] PGTABLE >Jun 26 23:15:53 kernel: BRK [0x6dfa88000, 0x6dfa88fff] PGTABLE >Jun 26 23:15:53 kernel: RAMDISK: [mem 0x2f225000-0x3390afff] >Jun 26 23:15:53 kernel: ACPI: Early table checksum verification disabled >Jun 26 23:15:53 kernel: ACPI: RSDP 0x00000000000F0450 000024 (v02 ALASKA) >Jun 26 23:15:53 kernel: ACPI: XSDT 0x00000000DEE14068 00004C (v01 ALASKA A M I 01072009 AMI 00010013) >Jun 26 23:15:53 kernel: ACPI: FACP 0x00000000DEE1BF78 0000F4 (v04 ALASKA A M I 01072009 AMI 00010013) >Jun 26 23:15:53 kernel: ACPI: DSDT 0x00000000DEE14140 007E38 (v02 ALASKA A M I 00000006 INTL 20051117) >Jun 26 23:15:53 kernel: ACPI: FACS 0x00000000DEFD9F80 000040 >Jun 26 23:15:53 kernel: ACPI: APIC 0x00000000DEE1C070 0000BE (v03 ALASKA A M I 01072009 AMI 00010013) >Jun 26 23:15:53 kernel: ACPI: SSDT 0x00000000DEE1C130 0002AA (v01 AMICPU PROC 00000001 MSFT 03000001) >Jun 26 23:15:53 kernel: ACPI: MCFG 0x00000000DEE1C3E0 00003C (v01 ALASKA OEMMCFG. 01072009 MSFT 00000097) >Jun 26 23:15:53 kernel: ACPI: HPET 0x00000000DEE1C420 000038 (v01 ALASKA A M I 01072009 AMI. 00000004) >Jun 26 23:15:53 kernel: ACPI: Local APIC address 0xfee00000 >Jun 26 23:15:53 kernel: No NUMA configuration found >Jun 26 23:15:53 kernel: Faking a node at [mem 0x0000000000000000-0x000000081fffffff] >Jun 26 23:15:53 kernel: NODE_DATA(0) allocated [mem 0x81ffd5000-0x81fffffff] >Jun 26 23:15:53 kernel: tsc: Fast TSC calibration using PIT >Jun 26 23:15:53 kernel: Zone ranges: >Jun 26 23:15:53 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] >Jun 26 23:15:53 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] >Jun 26 23:15:53 kernel: Normal [mem 0x0000000100000000-0x000000081fffffff] >Jun 26 23:15:53 kernel: Device empty >Jun 26 23:15:53 kernel: Movable zone start for each node >Jun 26 23:15:53 kernel: Early memory node ranges >Jun 26 23:15:53 kernel: node 0: [mem 0x0000000000001000-0x000000000009cfff] >Jun 26 23:15:53 kernel: node 0: [mem 0x0000000000100000-0x00000000de6bafff] >Jun 26 23:15:53 kernel: node 0: [mem 0x00000000deb02000-0x00000000dee0dfff] >Jun 26 23:15:53 kernel: node 0: [mem 0x00000000def83000-0x00000000def83fff] >Jun 26 23:15:53 kernel: node 0: [mem 0x00000000deff7000-0x00000000deffffff] >Jun 26 23:15:53 kernel: node 0: [mem 0x0000000100000000-0x000000081fffffff] >Jun 26 23:15:53 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000081fffffff] >Jun 26 23:15:53 kernel: On node 0 totalpages: 8382829 >Jun 26 23:15:53 kernel: DMA zone: 64 pages used for memmap >Jun 26 23:15:53 kernel: DMA zone: 21 pages reserved >Jun 26 23:15:53 kernel: DMA zone: 3996 pages, LIFO batch:0 >Jun 26 23:15:53 kernel: DMA32 zone: 14184 pages used for memmap >Jun 26 23:15:53 kernel: DMA32 zone: 907729 pages, LIFO batch:31 >Jun 26 23:15:53 kernel: Normal zone: 116736 pages used for memmap >Jun 26 23:15:53 kernel: Normal zone: 7471104 pages, LIFO batch:31 >Jun 26 23:15:53 kernel: Reserved but unavailable: 100 pages >Jun 26 23:15:53 kernel: ACPI: PM-Timer IO Port: 0x408 >Jun 26 23:15:53 kernel: ACPI: Local APIC address 0xfee00000 >Jun 26 23:15:53 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) >Jun 26 23:15:53 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 >Jun 26 23:15:53 kernel: IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47 >Jun 26 23:15:53 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Jun 26 23:15:53 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Jun 26 23:15:53 kernel: ACPI: IRQ0 used by override. >Jun 26 23:15:53 kernel: ACPI: IRQ9 used by override. >Jun 26 23:15:53 kernel: Using ACPI (MADT) for SMP configuration information >Jun 26 23:15:53 kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 >Jun 26 23:15:53 kernel: smpboot: Allowing 12 CPUs, 0 hotplug CPUs >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0x0009d000-0x0009dfff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0x0009e000-0x0009ffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xde6bb000-0xde7c7fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xde7c8000-0xde8fefff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xde8ff000-0xdeb01fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdee0e000-0xdee13fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdee14000-0xdee1cfff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdee1d000-0xdef4ffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdef50000-0xdef60fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdef61000-0xdef82fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdef84000-0xdef84fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdef85000-0xdefd1fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdefd2000-0xdefdbfff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdefdc000-0xdeff6fff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xdf000000-0xdfffffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xe0000000-0xefffffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xf0000000-0xfed1bfff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xfed1c000-0xfed1ffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xfed20000-0xfeffffff] >Jun 26 23:15:53 kernel: PM: Registered nosave memory: [mem 0xff000000-0xffffffff] >Jun 26 23:15:53 kernel: e820: [mem 0xf0000000-0xfed1bfff] available for PCI devices >Jun 26 23:15:53 kernel: Booting paravirtualized kernel on bare hardware >Jun 26 23:15:53 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns >Jun 26 23:15:53 kernel: setup_percpu: NR_CPUS:1024 nr_cpumask_bits:12 nr_cpu_ids:12 nr_node_ids:1 >Jun 26 23:15:53 kernel: percpu: Embedded 45 pages/cpu @ (ptrval) s147456 r8192 d28672 u262144 >Jun 26 23:15:53 kernel: pcpu-alloc: s147456 r8192 d28672 u262144 alloc=1*2097152 >Jun 26 23:15:53 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 -- -- -- -- >Jun 26 23:15:53 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8251824 >Jun 26 23:15:53 kernel: Policy zone: Normal >Jun 26 23:15:53 kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-4.16.16-300.fc28.x86_64 root=/dev/mapper/system-root ro resume=/dev/mapper/system-swap rd.lvm.lv=system/root rd.lvm.lv=system/swap nomodeset rhgb quiet rd.shell=0 >Jun 26 23:15:53 kernel: Memory: 32838800K/33531316K available (12300K kernel code, 1567K rwdata, 3872K rodata, 2124K init, 1368K bss, 692516K reserved, 0K cma-reserved) >Jun 26 23:15:53 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=12, Nodes=1 >Jun 26 23:15:53 kernel: Kernel/User page tables isolation: enabled >Jun 26 23:15:53 kernel: ftrace: allocating 36447 entries in 143 pages >Jun 26 23:15:53 kernel: Hierarchical RCU implementation. >Jun 26 23:15:53 kernel: RCU restricting CPUs from NR_CPUS=1024 to nr_cpu_ids=12. >Jun 26 23:15:53 kernel: Tasks RCU enabled. >Jun 26 23:15:53 kernel: RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=12 >Jun 26 23:15:53 kernel: NR_IRQS: 65792, nr_irqs: 928, preallocated irqs: 16 >Jun 26 23:15:53 kernel: Offload RCU callbacks from CPUs: . >Jun 26 23:15:53 kernel: Console: colour VGA+ 80x25 >Jun 26 23:15:53 kernel: console [tty0] enabled >Jun 26 23:15:53 kernel: ACPI: Core revision 20180105 >Jun 26 23:15:53 kernel: ACPI: 2 ACPI AML tables successfully acquired and loaded >Jun 26 23:15:53 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns >Jun 26 23:15:53 kernel: hpet clockevent registered >Jun 26 23:15:53 kernel: APIC: Switch to symmetric I/O mode setup >Jun 26 23:15:53 kernel: x2apic: IRQ remapping doesn't support X2APIC mode >Jun 26 23:15:53 kernel: Switched APIC routing to physical flat. >Jun 26 23:15:53 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Jun 26 23:15:53 kernel: tsc: Fast TSC calibration using PIT >Jun 26 23:15:53 kernel: tsc: Detected 3301.755 MHz processor >Jun 26 23:15:53 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2f97c5e1186, max_idle_ns: 440795260081 ns >Jun 26 23:15:53 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6603.51 BogoMIPS (lpj=3301755) >Jun 26 23:15:53 kernel: pid_max: default: 32768 minimum: 301 >Jun 26 23:15:53 kernel: Security Framework initialized >Jun 26 23:15:53 kernel: Yama: becoming mindful. >Jun 26 23:15:53 kernel: SELinux: Initializing. >Jun 26 23:15:53 kernel: SELinux: Starting in permissive mode >Jun 26 23:15:53 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes) >Jun 26 23:15:53 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes) >Jun 26 23:15:53 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes) >Jun 26 23:15:53 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes) >Jun 26 23:15:53 kernel: CPU: Physical Processor ID: 0 >Jun 26 23:15:53 kernel: CPU: Processor Core ID: 0 >Jun 26 23:15:53 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' >Jun 26 23:15:53 kernel: ENERGY_PERF_BIAS: View and update with x86_energy_perf_policy(8) >Jun 26 23:15:53 kernel: mce: CPU supports 18 MCE banks >Jun 26 23:15:53 kernel: CPU0: Thermal monitoring enabled (TM1) >Jun 26 23:15:53 kernel: process: using mwait in idle threads >Jun 26 23:15:53 kernel: Last level iTLB entries: 4KB 512, 2MB 8, 4MB 8 >Jun 26 23:15:53 kernel: Last level dTLB entries: 4KB 512, 2MB 32, 4MB 32, 1GB 0 >Jun 26 23:15:53 kernel: Spectre V2 : Mitigation: Full generic retpoline >Jun 26 23:15:53 kernel: Speculative Store Bypass: Vulnerable >Jun 26 23:15:53 kernel: Freeing SMP alternatives memory: 36K >Jun 26 23:15:53 kernel: TSC deadline timer enabled >Jun 26 23:15:53 kernel: smpboot: CPU0: Intel(R) Core(TM) i7-3960X CPU @ 3.30GHz (family: 0x6, model: 0x2d, stepping: 0x6) >Jun 26 23:15:53 kernel: Performance Events: PEBS fmt1+, SandyBridge events, 16-deep LBR, full-width counters, Intel PMU driver. >Jun 26 23:15:53 kernel: core: PEBS disabled due to CPU errata, please upgrade microcode >Jun 26 23:15:53 kernel: ... version: 3 >Jun 26 23:15:53 kernel: ... bit width: 48 >Jun 26 23:15:53 kernel: ... generic registers: 4 >Jun 26 23:15:53 kernel: ... value mask: 0000ffffffffffff >Jun 26 23:15:53 kernel: ... max period: 00007fffffffffff >Jun 26 23:15:53 kernel: ... fixed-purpose events: 3 >Jun 26 23:15:53 kernel: ... event mask: 000000070000000f >Jun 26 23:15:53 kernel: Hierarchical SRCU implementation. >Jun 26 23:15:53 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. >Jun 26 23:15:53 kernel: smp: Bringing up secondary CPUs ... >Jun 26 23:15:53 kernel: x86: Booting SMP configuration: >Jun 26 23:15:53 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 >Jun 26 23:15:53 kernel: smp: Brought up 1 node, 12 CPUs >Jun 26 23:15:53 kernel: smpboot: Max logical packages: 1 >Jun 26 23:15:53 kernel: smpboot: Total of 12 processors activated (79242.12 BogoMIPS) >Jun 26 23:15:53 kernel: devtmpfs: initialized >Jun 26 23:15:53 kernel: x86/mm: Memory block size: 128MB >Jun 26 23:15:53 kernel: PM: Registering ACPI NVS region [mem 0xde6bb000-0xde7c7fff] (1101824 bytes) >Jun 26 23:15:53 kernel: PM: Registering ACPI NVS region [mem 0xde8ff000-0xdeb01fff] (2109440 bytes) >Jun 26 23:15:53 kernel: PM: Registering ACPI NVS region [mem 0xdee0e000-0xdee13fff] (24576 bytes) >Jun 26 23:15:53 kernel: PM: Registering ACPI NVS region [mem 0xdef50000-0xdef60fff] (69632 bytes) >Jun 26 23:15:53 kernel: PM: Registering ACPI NVS region [mem 0xdef84000-0xdef84fff] (4096 bytes) >Jun 26 23:15:53 kernel: PM: Registering ACPI NVS region [mem 0xdefd2000-0xdefdbfff] (40960 bytes) >Jun 26 23:15:53 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns >Jun 26 23:15:53 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes) >Jun 26 23:15:53 kernel: pinctrl core: initialized pinctrl subsystem >Jun 26 23:15:53 kernel: RTC time: 21:15:52, date: 06/26/18 >Jun 26 23:15:53 kernel: NET: Registered protocol family 16 >Jun 26 23:15:53 kernel: audit: initializing netlink subsys (disabled) >Jun 26 23:15:53 kernel: audit: type=2000 audit(1530047752.038:1): state=initialized audit_enabled=0 res=1 >Jun 26 23:15:53 kernel: cpuidle: using governor menu >Jun 26 23:15:53 kernel: ACPI: bus type PCI registered >Jun 26 23:15:53 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Jun 26 23:15:53 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) >Jun 26 23:15:53 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 >Jun 26 23:15:53 kernel: pmd_set_huge: Cannot satisfy [mem 0xe0000000-0xe0200000] with a huge-page mapping due to MTRR override. >Jun 26 23:15:53 kernel: PCI: Using configuration type 1 for base access >Jun 26 23:15:53 kernel: core: PMU erratum BJ122, BV98, HSD29 worked around, HT is on >Jun 26 23:15:53 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages >Jun 26 23:15:53 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages >Jun 26 23:15:53 kernel: cryptd: max_cpu_qlen set to 1000 >Jun 26 23:15:53 kernel: ACPI: Added _OSI(Module Device) >Jun 26 23:15:53 kernel: ACPI: Added _OSI(Processor Device) >Jun 26 23:15:53 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Jun 26 23:15:53 kernel: ACPI: Added _OSI(Processor Aggregator Device) >Jun 26 23:15:53 kernel: ACPI: Executed 1 blocks of module-level executable AML code >Jun 26 23:15:53 kernel: ACPI: Dynamic OEM Table Load: >Jun 26 23:15:53 kernel: ACPI: SSDT 0xFFFF948DBAC3D000 000B58 (v01 AMI IST 00000001 MSFT 03000001) >Jun 26 23:15:53 kernel: ACPI: Dynamic OEM Table Load: >Jun 26 23:15:53 kernel: ACPI: SSDT 0xFFFF948DBAC40800 0003CC (v01 AMI CST 00000001 MSFT 03000001) >Jun 26 23:15:53 kernel: ACPI: EC: EC started >Jun 26 23:15:53 kernel: ACPI: EC: interrupt blocked >Jun 26 23:15:53 kernel: ACPI: \_SB_.PCI0.SBRG.EC0_: Used as first EC >Jun 26 23:15:53 kernel: ACPI: \_SB_.PCI0.SBRG.EC0_: GPE=0x1e, EC_CMD/EC_SC=0x66, EC_DATA=0x62 >Jun 26 23:15:53 kernel: ACPI: \_SB_.PCI0.SBRG.EC0_: Used as boot DSDT EC to handle transactions >Jun 26 23:15:53 kernel: ACPI: Interpreter enabled >Jun 26 23:15:53 kernel: ACPI: (supports S0 S1 S3 S4 S5) >Jun 26 23:15:53 kernel: ACPI: Using IOAPIC for interrupt routing >Jun 26 23:15:53 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Jun 26 23:15:53 kernel: ACPI: Enabled 6 GPEs in block 00 to 3F >Jun 26 23:15:53 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) >Jun 26 23:15:53 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI] >Jun 26 23:15:53 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug AER] >Jun 26 23:15:53 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability] >Jun 26 23:15:53 kernel: PCI host bridge to bus 0000:00 >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x03af window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [io 0x03e0-0x0cf7 window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [io 0x03b0-0x03df window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000dffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [mem 0xe0000000-0xfbffffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] >Jun 26 23:15:53 kernel: pci 0000:00:00.0: [8086:3c00] type 00 class 0x060000 >Jun 26 23:15:53 kernel: pci 0000:00:00.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:01.0: [8086:3c02] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:02.0: [8086:3c04] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:02.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:03.0: [8086:3c08] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:03.0: enabling Extended Tags >Jun 26 23:15:53 kernel: pci 0000:00:03.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:05.0: [8086:3c28] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:00:05.2: [8086:3c2a] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:00:05.4: [8086:3c2c] type 00 class 0x080020 >Jun 26 23:15:53 kernel: pci 0000:00:05.4: reg 0x10: [mem 0xfb44a000-0xfb44afff] >Jun 26 23:15:53 kernel: pci 0000:00:11.0: [8086:1d3e] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:11.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:16.0: [8086:1d3a] type 00 class 0x078000 >Jun 26 23:15:53 kernel: pci 0000:00:16.0: reg 0x10: [mem 0xfb449000-0xfb44900f 64bit] >Jun 26 23:15:53 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:19.0: [8086:1503] type 00 class 0x020000 >Jun 26 23:15:53 kernel: pci 0000:00:19.0: reg 0x10: [mem 0xfb400000-0xfb41ffff] >Jun 26 23:15:53 kernel: pci 0000:00:19.0: reg 0x14: [mem 0xfb448000-0xfb448fff] >Jun 26 23:15:53 kernel: pci 0000:00:19.0: reg 0x18: [io 0xf040-0xf05f] >Jun 26 23:15:53 kernel: pci 0000:00:19.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1a.0: [8086:1d2d] type 00 class 0x0c0320 >Jun 26 23:15:53 kernel: pci 0000:00:1a.0: reg 0x10: [mem 0xfb447000-0xfb4473ff] >Jun 26 23:15:53 kernel: pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1b.0: [8086:1d20] type 00 class 0x040300 >Jun 26 23:15:53 kernel: pci 0000:00:1b.0: reg 0x10: [mem 0xfb420000-0xfb423fff 64bit] >Jun 26 23:15:53 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1c.0: [8086:1d10] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1c.2: [8086:1d14] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:1c.2: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1c.3: [8086:1d16] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: [8086:1d1e] type 01 class 0x060400 >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1d.0: [8086:1d26] type 00 class 0x0c0320 >Jun 26 23:15:53 kernel: pci 0000:00:1d.0: reg 0x10: [mem 0xfb446000-0xfb4463ff] >Jun 26 23:15:53 kernel: pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: [8086:244e] type 01 class 0x060401 >Jun 26 23:15:53 kernel: pci 0000:00:1f.0: [8086:1d41] type 00 class 0x060100 >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: [8086:1d02] type 00 class 0x010601 >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: reg 0x10: [io 0xf090-0xf097] >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: reg 0x14: [io 0xf080-0xf083] >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: reg 0x18: [io 0xf070-0xf077] >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: reg 0x1c: [io 0xf060-0xf063] >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xf020-0xf03f] >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfb445000-0xfb4457ff] >Jun 26 23:15:53 kernel: pci 0000:00:1f.2: PME# supported from D3hot >Jun 26 23:15:53 kernel: pci 0000:00:1f.3: [8086:1d22] type 00 class 0x0c0500 >Jun 26 23:15:53 kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xfb444000-0xfb4440ff 64bit] >Jun 26 23:15:53 kernel: pci 0000:00:1f.3: reg 0x20: [io 0xf000-0xf01f] >Jun 26 23:15:53 kernel: pci 0000:00:01.0: PCI bridge to [bus 03] >Jun 26 23:15:53 kernel: pci 0000:01:00.0: [10de:1080] type 00 class 0x030000 >Jun 26 23:15:53 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfa000000-0xfaffffff] >Jun 26 23:15:53 kernel: pci 0000:01:00.0: reg 0x14: [mem 0xf0000000-0xf7ffffff 64bit pref] >Jun 26 23:15:53 kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xf8000000-0xf9ffffff 64bit pref] >Jun 26 23:15:53 kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] >Jun 26 23:15:53 kernel: pci 0000:01:00.0: reg 0x30: [mem 0xfb000000-0xfb07ffff pref] >Jun 26 23:15:53 kernel: pci 0000:01:00.0: enabling Extended Tags >Jun 26 23:15:53 kernel: pci 0000:01:00.1: [10de:0e09] type 00 class 0x040300 >Jun 26 23:15:53 kernel: pci 0000:01:00.1: reg 0x10: [mem 0xfb080000-0xfb083fff] >Jun 26 23:15:53 kernel: pci 0000:01:00.1: enabling Extended Tags >Jun 26 23:15:53 kernel: pci 0000:00:02.0: PCI bridge to [bus 01] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: bridge window [io 0xe000-0xefff] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: bridge window [mem 0xfa000000-0xfb0fffff] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: bridge window [mem 0xf0000000-0xf9ffffff 64bit pref] >Jun 26 23:15:53 kernel: pci 0000:00:03.0: PCI bridge to [bus 02] >Jun 26 23:15:53 kernel: pci 0000:00:11.0: PCI bridge to [bus 04] >Jun 26 23:15:53 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] >Jun 26 23:15:53 kernel: pci 0000:06:00.0: [1b21:1042] type 00 class 0x0c0330 >Jun 26 23:15:53 kernel: pci 0000:06:00.0: reg 0x10: [mem 0xfb300000-0xfb307fff 64bit] >Jun 26 23:15:53 kernel: pci 0000:06:00.0: PME# supported from D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1c.2: PCI bridge to [bus 06] >Jun 26 23:15:53 kernel: pci 0000:00:1c.2: bridge window [mem 0xfb300000-0xfb3fffff] >Jun 26 23:15:53 kernel: pci 0000:07:00.0: [1b21:1042] type 00 class 0x0c0330 >Jun 26 23:15:53 kernel: pci 0000:07:00.0: reg 0x10: [mem 0xfb200000-0xfb207fff 64bit] >Jun 26 23:15:53 kernel: pci 0000:07:00.0: PME# supported from D3hot D3cold >Jun 26 23:15:53 kernel: pci 0000:00:1c.3: PCI bridge to [bus 07] >Jun 26 23:15:53 kernel: pci 0000:00:1c.3: bridge window [mem 0xfb200000-0xfb2fffff] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: [1b4b:9130] type 00 class 0x010601 >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x10: [io 0xd040-0xd047] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x14: [io 0xd030-0xd033] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x18: [io 0xd020-0xd027] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x1c: [io 0xd010-0xd013] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x20: [io 0xd000-0xd00f] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x24: [mem 0xfb110000-0xfb1107ff] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: reg 0x30: [mem 0xfb100000-0xfb10ffff pref] >Jun 26 23:15:53 kernel: pci 0000:08:00.0: Enabling fixed DMA alias to 00.1 >Jun 26 23:15:53 kernel: pci 0000:08:00.0: PME# supported from D3hot >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: PCI bridge to [bus 08] >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: bridge window [io 0xd000-0xdfff] >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: bridge window [mem 0xfb100000-0xfb1fffff] >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: PCI bridge to [bus 09] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [io 0x0000-0x03af window] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [io 0x03e0-0x0cf7 window] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [io 0x03b0-0x03df window] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [io 0x0d00-0xffff window] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [mem 0x000c0000-0x000dffff window] (subtractive decode) >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: bridge window [mem 0xe0000000-0xfbffffff window] (subtractive decode) >Jun 26 23:15:53 kernel: ACPI: PCI Root Bridge [UNC0] (domain 0000 [bus ff]) >Jun 26 23:15:53 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI] >Jun 26 23:15:53 kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Jun 26 23:15:53 kernel: PCI host bridge to bus 0000:ff >Jun 26 23:15:53 kernel: pci_bus 0000:ff: root bus resource [bus ff] >Jun 26 23:15:53 kernel: pci 0000:ff:08.0: [8086:3c80] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:08.3: [8086:3c83] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:08.4: [8086:3c84] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:09.0: [8086:3c90] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:09.3: [8086:3c93] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:09.4: [8086:3c94] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0a.0: [8086:3cc0] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0a.1: [8086:3cc1] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0a.2: [8086:3cc2] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0a.3: [8086:3cd0] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0b.0: [8086:3ce0] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0b.3: [8086:3ce3] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0c.0: [8086:3ce8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0c.1: [8086:3ce8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0c.2: [8086:3ce8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0c.6: [8086:3cf4] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0c.7: [8086:3cf6] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0d.0: [8086:3ce8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0d.1: [8086:3ce8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0d.2: [8086:3ce8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0d.6: [8086:3cf5] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0e.0: [8086:3ca0] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0e.1: [8086:3c46] type 00 class 0x110100 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.0: [8086:3ca8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.1: [8086:3c71] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.2: [8086:3caa] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.3: [8086:3cab] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.4: [8086:3cac] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.5: [8086:3cad] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:0f.6: [8086:3cae] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.0: [8086:3cb0] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.1: [8086:3cb1] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.2: [8086:3cb2] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.3: [8086:3cb3] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.4: [8086:3cb4] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.5: [8086:3cb5] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.6: [8086:3cb6] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:10.7: [8086:3cb7] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:11.0: [8086:3cb8] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:13.0: [8086:3ce4] type 00 class 0x088000 >Jun 26 23:15:53 kernel: pci 0000:ff:13.1: [8086:3c43] type 00 class 0x110100 >Jun 26 23:15:53 kernel: pci 0000:ff:13.4: [8086:3ce6] type 00 class 0x110100 >Jun 26 23:15:53 kernel: pci 0000:ff:13.5: [8086:3c44] type 00 class 0x110100 >Jun 26 23:15:53 kernel: pci 0000:ff:13.6: [8086:3c45] type 00 class 0x088000 >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 7 10 *11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 7 *10 11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 *5 6 10 11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs *3 4 5 6 10 11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 7 10 *11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 7 10 11 12 14 15) *0 >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 3 *4 5 6 7 10 11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 *7 10 11 12 14 15) >Jun 26 23:15:53 kernel: ACPI: EC: interrupt unblocked >Jun 26 23:15:53 kernel: ACPI: EC: event unblocked >Jun 26 23:15:53 kernel: ACPI: \_SB_.PCI0.SBRG.EC0_: GPE=0x1e, EC_CMD/EC_SC=0x66, EC_DATA=0x62 >Jun 26 23:15:53 kernel: ACPI: \_SB_.PCI0.SBRG.EC0_: Used as boot DSDT EC to handle transactions and events >Jun 26 23:15:53 kernel: pci 0000:01:00.0: vgaarb: setting as boot VGA device >Jun 26 23:15:53 kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none >Jun 26 23:15:53 kernel: pci 0000:01:00.0: vgaarb: bridge control possible >Jun 26 23:15:53 kernel: vgaarb: loaded >Jun 26 23:15:53 kernel: SCSI subsystem initialized >Jun 26 23:15:53 kernel: libata version 3.00 loaded. >Jun 26 23:15:53 kernel: ACPI: bus type USB registered >Jun 26 23:15:53 kernel: usbcore: registered new interface driver usbfs >Jun 26 23:15:53 kernel: usbcore: registered new interface driver hub >Jun 26 23:15:53 kernel: usbcore: registered new device driver usb >Jun 26 23:15:53 kernel: EDAC MC: Ver: 3.0.0 >Jun 26 23:15:53 kernel: PCI: Using ACPI for IRQ routing >Jun 26 23:15:53 kernel: PCI: pci_cache_line_size set to 64 bytes >Jun 26 23:15:53 kernel: e820: reserve RAM buffer [mem 0x0009d400-0x0009ffff] >Jun 26 23:15:53 kernel: e820: reserve RAM buffer [mem 0xde6bb000-0xdfffffff] >Jun 26 23:15:53 kernel: e820: reserve RAM buffer [mem 0xdee0e000-0xdfffffff] >Jun 26 23:15:53 kernel: e820: reserve RAM buffer [mem 0xdef84000-0xdfffffff] >Jun 26 23:15:53 kernel: e820: reserve RAM buffer [mem 0xdf000000-0xdfffffff] >Jun 26 23:15:53 kernel: NetLabel: Initializing >Jun 26 23:15:53 kernel: NetLabel: domain hash size = 128 >Jun 26 23:15:53 kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO >Jun 26 23:15:53 kernel: NetLabel: unlabeled traffic allowed by default >Jun 26 23:15:53 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 >Jun 26 23:15:53 kernel: hpet0: 8 comparators, 64-bit 14.318180 MHz counter >Jun 26 23:15:53 kernel: clocksource: Switched to clocksource tsc-early >Jun 26 23:15:53 kernel: VFS: Disk quotas dquot_6.6.0 >Jun 26 23:15:53 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Jun 26 23:15:53 kernel: pnp: PnP ACPI init >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfc000000-0xfcffffff] has been reserved >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfd000000-0xfdffffff] has been reserved >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfe000000-0xfeafffff] has been reserved >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfbfff000-0xfbffffff] has been reserved >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfeb00000-0xfebfffff] has been reserved >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfed00400-0xfed3ffff] could not be reserved >Jun 26 23:15:53 kernel: system 00:00: [mem 0xfed45000-0xfedfffff] has been reserved >Jun 26 23:15:53 kernel: system 00:00: Plug and Play ACPI device, IDs PNP0c01 (active) >Jun 26 23:15:53 kernel: system 00:01: [io 0x0290-0x029f] has been reserved >Jun 26 23:15:53 kernel: system 00:01: Plug and Play ACPI device, IDs PNP0c02 (active) >Jun 26 23:15:53 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0b00 (active) >Jun 26 23:15:53 kernel: system 00:03: [io 0x04d0-0x04d1] has been reserved >Jun 26 23:15:53 kernel: system 00:03: Plug and Play ACPI device, IDs PNP0c02 (active) >Jun 26 23:15:53 kernel: system 00:04: [io 0x0400-0x0453] has been reserved >Jun 26 23:15:53 kernel: system 00:04: [io 0x0458-0x047f] has been reserved >Jun 26 23:15:53 kernel: system 00:04: [io 0x1180-0x119f] has been reserved >Jun 26 23:15:53 kernel: system 00:04: [io 0x0500-0x057f] has been reserved >Jun 26 23:15:53 kernel: system 00:04: [mem 0xfed1c000-0xfed1ffff] has been reserved >Jun 26 23:15:53 kernel: system 00:04: [mem 0xfec00000-0xfecfffff] could not be reserved >Jun 26 23:15:53 kernel: system 00:04: [mem 0xfed08000-0xfed08fff] has been reserved >Jun 26 23:15:53 kernel: system 00:04: [mem 0xff000000-0xffffffff] has been reserved >Jun 26 23:15:53 kernel: system 00:04: Plug and Play ACPI device, IDs PNP0c01 (active) >Jun 26 23:15:53 kernel: system 00:05: [io 0x0454-0x0457] has been reserved >Jun 26 23:15:53 kernel: system 00:05: Plug and Play ACPI device, IDs INT3f0d PNP0c02 (active) >Jun 26 23:15:53 kernel: pnp: PnP ACPI: found 6 devices >Jun 26 23:15:53 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns >Jun 26 23:15:53 kernel: pci 0000:00:01.0: PCI bridge to [bus 03] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: PCI bridge to [bus 01] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: bridge window [io 0xe000-0xefff] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: bridge window [mem 0xfa000000-0xfb0fffff] >Jun 26 23:15:53 kernel: pci 0000:00:02.0: bridge window [mem 0xf0000000-0xf9ffffff 64bit pref] >Jun 26 23:15:53 kernel: pci 0000:00:03.0: PCI bridge to [bus 02] >Jun 26 23:15:53 kernel: pci 0000:00:11.0: PCI bridge to [bus 04] >Jun 26 23:15:53 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] >Jun 26 23:15:53 kernel: pci 0000:00:1c.2: PCI bridge to [bus 06] >Jun 26 23:15:53 kernel: pci 0000:00:1c.2: bridge window [mem 0xfb300000-0xfb3fffff] >Jun 26 23:15:53 kernel: pci 0000:00:1c.3: PCI bridge to [bus 07] >Jun 26 23:15:53 kernel: pci 0000:00:1c.3: bridge window [mem 0xfb200000-0xfb2fffff] >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: PCI bridge to [bus 08] >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: bridge window [io 0xd000-0xdfff] >Jun 26 23:15:53 kernel: pci 0000:00:1c.7: bridge window [mem 0xfb100000-0xfb1fffff] >Jun 26 23:15:53 kernel: pci 0000:00:1e.0: PCI bridge to [bus 09] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x03af window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 5 [io 0x03e0-0x0cf7 window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 6 [io 0x03b0-0x03df window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 7 [io 0x0d00-0xffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 8 [mem 0x000a0000-0x000bffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 9 [mem 0x000c0000-0x000dffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:00: resource 10 [mem 0xe0000000-0xfbffffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] >Jun 26 23:15:53 kernel: pci_bus 0000:01: resource 1 [mem 0xfa000000-0xfb0fffff] >Jun 26 23:15:53 kernel: pci_bus 0000:01: resource 2 [mem 0xf0000000-0xf9ffffff 64bit pref] >Jun 26 23:15:53 kernel: pci_bus 0000:06: resource 1 [mem 0xfb300000-0xfb3fffff] >Jun 26 23:15:53 kernel: pci_bus 0000:07: resource 1 [mem 0xfb200000-0xfb2fffff] >Jun 26 23:15:53 kernel: pci_bus 0000:08: resource 0 [io 0xd000-0xdfff] >Jun 26 23:15:53 kernel: pci_bus 0000:08: resource 1 [mem 0xfb100000-0xfb1fffff] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 4 [io 0x0000-0x03af window] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 5 [io 0x03e0-0x0cf7 window] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 6 [io 0x03b0-0x03df window] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 7 [io 0x0d00-0xffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 8 [mem 0x000a0000-0x000bffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 9 [mem 0x000c0000-0x000dffff window] >Jun 26 23:15:53 kernel: pci_bus 0000:09: resource 10 [mem 0xe0000000-0xfbffffff window] >Jun 26 23:15:53 kernel: NET: Registered protocol family 2 >Jun 26 23:15:53 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes) >Jun 26 23:15:53 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes) >Jun 26 23:15:53 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes) >Jun 26 23:15:53 kernel: TCP: Hash tables configured (established 262144 bind 65536) >Jun 26 23:15:53 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes) >Jun 26 23:15:53 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes) >Jun 26 23:15:53 kernel: NET: Registered protocol family 1 >Jun 26 23:15:53 kernel: pci 0000:01:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] >Jun 26 23:15:53 kernel: PCI: CLS 64 bytes, default 64 >Jun 26 23:15:53 kernel: Unpacking initramfs... >Jun 26 23:15:53 kernel: Freeing initrd memory: 72600K >Jun 26 23:15:53 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Jun 26 23:15:53 kernel: software IO TLB [mem 0xda6bb000-0xde6bb000] (64MB) mapped at [000000007be3abf7-0000000057faa2bf] >Jun 26 23:15:53 kernel: Initialise system trusted keyrings >Jun 26 23:15:53 kernel: Key type blacklist registered >Jun 26 23:15:53 kernel: workingset: timestamp_bits=36 max_order=23 bucket_order=0 >Jun 26 23:15:53 kernel: zbud: loaded >Jun 26 23:15:53 kernel: SELinux: Registering netfilter hooks >Jun 26 23:15:53 kernel: NET: Registered protocol family 38 >Jun 26 23:15:53 kernel: Key type asymmetric registered >Jun 26 23:15:53 kernel: Asymmetric key parser 'x509' registered >Jun 26 23:15:53 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247) >Jun 26 23:15:53 kernel: io scheduler noop registered >Jun 26 23:15:53 kernel: io scheduler deadline registered >Jun 26 23:15:53 kernel: io scheduler cfq registered (default) >Jun 26 23:15:53 kernel: io scheduler mq-deadline registered >Jun 26 23:15:53 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE >Jun 26 23:15:53 kernel: pcieport 0000:00:01.0: Signaling PME with IRQ 25 >Jun 26 23:15:53 kernel: pcieport 0000:00:02.0: Signaling PME with IRQ 27 >Jun 26 23:15:53 kernel: pcieport 0000:00:03.0: Signaling PME with IRQ 29 >Jun 26 23:15:53 kernel: pcieport 0000:00:11.0: Signaling PME with IRQ 30 >Jun 26 23:15:53 kernel: pcieport 0000:00:1c.0: Signaling PME with IRQ 31 >Jun 26 23:15:53 kernel: pcieport 0000:00:1c.2: Signaling PME with IRQ 32 >Jun 26 23:15:53 kernel: pcieport 0000:00:1c.3: Signaling PME with IRQ 33 >Jun 26 23:15:53 kernel: pcieport 0000:00:1c.7: Signaling PME with IRQ 34 >Jun 26 23:15:53 kernel: intel_idle: MWAIT substates: 0x21120 >Jun 26 23:15:53 kernel: intel_idle: v0.4.1 model 0x2D >Jun 26 23:15:53 kernel: intel_idle: lapic_timer_reliable_states 0xffffffff >Jun 26 23:15:53 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 >Jun 26 23:15:53 kernel: ACPI: Power Button [PWRB] >Jun 26 23:15:53 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 >Jun 26 23:15:53 kernel: ACPI: Power Button [PWRF] >Jun 26 23:15:53 kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled >Jun 26 23:15:53 kernel: Non-volatile memory driver v1.3 >Jun 26 23:15:53 kernel: Linux agpgart interface v0.103 >Jun 26 23:15:53 kernel: ahci 0000:00:1f.2: version 3.0 >Jun 26 23:15:53 kernel: ahci 0000:00:1f.2: SSS flag set, parallel bus scan disabled >Jun 26 23:15:53 kernel: ahci 0000:00:1f.2: AHCI 0001.0300 32 slots 6 ports 6 Gbps 0x1 impl SATA mode >Jun 26 23:15:53 kernel: ahci 0000:00:1f.2: flags: 64bit ncq sntf stag pm led clo pio slum part ems apst >Jun 26 23:15:53 kernel: scsi host0: ahci >Jun 26 23:15:53 kernel: scsi host1: ahci >Jun 26 23:15:53 kernel: scsi host2: ahci >Jun 26 23:15:53 kernel: scsi host3: ahci >Jun 26 23:15:53 kernel: scsi host4: ahci >Jun 26 23:15:53 kernel: scsi host5: ahci >Jun 26 23:15:53 kernel: ata1: SATA max UDMA/133 abar m2048@0xfb445000 port 0xfb445100 irq 35 >Jun 26 23:15:53 kernel: ata2: DUMMY >Jun 26 23:15:53 kernel: ata3: DUMMY >Jun 26 23:15:53 kernel: ata4: DUMMY >Jun 26 23:15:53 kernel: ata5: DUMMY >Jun 26 23:15:53 kernel: ata6: DUMMY >Jun 26 23:15:53 kernel: ahci 0000:08:00.0: AHCI 0001.0200 32 slots 8 ports 6 Gbps 0xff impl SATA mode >Jun 26 23:15:53 kernel: ahci 0000:08:00.0: flags: 64bit ncq pio >Jun 26 23:15:53 kernel: scsi host6: ahci >Jun 26 23:15:53 kernel: scsi host7: ahci >Jun 26 23:15:53 kernel: scsi host8: ahci >Jun 26 23:15:53 kernel: scsi host9: ahci >Jun 26 23:15:53 kernel: scsi host10: ahci >Jun 26 23:15:53 kernel: scsi host11: ahci >Jun 26 23:15:53 kernel: scsi host12: ahci >Jun 26 23:15:53 kernel: scsi host13: ahci >Jun 26 23:15:53 kernel: ata7: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110100 irq 36 >Jun 26 23:15:53 kernel: ata8: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110180 irq 36 >Jun 26 23:15:53 kernel: ata9: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110200 irq 36 >Jun 26 23:15:53 kernel: ata10: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110280 irq 36 >Jun 26 23:15:53 kernel: ata11: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110300 irq 36 >Jun 26 23:15:53 kernel: ata12: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110380 irq 36 >Jun 26 23:15:53 kernel: ata13: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110400 irq 36 >Jun 26 23:15:53 kernel: ata14: SATA max UDMA/133 abar m2048@0xfb110000 port 0xfb110480 irq 36 >Jun 26 23:15:53 kernel: libphy: Fixed MDIO Bus: probed >Jun 26 23:15:53 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Jun 26 23:15:53 kernel: ehci-pci: EHCI PCI platform driver >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1a.0: EHCI Host Controller >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 1 >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1a.0: debug port 2 >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1a.0: cache line size of 64 is not supported >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1a.0: irq 23, io mem 0xfb447000 >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00 >Jun 26 23:15:53 kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 >Jun 26 23:15:53 kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jun 26 23:15:53 kernel: usb usb1: Product: EHCI Host Controller >Jun 26 23:15:53 kernel: usb usb1: Manufacturer: Linux 4.16.16-300.fc28.x86_64 ehci_hcd >Jun 26 23:15:53 kernel: usb usb1: SerialNumber: 0000:00:1a.0 >Jun 26 23:15:53 kernel: hub 1-0:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 1-0:1.0: 2 ports detected >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1d.0: EHCI Host Controller >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 2 >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1d.0: debug port 2 >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1d.0: cache line size of 64 is not supported >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1d.0: irq 23, io mem 0xfb446000 >Jun 26 23:15:53 kernel: ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00 >Jun 26 23:15:53 kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0002 >Jun 26 23:15:53 kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jun 26 23:15:53 kernel: usb usb2: Product: EHCI Host Controller >Jun 26 23:15:53 kernel: usb usb2: Manufacturer: Linux 4.16.16-300.fc28.x86_64 ehci_hcd >Jun 26 23:15:53 kernel: usb usb2: SerialNumber: 0000:00:1d.0 >Jun 26 23:15:53 kernel: hub 2-0:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 2-0:1.0: 2 ports detected >Jun 26 23:15:53 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Jun 26 23:15:53 kernel: ohci-pci: OHCI PCI platform driver >Jun 26 23:15:53 kernel: uhci_hcd: USB Universal Host Controller Interface driver >Jun 26 23:15:53 kernel: xhci_hcd 0000:06:00.0: xHCI Host Controller >Jun 26 23:15:53 kernel: xhci_hcd 0000:06:00.0: new USB bus registered, assigned bus number 3 >Jun 26 23:15:53 kernel: xhci_hcd 0000:06:00.0: hcc params 0x0200f180 hci version 0x96 quirks 0x00080000 >Jun 26 23:15:53 kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002 >Jun 26 23:15:53 kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jun 26 23:15:53 kernel: usb usb3: Product: xHCI Host Controller >Jun 26 23:15:53 kernel: usb usb3: Manufacturer: Linux 4.16.16-300.fc28.x86_64 xhci-hcd >Jun 26 23:15:53 kernel: usb usb3: SerialNumber: 0000:06:00.0 >Jun 26 23:15:53 kernel: hub 3-0:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 3-0:1.0: 2 ports detected >Jun 26 23:15:53 kernel: xhci_hcd 0000:06:00.0: xHCI Host Controller >Jun 26 23:15:53 kernel: xhci_hcd 0000:06:00.0: new USB bus registered, assigned bus number 4 >Jun 26 23:15:53 kernel: xhci_hcd 0000:06:00.0: Host supports USB 3.0 SuperSpeed >Jun 26 23:15:53 kernel: usb usb4: We don't know the algorithms for LPM for this host, disabling LPM. >Jun 26 23:15:53 kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003 >Jun 26 23:15:53 kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jun 26 23:15:53 kernel: usb usb4: Product: xHCI Host Controller >Jun 26 23:15:53 kernel: usb usb4: Manufacturer: Linux 4.16.16-300.fc28.x86_64 xhci-hcd >Jun 26 23:15:53 kernel: usb usb4: SerialNumber: 0000:06:00.0 >Jun 26 23:15:53 kernel: hub 4-0:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 4-0:1.0: 2 ports detected >Jun 26 23:15:53 kernel: xhci_hcd 0000:07:00.0: xHCI Host Controller >Jun 26 23:15:53 kernel: xhci_hcd 0000:07:00.0: new USB bus registered, assigned bus number 5 >Jun 26 23:15:53 kernel: xhci_hcd 0000:07:00.0: hcc params 0x0200f180 hci version 0x96 quirks 0x00080000 >Jun 26 23:15:53 kernel: usb usb5: New USB device found, idVendor=1d6b, idProduct=0002 >Jun 26 23:15:53 kernel: usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jun 26 23:15:53 kernel: usb usb5: Product: xHCI Host Controller >Jun 26 23:15:53 kernel: usb usb5: Manufacturer: Linux 4.16.16-300.fc28.x86_64 xhci-hcd >Jun 26 23:15:53 kernel: usb usb5: SerialNumber: 0000:07:00.0 >Jun 26 23:15:53 kernel: hub 5-0:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 5-0:1.0: 2 ports detected >Jun 26 23:15:53 kernel: xhci_hcd 0000:07:00.0: xHCI Host Controller >Jun 26 23:15:53 kernel: xhci_hcd 0000:07:00.0: new USB bus registered, assigned bus number 6 >Jun 26 23:15:53 kernel: xhci_hcd 0000:07:00.0: Host supports USB 3.0 SuperSpeed >Jun 26 23:15:53 kernel: usb usb6: We don't know the algorithms for LPM for this host, disabling LPM. >Jun 26 23:15:53 kernel: usb usb6: New USB device found, idVendor=1d6b, idProduct=0003 >Jun 26 23:15:53 kernel: usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jun 26 23:15:53 kernel: usb usb6: Product: xHCI Host Controller >Jun 26 23:15:53 kernel: usb usb6: Manufacturer: Linux 4.16.16-300.fc28.x86_64 xhci-hcd >Jun 26 23:15:53 kernel: usb usb6: SerialNumber: 0000:07:00.0 >Jun 26 23:15:53 kernel: hub 6-0:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 6-0:1.0: 2 ports detected >Jun 26 23:15:53 kernel: usbcore: registered new interface driver usbserial_generic >Jun 26 23:15:53 kernel: usbserial: USB Serial support registered for generic >Jun 26 23:15:53 kernel: i8042: PNP: No PS/2 controller found. >Jun 26 23:15:53 kernel: mousedev: PS/2 mouse device common for all mice >Jun 26 23:15:53 kernel: rtc_cmos 00:02: RTC can wake from S4 >Jun 26 23:15:53 kernel: rtc_cmos 00:02: rtc core: registered rtc_cmos as rtc0 >Jun 26 23:15:53 kernel: rtc_cmos 00:02: alarms up to one month, y3k, 114 bytes nvram, hpet irqs >Jun 26 23:15:53 kernel: device-mapper: uevent: version 1.0.3 >Jun 26 23:15:53 kernel: device-mapper: ioctl: 4.37.0-ioctl (2017-09-20) initialised: dm-devel@redhat.com >Jun 26 23:15:53 kernel: intel_pstate: Intel P-state driver initializing >Jun 26 23:15:53 kernel: hidraw: raw HID events driver (C) Jiri Kosina >Jun 26 23:15:53 kernel: usbcore: registered new interface driver usbhid >Jun 26 23:15:53 kernel: usbhid: USB HID core driver >Jun 26 23:15:53 kernel: drop_monitor: Initializing network drop monitor service >Jun 26 23:15:53 kernel: Initializing XFRM netlink socket >Jun 26 23:15:53 kernel: NET: Registered protocol family 10 >Jun 26 23:15:53 kernel: Segment Routing with IPv6 >Jun 26 23:15:53 kernel: mip6: Mobile IPv6 >Jun 26 23:15:53 kernel: NET: Registered protocol family 17 >Jun 26 23:15:53 kernel: RAS: Correctable Errors collector initialized. >Jun 26 23:15:53 kernel: microcode: sig=0x206d6, pf=0x4, revision=0x60f >Jun 26 23:15:53 kernel: microcode: Microcode Update Driver: v2.2. >Jun 26 23:15:53 kernel: AVX version of gcm_enc/dec engaged. >Jun 26 23:15:53 kernel: AES CTR mode by8 optimization enabled >Jun 26 23:15:53 kernel: sched_clock: Marking stable (1323592236, 0)->(1478668572, -155076336) >Jun 26 23:15:53 kernel: registered taskstats version 1 >Jun 26 23:15:53 kernel: Loading compiled-in X.509 certificates >Jun 26 23:15:53 kernel: ata8: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata9: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) >Jun 26 23:15:53 kernel: ata13: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata11: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata14: SATA link up 1.5 Gbps (SStatus 113 SControl 300) >Jun 26 23:15:53 kernel: ata14.00: ATAPI: MARVELL VIRTUALL, 1.09, max UDMA/66 >Jun 26 23:15:53 kernel: ata14.00: configured for UDMA/66 >Jun 26 23:15:53 kernel: ata7: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata12: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata10: SATA link down (SStatus 0 SControl 300) >Jun 26 23:15:53 kernel: ata1.00: ATA-8: Corsair Force 3 SSD, 1.3.3, max UDMA/133 >Jun 26 23:15:53 kernel: ata1.00: 468862128 sectors, multi 16: LBA48 NCQ (depth 31/32), AA >Jun 26 23:15:53 kernel: ata1.00: configured for UDMA/133 >Jun 26 23:15:53 kernel: scsi 0:0:0:0: Direct-Access ATA Corsair Force 3 3 PQ: 0 ANSI: 5 >Jun 26 23:15:53 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 >Jun 26 23:15:53 kernel: sd 0:0:0:0: [sda] 468862128 512-byte logical blocks: (240 GB/224 GiB) >Jun 26 23:15:53 kernel: sd 0:0:0:0: [sda] Write Protect is off >Jun 26 23:15:53 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 >Jun 26 23:15:53 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Jun 26 23:15:53 kernel: scsi 13:0:0:0: Processor Marvell 91xx Config 1.01 PQ: 0 ANSI: 5 >Jun 26 23:15:53 kernel: scsi 13:0:0:0: Attached scsi generic sg1 type 3 >Jun 26 23:15:53 kernel: sda: sda1 sda2 >Jun 26 23:15:53 kernel: sd 0:0:0:0: [sda] Attached SCSI disk >Jun 26 23:15:53 kernel: Loaded X.509 cert 'Fedora kernel signing key: c4cb716f09b34a09cf152293c347b978ac947828' >Jun 26 23:15:53 kernel: zswap: loaded using pool lzo/zbud >Jun 26 23:15:53 kernel: Key type big_key registered >Jun 26 23:15:53 kernel: Key type encrypted registered >Jun 26 23:15:53 kernel: Magic number: 6:901:298 >Jun 26 23:15:53 kernel: rtc_cmos 00:02: setting system clock to 2018-06-26 21:15:53 UTC (1530047753) >Jun 26 23:15:53 kernel: usb 1-1: new high-speed USB device number 2 using ehci-pci >Jun 26 23:15:53 kernel: usb 2-1: new high-speed USB device number 2 using ehci-pci >Jun 26 23:15:53 kernel: Freeing unused kernel memory: 2124K >Jun 26 23:15:53 kernel: Write protecting the kernel read-only data: 18432k >Jun 26 23:15:53 kernel: Freeing unused kernel memory: 2012K >Jun 26 23:15:53 kernel: Freeing unused kernel memory: 224K >Jun 26 23:15:53 kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. >Jun 26 23:15:53 kernel: x86/mm: Checking user space page tables >Jun 26 23:15:53 kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. >Jun 26 23:15:53 kernel: rodata_test: all tests were successful >Jun 26 23:15:53 systemd[1]: systemd 238 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=hybrid) >Jun 26 23:15:53 systemd[1]: Detected architecture x86-64. >Jun 26 23:15:53 systemd[1]: Running in initial RAM disk. >Jun 26 23:15:53 systemd[1]: No hostname configured. >Jun 26 23:15:53 systemd[1]: Set hostname to <localhost>. >Jun 26 23:15:53 systemd[1]: Initializing machine ID from random generator. >Jun 26 23:15:53 kernel: usb 1-1: New USB device found, idVendor=8087, idProduct=0024 >Jun 26 23:15:53 kernel: usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 >Jun 26 23:15:53 kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0024 >Jun 26 23:15:53 kernel: usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 >Jun 26 23:15:53 kernel: hub 1-1:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 2-1:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 1-1:1.0: 6 ports detected >Jun 26 23:15:53 kernel: hub 2-1:1.0: 8 ports detected >Jun 26 23:15:53 systemd[1]: Reached target Slices. >Jun 26 23:15:53 systemd[1]: Created slice system-systemd\x2dhibernate\x2dresume.slice. >Jun 26 23:15:53 systemd[1]: Listening on udev Kernel Socket. >Jun 26 23:15:53 systemd[1]: Reached target Timers. >Jun 26 23:15:53 kernel: usb 5-1: new high-speed USB device number 2 using xhci_hcd >Jun 26 23:15:53 kernel: audit: type=1130 audit(1530047753.810:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 kernel: audit: type=1130 audit(1530047753.815:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 kernel: audit: type=1130 audit(1530047753.820:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 kernel: audit: type=1131 audit(1530047753.821:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 kernel: audit: type=1130 audit(1530047753.837:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' >Jun 26 23:15:53 kernel: audit: type=1130 audit(1530047753.842:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 systemd-journald[302]: Journal started >Jun 26 23:15:53 systemd-journald[302]: Runtime journal (/run/log/journal/18303634d2764c518867f8c634591a61) is 8.0M, max 1.5G, 1.5G free. >Jun 26 23:15:53 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' >Jun 26 23:15:53 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 systemd-modules-load[299]: Failed to find module 'vboxdrv' >Jun 26 23:15:53 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 systemd-modules-load[299]: Failed to find module 'vboxnetflt' >Jun 26 23:15:53 systemd-modules-load[299]: modprobe: FATAL: Module snd-seq not found in directory /lib/modules/4.16.16-300.fc28.x86_64 >Jun 26 23:15:53 systemd-modules-load[299]: Failed to find module 'vboxnetadp' >Jun 26 23:15:53 systemd-modules-load[299]: Failed to find module 'vboxpci' >Jun 26 23:15:53 systemd-modules-load[299]: Inserted module 'ecryptfs' >Jun 26 23:15:53 dracut-cmdline[314]: dracut-28 (Twenty Eight) dracut-047-8.git20180305.fc28 >Jun 26 23:15:53 dracut-cmdline[314]: Using kernel command line parameters: rd.driver.pre=scsi_dh_alua rd.driver.pre=scsi_dh_emc rd.driver.pre=scsi_dh_rdac rd.driver.pre=dm_multipath BOOT_IMAGE=/vmlinuz-4.16.16-300.fc28.x86_64 root=/dev/mapper/system-root ro resume=/dev/mapper/system-swap rd.lvm.lv=system/root rd.lvm.lv=system/swap nomodeset rhgb quiet rd.shell=0 >Jun 26 23:15:53 kernel: audit: type=1130 audit(1530047753.855:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:53 systemd-vconsole-setup[303]: GIO_UNIMAP failed while trying to read unicode mappings: Input/output error >Jun 26 23:15:53 systemd-vconsole-setup[303]: Fonts will not be copied to remaining consoles >Jun 26 23:15:53 systemd-modules-load[299]: Error running install command for snd_pcm >Jun 26 23:15:53 systemd-modules-load[299]: Failed to insert 'snd_pcm_oss': Operation not permitted >Jun 26 23:15:53 kernel: tsc: Refined TSC clocksource calibration: 3302.011 MHz >Jun 26 23:15:53 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2f98b81c7e2, max_idle_ns: 440795376005 ns >Jun 26 23:15:53 kernel: clocksource: Switched to clocksource tsc >Jun 26 23:15:53 kernel: usb 5-1: New USB device found, idVendor=2109, idProduct=3431 >Jun 26 23:15:53 kernel: usb 5-1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 >Jun 26 23:15:53 kernel: usb 5-1: Product: USB2.0 Hub >Jun 26 23:15:53 kernel: hub 5-1:1.0: USB hub found >Jun 26 23:15:53 kernel: hub 5-1:1.0: 4 ports detected >Jun 26 23:15:54 systemd[1]: Started dracut cmdline hook. >Jun 26 23:15:54 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 kernel: audit: type=1130 audit(1530047754.027:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 systemd[1]: Starting dracut pre-udev hook... >Jun 26 23:15:54 kernel: usb 2-1.6: new low-speed USB device number 3 using ehci-pci >Jun 26 23:15:54 kernel: RPC: Registered named UNIX socket transport module. >Jun 26 23:15:54 kernel: RPC: Registered udp transport module. >Jun 26 23:15:54 kernel: RPC: Registered tcp transport module. >Jun 26 23:15:54 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. >Jun 26 23:15:54 rpc.statd[477]: Version 2.3.2 starting >Jun 26 23:15:54 rpc.statd[477]: Initializing NSM state >Jun 26 23:15:54 rpc.statd[477]: Running as root. chown /var/lib/nfs/statd to choose different user >Jun 26 23:15:54 kernel: usb 2-1.6: New USB device found, idVendor=0557, idProduct=2304 >Jun 26 23:15:54 kernel: usb 2-1.6: New USB device strings: Mfr=1, Product=2, SerialNumber=0 >Jun 26 23:15:54 kernel: usb 2-1.6: Product: KVM -COMPOSITE >Jun 26 23:15:54 kernel: usb 2-1.6: Manufacturer: Kb >Jun 26 23:15:54 kernel: input: Kb KVM -COMPOSITE as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.6/2-1.6:1.0/0003:0557:2304.0001/input/input2 >Jun 26 23:15:54 rpc.idmapd[482]: Setting log level to 0 >Jun 26 23:15:54 kernel: alua: device handler registered >Jun 26 23:15:54 kernel: emc: device handler registered >Jun 26 23:15:54 kernel: rdac: device handler registered >Jun 26 23:15:54 kernel: hid-generic 0003:0557:2304.0001: input,hidraw0: USB HID v1.10 Keyboard [Kb KVM -COMPOSITE] on usb-0000:00:1d.0-1.6/input0 >Jun 26 23:15:54 systemd[1]: Started dracut pre-udev hook. >Jun 26 23:15:54 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 kernel: input: Kb KVM -COMPOSITE as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.6/2-1.6:1.1/0003:0557:2304.0002/input/input3 >Jun 26 23:15:54 kernel: audit: type=1130 audit(1530047754.193:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 systemd[1]: Starting udev Kernel Device Manager... >Jun 26 23:15:54 systemd[1]: Started udev Kernel Device Manager. >Jun 26 23:15:54 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 systemd[1]: Starting dracut pre-trigger hook... >Jun 26 23:15:54 lldpad[522]: config file failed to load, >Jun 26 23:15:54 lldpad[522]: create a new file. >Jun 26 23:15:54 lldpad[522]: bound ctrl iface to /com/intel/lldpad >Jun 26 23:15:54 dracut-pre-trigger[518]: 523 >Jun 26 23:15:54 kernel: hid-generic 0003:0557:2304.0002: input,hidraw1: USB HID v1.10 Device [Kb KVM -COMPOSITE] on usb-0000:00:1d.0-1.6/input1 >Jun 26 23:15:54 kernel: input: Kb KVM -COMPOSITE as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.6/2-1.6:1.2/0003:0557:2304.0003/input/input4 >Jun 26 23:15:54 kernel: hid-generic 0003:0557:2304.0003: input,hidraw2: USB HID v1.10 Mouse [Kb KVM -COMPOSITE] on usb-0000:00:1d.0-1.6/input2 >Jun 26 23:15:54 dracut-pre-trigger[518]: rd.md=0: removing MD RAID activation >Jun 26 23:15:54 kernel: usb 2-1.8: new full-speed USB device number 4 using ehci-pci >Jun 26 23:15:54 systemd[1]: Started dracut pre-trigger hook. >Jun 26 23:15:54 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 systemd[1]: Starting udev Coldplug all Devices... >Jun 26 23:15:54 systemd[1]: Mounting Kernel Configuration File System... >Jun 26 23:15:54 systemd[1]: Mounted Kernel Configuration File System. >Jun 26 23:15:54 kernel: usb 2-1.8: New USB device found, idVendor=0b05, idProduct=179c >Jun 26 23:15:54 kernel: usb 2-1.8: New USB device strings: Mfr=0, Product=0, SerialNumber=0 >Jun 26 23:15:54 systemd[1]: Started udev Coldplug all Devices. >Jun 26 23:15:54 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 systemd[1]: Starting Show Plymouth Boot Screen... >Jun 26 23:15:54 systemd[1]: Starting dracut initqueue hook... >Jun 26 23:15:54 kernel: pps_core: LinuxPPS API ver. 1 registered >Jun 26 23:15:54 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> >Jun 26 23:15:54 systemd[1]: Starting udev Wait for Complete Device Initialization... >Jun 26 23:15:54 kernel: PTP clock support registered >Jun 26 23:15:54 systemd[1]: Started Show Plymouth Boot Screen. >Jun 26 23:15:54 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:54 kernel: e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k >Jun 26 23:15:54 kernel: e1000e: Copyright(c) 1999 - 2015 Intel Corporation. >Jun 26 23:15:54 kernel: e1000e 0000:00:19.0: Interrupt Throttling Rate (ints/sec) set to dynamic conservative mode >Jun 26 23:15:54 systemd[1]: Reached target Paths. >Jun 26 23:15:54 systemd[1]: Reached target Local Encrypted Volumes. >Jun 26 23:15:54 systemd[1]: Started Forward Password Requests to Plymouth Directory Watch. >Jun 26 23:15:54 systemd-udevd[615]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. >Jun 26 23:15:54 kernel: e1000e 0000:00:19.0 0000:00:19.0 (uninitialized): registered PHC clock >Jun 26 23:15:54 kernel: e1000e 0000:00:19.0 eth0: (PCI Express:2.5GT/s:Width x1) 54:04:a6:c5:a5:c1 >Jun 26 23:15:54 kernel: e1000e 0000:00:19.0 eth0: Intel(R) PRO/1000 Network Connection >Jun 26 23:15:54 kernel: e1000e 0000:00:19.0 eth0: MAC: 10, PHY: 11, PBA No: FFFFFF-0FF >Jun 26 23:15:54 kernel: e1000e 0000:00:19.0 eno1: renamed from eth0 >Jun 26 23:15:54 systemd-udevd[642]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. >Jun 26 23:15:54 kernel: 8021q: 802.1Q VLAN Support v1.8 >Jun 26 23:15:54 kernel: usb 6-1: new SuperSpeed USB device number 2 using xhci_hcd >Jun 26 23:15:55 kernel: usb 6-1: New USB device found, idVendor=2109, idProduct=0810 >Jun 26 23:15:55 kernel: usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 >Jun 26 23:15:55 kernel: usb 6-1: Product: 4-Port USB 3.0 Hub >Jun 26 23:15:55 kernel: usb 6-1: Manufacturer: VIA Labs, Inc. >Jun 26 23:15:55 kernel: hub 6-1:1.0: USB hub found >Jun 26 23:15:55 kernel: hub 6-1:1.0: 4 ports detected >Jun 26 23:15:55 systemd[1]: Started udev Wait for Complete Device Initialization. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Starting Device-Mapper Multipath Device Controller... >Jun 26 23:15:55 systemd[1]: Started Device-Mapper Multipath Device Controller. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=multipathd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 multipathd[673]: --------start up-------- >Jun 26 23:15:55 multipathd[673]: read /etc/multipath.conf >Jun 26 23:15:55 multipathd[673]: /etc/multipath.conf does not exist, blacklisting all devices. >Jun 26 23:15:55 multipathd[673]: You can run /sbin/mpathconf to create or modify /etc/multipath.conf >Jun 26 23:15:55 multipathd[673]: path checkers start up >Jun 26 23:15:55 multipathd[673]: /etc/multipath.conf does not exist, blacklisting all devices. >Jun 26 23:15:55 multipathd[673]: You can run /sbin/mpathconf to create or modify /etc/multipath.conf >Jun 26 23:15:55 dracut-initqueue[608]: Scanning devices sda2 for LVM logical volumes system/root system/swap >Jun 26 23:15:55 dracut-initqueue[608]: inactive '/dev/system/var' [39.06 GiB] inherit >Jun 26 23:15:55 dracut-initqueue[608]: inactive '/dev/system/root' [<97.66 GiB] inherit >Jun 26 23:15:55 dracut-initqueue[608]: inactive '/dev/system/swap' [39.06 GiB] inherit >Jun 26 23:15:55 dracut-initqueue[608]: inactive '/dev/system/tmp-local' [<46.81 GiB] inherit >Jun 26 23:15:55 systemd[1]: Found device /dev/mapper/system-root. >Jun 26 23:15:55 systemd[1]: Reached target Initrd Root Device. >Jun 26 23:15:55 systemd[1]: Found device /dev/mapper/system-swap. >Jun 26 23:15:55 systemd[1]: Starting Resume from hibernation using device /dev/mapper/system-swap... >Jun 26 23:15:55 kernel: PM: Starting manual resume from disk >Jun 26 23:15:55 kernel: PM: Image not found (code -22) >Jun 26 23:15:55 systemd-hibernate-resume[728]: Could not resume from '/dev/mapper/system-swap' (253:1). >Jun 26 23:15:55 systemd[1]: Started Resume from hibernation using device /dev/mapper/system-swap. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-hibernate-resume@dev-mapper-system\x2dswap comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-hibernate-resume@dev-mapper-system\x2dswap comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Reached target Local File Systems (Pre). >Jun 26 23:15:55 systemd[1]: Reached target Local File Systems. >Jun 26 23:15:55 systemd[1]: Starting Create Volatile Files and Directories... >Jun 26 23:15:55 systemd[1]: Started dracut initqueue hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Starting dracut pre-mount hook... >Jun 26 23:15:55 systemd[1]: Reached target Remote File Systems (Pre). >Jun 26 23:15:55 systemd[1]: Reached target Remote File Systems. >Jun 26 23:15:55 systemd[1]: Started Create Volatile Files and Directories. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Reached target System Initialization. >Jun 26 23:15:55 systemd[1]: Reached target Basic System. >Jun 26 23:15:55 systemd[1]: Started dracut pre-mount hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Starting File System Check on /dev/mapper/system-root... >Jun 26 23:15:55 systemd-fsck[738]: /dev/mapper/system-root: clean, 2501345/6406144 files, 19656642/25600000 blocks >Jun 26 23:15:55 systemd[1]: Started File System Check on /dev/mapper/system-root. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Mounting /sysroot... >Jun 26 23:15:55 kernel: EXT4-fs (dm-0): mounted filesystem with ordered data mode. Opts: (null) >Jun 26 23:15:55 systemd[1]: Mounted /sysroot. >Jun 26 23:15:55 systemd[1]: Reached target Initrd Root File System. >Jun 26 23:15:55 systemd[1]: Starting Reload Configuration from the Real Root... >Jun 26 23:15:55 systemd[1]: Reloading. >Jun 26 23:15:55 systemd[1]: Started Reload Configuration from the Real Root. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Reached target Initrd File Systems. >Jun 26 23:15:55 systemd[1]: Reached target Initrd Default Target. >Jun 26 23:15:55 systemd[1]: Starting dracut pre-pivot and cleanup hook... >Jun 26 23:15:55 dracut-pre-pivot[783]: Jun 26 21:15:55 | /etc/multipath.conf does not exist, blacklisting all devices. >Jun 26 23:15:55 dracut-pre-pivot[783]: Jun 26 21:15:55 | You can run /sbin/mpathconf to create or modify /etc/multipath.conf >Jun 26 23:15:55 systemd[1]: Started dracut pre-pivot and cleanup hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... >Jun 26 23:15:55 systemd[1]: Stopped dracut pre-pivot and cleanup hook. >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Starting Setup Virtual Console... >Jun 26 23:15:55 systemd[1]: Stopped target Timers. >Jun 26 23:15:55 systemd[1]: Starting Plymouth switch root service... >Jun 26 23:15:55 systemd[1]: Stopped target Remote File Systems. >Jun 26 23:15:55 systemd[1]: Stopped target Remote File Systems (Pre). >Jun 26 23:15:55 systemd[1]: Stopped target Initrd Default Target. >Jun 26 23:15:55 systemd[1]: Stopped target Initrd Root Device. >Jun 26 23:15:55 systemd[1]: Stopped target Basic System. >Jun 26 23:15:55 systemd[1]: Stopped target Sockets. >Jun 26 23:15:55 systemd[1]: Stopped target Paths. >Jun 26 23:15:55 systemd[1]: Stopped target Slices. >Jun 26 23:15:55 systemd[1]: Stopped target System Initialization. >Jun 26 23:15:55 systemd[1]: Stopped Create Volatile Files and Directories. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped target Local File Systems. >Jun 26 23:15:55 systemd[1]: Stopped target Local File Systems (Pre). >Jun 26 23:15:55 systemd[1]: Stopping Device-Mapper Multipath Device Controller... >Jun 26 23:15:55 systemd[1]: Stopped target Swap. >Jun 26 23:15:55 systemd[1]: Stopped Apply Kernel Variables. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped dracut pre-mount hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped dracut initqueue hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped target Local Encrypted Volumes. >Jun 26 23:15:55 systemd[1]: Started Cleaning Up and Shutting Down Daemons. >Jun 26 23:15:55 multipathd[820]: /etc/multipath.conf does not exist, blacklisting all devices. >Jun 26 23:15:55 multipathd[820]: You can run /sbin/mpathconf to create or modify /etc/multipath.conf >Jun 26 23:15:55 multipathd[820]: ok >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Started Plymouth switch root service. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Started Setup Virtual Console. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 multipathd[673]: --------shut down------- >Jun 26 23:15:55 systemd[1]: Stopped Device-Mapper Multipath Device Controller. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=multipathd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=multipathd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped udev Wait for Complete Device Initialization. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped udev Coldplug all Devices. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped dracut pre-trigger hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopping udev Kernel Device Manager... >Jun 26 23:15:55 systemd[1]: Stopped udev Kernel Device Manager. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped dracut pre-udev hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped dracut cmdline hook. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped dracut ask for additional cmdline parameters. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped Create Static Device Nodes in /dev. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Stopped Create list of required static device nodes for the current kernel. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Closed udev Control Socket. >Jun 26 23:15:55 systemd[1]: Closed udev Kernel Socket. >Jun 26 23:15:55 systemd[1]: Starting Cleanup udevd DB... >Jun 26 23:15:55 systemd[1]: Started Cleanup udevd DB. >Jun 26 23:15:55 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:55 systemd[1]: Reached target Switch Root. >Jun 26 23:15:55 systemd[1]: Starting Switch Root... >Jun 26 23:15:55 systemd[1]: Switching root. >Jun 26 23:15:55 systemd-journald[302]: Journal stopped >Jun 26 23:15:56 systemd-journald[302]: Received SIGTERM from PID 1 (systemd). >Jun 26 23:15:56 kernel: systemd: 23 output lines suppressed due to ratelimiting >Jun 26 23:15:56 kernel: SELinux: 32768 avtab hash slots, 115947 rules. >Jun 26 23:15:56 kernel: SELinux: 32768 avtab hash slots, 115947 rules. >Jun 26 23:15:56 kernel: SELinux: 8 users, 14 roles, 5145 types, 321 bools, 1 sens, 1024 cats >Jun 26 23:15:56 kernel: SELinux: 129 classes, 115947 rules >Jun 26 23:15:56 kernel: SELinux: Class bpf not defined in policy. >Jun 26 23:15:56 kernel: SELinux: the above unknown classes and permissions will be allowed >Jun 26 23:15:56 kernel: SELinux: policy capability network_peer_controls=1 >Jun 26 23:15:56 kernel: SELinux: policy capability open_perms=1 >Jun 26 23:15:56 kernel: SELinux: policy capability extended_socket_class=1 >Jun 26 23:15:56 kernel: SELinux: policy capability always_check_network=0 >Jun 26 23:15:56 kernel: SELinux: policy capability cgroup_seclabel=1 >Jun 26 23:15:56 kernel: SELinux: policy capability nnp_nosuid_transition=1 >Jun 26 23:15:56 kernel: SELinux: Completing initialization. >Jun 26 23:15:56 kernel: SELinux: Setting up existing superblocks. >Jun 26 23:15:56 systemd[1]: Successfully loaded SELinux policy in 389.676ms. >Jun 26 23:15:56 systemd[1]: Relabelled /dev, /run and /sys/fs/cgroup in 26.073ms. >Jun 26 23:15:56 systemd[1]: systemd 238 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=hybrid) >Jun 26 23:15:56 systemd[1]: Detected architecture x86-64. >Jun 26 23:15:56 systemd[1]: Set hostname to <myhost.example.com>. >Jun 26 23:15:56 systemd[1]: /usr/lib/systemd/system/rsyslog.service:21: Unknown lvalue 'LimitNOFILE' in section 'Install' >Jun 26 23:15:56 systemd[1]: /usr/lib/systemd/system/virtlockd-admin.socket:7: Unknown lvalue 'Server' in section 'Socket' >Jun 26 23:15:56 systemd[1]: Stopped Switch Root. >Jun 26 23:15:56 systemd[1]: systemd-journald.service: Service has no hold-off time, scheduling restart. >Jun 26 23:15:56 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. >Jun 26 23:15:56 systemd[1]: Stopped Journal Service. >Jun 26 23:15:56 systemd[1]: Starting Journal Service... >Jun 26 23:15:56 systemd-journald[849]: Journal started >Jun 26 23:15:56 systemd-journald[849]: Runtime journal (/run/log/journal/a745c40382e744ec911002eaa0bd6494) is 8.0M, max 1.5G, 1.5G free. >Jun 26 23:15:55 audit: MAC_STATUS enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Jun 26 23:15:56 audit: MAC_POLICY_LOAD policy loaded auid=4294967295 ses=4294967295 >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit: CONFIG_CHANGE audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:syslogd_t:s0 res=1 >Jun 26 23:15:56 kernel: EXT4-fs (dm-0): re-mounted. Opts: (null) >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Mounted Huge Pages File System. >Jun 26 23:15:56 systemd[1]: Started Create list of required static device nodes for the current kernel. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Mounted Kernel Debug File System. >Jun 26 23:15:56 systemd[1]: Mounted POSIX Message Queue File System. >Jun 26 23:15:56 systemd[1]: Started Remount Root and Kernel File Systems. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 861 (systemd-binfmt) >Jun 26 23:15:56 systemd[1]: Mounting Arbitrary Executable File Formats File System... >Jun 26 23:15:56 systemd[1]: Starting Configure read-only root support... >Jun 26 23:15:56 systemd[1]: Starting Create Static Device Nodes in /dev... >Jun 26 23:15:56 systemd[1]: Mounted Arbitrary Executable File Formats File System. >Jun 26 23:15:56 systemd[1]: Started Set Up Additional Binary Formats. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-binfmt comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd-modules-load[867]: Inserted module 'snd_pcm_oss' >Jun 26 23:15:56 systemd[1]: Started Load Kernel Modules. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Starting Apply Kernel Variables... >Jun 26 23:15:56 fedora-readonly[870]: /usr/lib/systemd/fedora-readonly: Zeile 14: Warnung: command substitution: ignored null byte in input >Jun 26 23:15:56 systemd[1]: Started Configure read-only root support. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=fedora-readonly comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Started Apply Kernel Variables. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Started Create Static Device Nodes in /dev. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Starting udev Kernel Device Manager... >Jun 26 23:15:56 systemd[1]: Started udev Coldplug all Devices. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Starting udev Wait for Complete Device Initialization... >Jun 26 23:15:56 systemd-udevd[884]: Specified group 'plugdev' unknown >Jun 26 23:15:56 systemd[1]: Started Setup Virtual Console. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Started udev Kernel Device Manager. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd-udevd[886]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. >Jun 26 23:15:56 kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 >Jun 26 23:15:56 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt >Jun 26 23:15:56 kernel: asus_wmi: ASUS WMI generic driver loaded >Jun 26 23:15:56 kernel: asus_wmi: Initialization: 0x0 >Jun 26 23:15:56 kernel: asus_wmi: BIOS WMI version: 0.9 >Jun 26 23:15:56 kernel: asus_wmi: SFUN value: 0x0 >Jun 26 23:15:56 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 163840 ms ovfl timer >Jun 26 23:15:56 kernel: RAPL PMU: hw unit of domain pp0-core 2^-16 Joules >Jun 26 23:15:56 kernel: RAPL PMU: hw unit of domain package 2^-16 Joules >Jun 26 23:15:56 kernel: RAPL PMU: hw unit of domain dram 2^-16 Joules >Jun 26 23:15:56 kernel: input: Eee PC WMI hotkeys as /devices/platform/eeepc-wmi/input/input5 >Jun 26 23:15:56 kernel: asus_wmi: Number of fans: 1 >Jun 26 23:15:56 kernel: snd_hda_intel 0000:01:00.1: Disabling MSI >Jun 26 23:15:56 kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client >Jun 26 23:15:56 systemd[1]: Created slice system-lvm2\x2dpvscan.slice. >Jun 26 23:15:56 mtp-probe[967]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.6" >Jun 26 23:15:56 mtp-probe[967]: bus: 2, device: 3 was not an MTP device >Jun 26 23:15:56 systemd[1]: Found device Corsair_Force_3_SSD 1. >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC898: line_outs=4 (0x14/0x15/0x16/0x17/0x0) type:line >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: dig-out=0x11/0x1e >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: inputs: >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x19 >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 >Jun 26 23:15:56 kernel: snd_hda_codec_realtek hdaudioC0D0: Line=0x1a >Jun 26 23:15:56 kernel: input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input6 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input7 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1b.0/sound/card0/input8 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Line Out Front as /devices/pci0000:00/0000:00:1b.0/sound/card0/input9 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Line Out Surround as /devices/pci0000:00/0000:00:1b.0/sound/card0/input10 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Line Out CLFE as /devices/pci0000:00/0000:00:1b.0/sound/card0/input11 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Line Out Side as /devices/pci0000:00/0000:00:1b.0/sound/card0/input12 >Jun 26 23:15:56 kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card0/input13 >Jun 26 23:15:56 kernel: Bluetooth: Core ver 2.22 >Jun 26 23:15:56 kernel: NET: Registered protocol family 31 >Jun 26 23:15:56 kernel: Bluetooth: HCI device and connection manager initialized >Jun 26 23:15:56 kernel: Bluetooth: HCI socket layer initialized >Jun 26 23:15:56 kernel: Bluetooth: L2CAP socket layer initialized >Jun 26 23:15:56 kernel: Bluetooth: SCO socket layer initialized >Jun 26 23:15:56 systemd-udevd[895]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. >Jun 26 23:15:56 kernel: usbcore: registered new interface driver btusb >Jun 26 23:15:56 systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. >Jun 26 23:15:56 kernel: iTCO_vendor_support: vendor-support=0 >Jun 26 23:15:56 kernel: iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11 >Jun 26 23:15:56 kernel: iTCO_wdt: Found a Patsburg TCO device (Version=2, TCOBASE=0x0460) >Jun 26 23:15:56 kernel: iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3ca0 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3ca0 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3ca8 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3ca8 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3c71 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3c71 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3caa >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3caa >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cab >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cab >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cac >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cac >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cad >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cad >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cb8 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cb8 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cf4 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cf4 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cf6 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cf6 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cf5 >Jun 26 23:15:56 kernel: EDAC sbridge: Seeking for: PCI ID 8086:3cf5 >Jun 26 23:15:56 kernel: EDAC sbridge: CPU SrcID #0, Ha #0, Channel #0 has DIMMs, but ECC is disabled >Jun 26 23:15:56 kernel: EDAC sbridge: Couldn't find mci handler >Jun 26 23:15:56 kernel: EDAC sbridge: Failed to register device with error -19. >Jun 26 23:15:56 kernel: intel_rapl: Found RAPL domain package >Jun 26 23:15:56 kernel: intel_rapl: Found RAPL domain core >Jun 26 23:15:56 kernel: intel_rapl: Found RAPL domain dram >Jun 26 23:15:56 kernel: intel_rapl: RAPL package 0 domain package locked by BIOS >Jun 26 23:15:56 systemd[1]: Found device /dev/mapper/system-swap. >Jun 26 23:15:56 systemd[1]: Activating swap /dev/mapper/system-swap... >Jun 26 23:15:56 kernel: Adding 40959996k swap on /dev/mapper/system-swap. Priority:-2 extents:1 across:40959996k SSFS >Jun 26 23:15:56 systemd[1]: Activated swap /dev/mapper/system-swap. >Jun 26 23:15:56 systemd[1]: Reached target Swap. >Jun 26 23:15:56 systemd[1]: tmp.mount: Directory /tmp to mount over is not empty, mounting anyway. >Jun 26 23:15:56 systemd[1]: Mounting Temporary Directory (/tmp)... >Jun 26 23:15:56 systemd[1]: Mounted Temporary Directory (/tmp). >Jun 26 23:15:56 systemd[1]: Started udev Wait for Complete Device Initialization. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Starting Activation of DM RAID sets... >Jun 26 23:15:56 systemd[1]: Started LVM2 metadata daemon. >Jun 26 23:15:56 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=lvm2-lvmetad comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:56 systemd[1]: Starting LVM2 PV scan on device 8:2... >Jun 26 23:15:57 lvm[1024]: WARNING: lvmetad is being updated by another command (pid 859). >Jun 26 23:15:57 lvm[1024]: WARNING: Not using lvmetad because cache update failed. >Jun 26 23:15:57 lvm[1024]: WARNING: Autoactivation reading from disk instead of lvmetad. >Jun 26 23:15:57 systemd[1]: Started Activation of DM RAID sets. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dmraid-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dmraid-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Reached target Local Encrypted Volumes. >Jun 26 23:15:57 lvm[859]: 2 logical volume(s) in volume group "system" monitored >Jun 26 23:15:57 systemd[1]: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Reached target Local File Systems (Pre). >Jun 26 23:15:57 systemd[1]: Starting File System Check on /dev/disk/by-uuid/e9a72d81-5cbb-4d5a-84f8-a3f476833444... >Jun 26 23:15:57 systemd-fsck[1032]: /dev/sda1: sauber, 451/64000 Dateien, 80879/256000 Blöcke >Jun 26 23:15:57 systemd[1]: Started File System Check on /dev/disk/by-uuid/e9a72d81-5cbb-4d5a-84f8-a3f476833444. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2duuid-e9a72d81\x2d5cbb\x2d4d5a\x2d84f8\x2da3f476833444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Mounting /boot... >Jun 26 23:15:57 kernel: EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null) >Jun 26 23:15:57 systemd[1]: Mounted /boot. >Jun 26 23:15:57 systemd[1]: Found device /dev/mapper/system-var. >Jun 26 23:15:57 systemd[1]: Starting File System Check on /dev/mapper/system-var... >Jun 26 23:15:57 lvm[1024]: 4 logical volume(s) in volume group "system" now active >Jun 26 23:15:57 systemd[1]: Found device /dev/disk/by-uuid/efdf085a-eb38-49ef-a4eb-1ce496965bc3. >Jun 26 23:15:57 systemd[1]: Started LVM2 PV scan on device 8:2. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=lvm2-pvscan@8:2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Starting File System Check on /dev/disk/by-uuid/efdf085a-eb38-49ef-a4eb-1ce496965bc3... >Jun 26 23:15:57 systemd-fsck[1077]: /dev/mapper/system-var: sauber, 36880/2564096 Dateien, 791043/10240000 Blöcke >Jun 26 23:15:57 systemd[1]: Started File System Check on /dev/mapper/system-var. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-fsck@dev-mapper-system\x2dvar comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Mounting /var... >Jun 26 23:15:57 kernel: EXT4-fs (dm-2): mounted filesystem with ordered data mode. Opts: (null) >Jun 26 23:15:57 systemd[1]: Mounted /var. >Jun 26 23:15:57 systemd-fsck[1079]: tmp-local: sauber, 1747459/3072000 Dateien, 10726928/12270592 Blöcke >Jun 26 23:15:57 systemd[1]: Starting Load/Save RF Kill Switch Status... >Jun 26 23:15:57 systemd[1]: Starting Load/Save Random Seed... >Jun 26 23:15:57 systemd[1]: Starting Flush Journal to Persistent Storage... >Jun 26 23:15:57 systemd[1]: Started File System Check on /dev/disk/by-uuid/efdf085a-eb38-49ef-a4eb-1ce496965bc3. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2duuid-efdf085a\x2deb38\x2d49ef\x2da4eb\x2d1ce496965bc3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Mounting /fs/tmp-local... >Jun 26 23:15:57 systemd[1]: Started Load/Save Random Seed. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started Load/Save RF Kill Switch Status. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-rfkill comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd-journald[849]: Time spent on flushing to /var is 466.021ms for 1241 entries. >Jun 26 23:15:57 systemd-journald[849]: System journal (/var/log/journal/a745c40382e744ec911002eaa0bd6494) is 128.0M, max 3.8G, 3.6G free. >Jun 26 23:15:57 kernel: EXT4-fs (dm-3): mounted filesystem with ordered data mode. Opts: (null) >Jun 26 23:15:57 kernel: kauditd_printk_skb: 89 callbacks suppressed >Jun 26 23:15:57 kernel: audit: type=1130 audit(1530047757.175:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=fedora-import-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:02.0/0000:01:00.1/sound/card1/input14 >Jun 26 23:15:57 kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:02.0/0000:01:00.1/sound/card1/input15 >Jun 26 23:15:57 kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:02.0/0000:01:00.1/sound/card1/input16 >Jun 26 23:15:57 kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:02.0/0000:01:00.1/sound/card1/input17 >Jun 26 23:15:57 kernel: audit: type=1130 audit(1530047757.248:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 kernel: audit: type=1131 audit(1530047757.248:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 kernel: audit: type=1130 audit(1530047757.252:103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dmraid-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 kernel: audit: type=1131 audit(1530047757.252:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dmraid-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 kernel: audit: type=1130 audit(1530047757.602:105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=nfs-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=nfs-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=fedora-import-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dmraid-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dmraid-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Mounted /fs/tmp-local. >Jun 26 23:15:57 systemd[1]: Reached target Local File Systems. >Jun 26 23:15:57 systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... >Jun 26 23:15:57 systemd[1]: Starting Preprocess NFS configuration... >Jun 26 23:15:57 systemd[1]: Starting Import network configuration from initramfs... >Jun 26 23:15:57 systemd[1]: Starting Restore /run/initramfs on shutdown... >Jun 26 23:15:57 systemd[1]: Started Restore /run/initramfs on shutdown. >Jun 26 23:15:57 systemd[1]: Started Preprocess NFS configuration. >Jun 26 23:15:57 systemd[1]: Started Tell Plymouth To Write Out Runtime Data. >Jun 26 23:15:57 systemd[1]: Started Import network configuration from initramfs. >Jun 26 23:15:57 systemd[1]: Starting Activation of DM RAID sets... >Jun 26 23:15:57 systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... >Jun 26 23:15:57 systemd[1]: Started Tell Plymouth To Write Out Runtime Data. >Jun 26 23:15:57 systemd[1]: Started Activation of DM RAID sets. >Jun 26 23:15:57 systemd[1]: Started Flush Journal to Persistent Storage. >Jun 26 23:15:57 systemd[1]: Starting Create Volatile Files and Directories... >Jun 26 23:15:57 systemd[1]: Started Create Volatile Files and Directories. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 kernel: audit: type=1130 audit(1530047757.672:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Mounting RPC Pipe File System... >Jun 26 23:15:57 systemd[1]: Starting RPC Bind... >Jun 26 23:15:57 systemd[1]: Starting Security Auditing Service... >Jun 26 23:15:57 systemd[1]: Mounted RPC Pipe File System. >Jun 26 23:15:57 systemd[1]: Reached target rpc_pipefs.target. >Jun 26 23:15:57 auditd[1174]: Started dispatcher: /sbin/audispd pid: 1176 >Jun 26 23:15:57 kernel: audit: type=1305 audit(1530047757.688:107): audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Jun 26 23:15:57 audit: CONFIG_CHANGE audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Jun 26 23:15:57 audit: CONFIG_CHANGE audit_pid=1174 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Jun 26 23:15:57 auditd[1174]: Init complete, auditd 2.8.4 listening for events (startup state enable) >Jun 26 23:15:57 audispd[1176]: audispd initialized with q_depth=250 and 1 active plugins >Jun 26 23:15:57 systemd[1]: Started RPC Bind. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=rpcbind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 augenrules[1178]: /sbin/augenrules: No change >Jun 26 23:15:57 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:unconfined_service_t:s0 op=add_rule key=(null) list=1 res=1 >Jun 26 23:15:57 augenrules[1178]: No rules >Jun 26 23:15:57 systemd[1]: Started Security Auditing Service. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=auditd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Starting Update UTMP about System Boot/Shutdown... >Jun 26 23:15:57 audit[1194]: SYSTEM_BOOT pid=1194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started Update UTMP about System Boot/Shutdown. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Reached target System Initialization. >Jun 26 23:15:57 systemd[1]: Listening on Virtual machine lock manager socket. >Jun 26 23:15:57 systemd[1]: Listening on CUPS Scheduler. >Jun 26 23:15:57 systemd[1]: Started CUPS Scheduler. >Jun 26 23:15:57 systemd[1]: Reached target Paths. >Jun 26 23:15:57 systemd[1]: Started Daily Cleanup of Temporary Directories. >Jun 26 23:15:57 systemd[1]: Started dnf makecache timer. >Jun 26 23:15:57 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. >Jun 26 23:15:57 systemd[1]: Started Amavisd clean tmp timer. >Jun 26 23:15:57 systemd[1]: Listening on Open-iSCSI iscsid Socket. >Jun 26 23:15:57 systemd[1]: Listening on SSSD Secrets Service responder socket. >Jun 26 23:15:57 systemd[1]: Listening on Virtual machine log manager socket. >Jun 26 23:15:57 systemd[1]: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Jun 26 23:15:57 systemd[1]: Listening on GPS (Global Positioning System) Daemon Sockets. >Jun 26 23:15:57 systemd[1]: Started Amavisd clean quarantine timer. >Jun 26 23:15:57 systemd[1]: Listening on D-Bus System Message Bus Socket. >Jun 26 23:15:57 systemd[1]: Listening on PC/SC Smart Card Daemon Activation Socket. >Jun 26 23:15:57 systemd[1]: Reached target Sockets. >Jun 26 23:15:57 systemd[1]: Reached target Basic System. >Jun 26 23:15:57 systemd[1]: Starting GSSAPI Proxy Daemon... >Jun 26 23:15:57 systemd[1]: Starting NTP client/server... >Jun 26 23:15:57 systemd[1]: Reached target sshd-keygen.target. >Jun 26 23:15:57 systemd[1]: Starting Hardware Monitoring Sensors... >Jun 26 23:15:57 systemd[1]: Starting Builds and install new kmods from akmod packages... >Jun 26 23:15:57 systemd[1]: Started irqbalance daemon. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=irqbalance comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=smartd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Jun 26 23:15:57 lm_sensors-modprobe-wrapper[1199]: No sensors with loadable kernel modules configured. >Jun 26 23:15:57 lm_sensors-modprobe-wrapper[1199]: Please, run 'sensors-detect' as root in order to search for available sensors. >Jun 26 23:15:57 systemd[1]: Starting Resets System Activity Logs... >Jun 26 23:15:57 systemd[1]: Starting Modem Manager... >Jun 26 23:15:57 chronyd[1210]: chronyd version 3.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 +DEBUG) >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=mcelog comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Starting System Logging Service... >Jun 26 23:15:57 alsactl[1214]: alsactl 1.1.6 daemon started >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=rngd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dbus comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Starting Avahi mDNS/DNS-SD Stack... >Jun 26 23:15:57 /usr/sbin/gpm[1219]: *** info [daemon/startup.c(136)]: >Jun 26 23:15:57 systemd[1]: Starting Console Mouse manager... >Jun 26 23:15:57 /usr/sbin/gpm[1219]: Started gpm successfully. Entered daemon mode. >Jun 26 23:15:57 systemd[1]: Starting Bluetooth service... >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=gpm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 chronyd[1210]: Frequency -3.040 +/- 0.017 ppm read from /var/lib/chrony/drift >Jun 26 23:15:57 systemd[1]: Starting Virtual Machine and Container Registration Service... >Jun 26 23:15:57 systemd[1]: Started Manage Sound Card State (restore and store). >Jun 26 23:15:57 akmods[1200]: No akmod packages found, nothing to do.[ OK ] >Jun 26 23:15:57 bluetoothd[1212]: Bluetooth daemon 5.50 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1207]: AVC avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1210]: AVC avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 systemd[1]: Reached target Sound Card. >Jun 26 23:15:57 avahi-daemon[1207]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Jun 26 23:15:57 systemd[1]: Started Machine Check Exception Logging Daemon. >Jun 26 23:15:57 mcelog[1215]: mcelog: warning: 8 bytes ignored in each record >Jun 26 23:15:57 mcelog[1215]: mcelog: consider an update >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 avahi-daemon[1207]: Successfully dropped root privileges. >Jun 26 23:15:57 systemd[1]: Starting ABRT Automated Bug Reporting Tool... >Jun 26 23:15:57 avahi-daemon[1207]: avahi-daemon 0.7 starting up. >Jun 26 23:15:57 systemd[1]: Starting NIS/YP (Network Information Service) Clients to NIS Domain Binder... >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 ypbind-pre-setdomain[1220]: Setting NIS domain: 'mynisdomain' (/etc/yp.conf) >Jun 26 23:15:57 smartd[1202]: smartd 6.6 2017-11-05 r4594 [x86_64-linux-4.16.16-300.fc28.x86_64] (local build) >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. >Jun 26 23:15:57 rngd[1221]: Failed to init entropy source 0: Hardware RNG Device >Jun 26 23:15:57 rngd[1221]: Failed to init entropy source 1: TPM RNG Device >Jun 26 23:15:57 rngd[1221]: Failed to init entropy source 2: Intel RDRAND Instruction RNG >Jun 26 23:15:57 rngd[1221]: can't open any entropy source >Jun 26 23:15:57 rngd[1221]: Maybe RNG device modules are not loaded >Jun 26 23:15:57 smartd[1202]: Copyright (C) 2002-17, Bruce Allen, Christian Franke, www.smartmontools.org >Jun 26 23:15:57 systemd[1]: Started D-Bus System Message Bus. >Jun 26 23:15:57 smartd[1202]: Opened configuration file /etc/smartmontools/smartd.conf >Jun 26 23:15:57 systemd[1]: Starting firewalld - dynamic firewall daemon... >Jun 26 23:15:57 smartd[1202]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Jun 26 23:15:57 systemd[1]: Started Console Mouse manager. >Jun 26 23:15:57 ModemManager[1204]: <info> ModemManager (version 1.6.12-3.fc28) starting in system bus... >Jun 26 23:15:57 smartd[1202]: Device: /dev/sda, type changed from 'scsi' to 'sat' >Jun 26 23:15:57 smartd[1202]: Device: /dev/sda [SAT], opened >Jun 26 23:15:57 smartd[1202]: Device: /dev/sda [SAT], Corsair Force 3 SSD, S/N:11476510000011540356, WWN:0-000000-000000000, FW:1.3.3, 240 GB >Jun 26 23:15:57 smartd[1202]: Device: /dev/sda [SAT], found in smartd database: SandForce Driven SSDs >Jun 26 23:15:57 rsyslogd[1206]: environment variable TZ is not set, auto correcting this to TZ=/etc/localtime [v8.35.0 try http://www.rsyslog.com/e/2442 ] >Jun 26 23:15:57 rsyslogd[1206]: [origin software="rsyslogd" swVersion="8.35.0" x-pid="1206" x-info="http://www.rsyslog.com"] start >Jun 26 23:15:57 smartd[1202]: Device: /dev/sda [SAT], can't monitor Current_Pending_Sector count - no Attribute 197 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 smartd[1202]: Device: /dev/sda [SAT], is SMART capable. Adding to "monitor" list. >Jun 26 23:15:57 smartd[1202]: Monitoring 1 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 audit[1223]: AVC avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 >Jun 26 23:15:57 systemd[1]: Started System Logging Service. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=rsyslog comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started GSSAPI Proxy Daemon. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=gssproxy comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=akmods comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sysstat comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started Builds and install new kmods from akmod packages. >Jun 26 23:15:57 avahi-daemon[1207]: Successfully called chroot(). >Jun 26 23:15:57 systemd[1]: Started Resets System Activity Logs. >Jun 26 23:15:57 avahi-daemon[1207]: Successfully dropped remaining capabilities. >Jun 26 23:15:57 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=rngd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' >Jun 26 23:15:57 systemd[1]: rngd.service: Main process exited, code=exited, status=1/FAILURE >Jun 26 23:15:57 avahi-daemon[1207]: Loading service file /services/udisks.service. >Jun 26 23:15:57 systemd[1]: rngd.service: Failed with result 'exit-code'. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=chronyd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 bluetoothd[1212]: Starting SDP server >Jun 26 23:15:57 systemd[1]: Started NTP client/server. >Jun 26 23:15:57 systemd[1]: Started Hardware Monitoring Sensors. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=lm_sensors comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 avahi-daemon[1207]: Network interface enumeration completed. >Jun 26 23:15:57 avahi-daemon[1207]: Server startup complete. Host name is weidenmeise.local. Local service cookie is 1646483750. >Jun 26 23:15:57 avahi-daemon[1207]: Service "weidenmeise" (/services/udisks.service) successfully established. >Jun 26 23:15:57 systemd[1]: Started Virtual Machine and Container Registration Service. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-machined comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started Bluetooth service. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=bluetooth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started Avahi mDNS/DNS-SD Stack. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=avahi-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=abrtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started ABRT Automated Bug Reporting Tool. >Jun 26 23:15:57 audit: MAC_CONFIG_CHANGE bool=nis_enabled val=1 old_val=0 auid=4294967295 ses=4294967295 >Jun 26 23:15:57 systemd[1]: Started Creates ABRT problems from coredumpctl messages. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=abrt-journal-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started ABRT Xorg log watcher. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=abrt-xorg comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Started ABRT kernel log watcher. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=abrt-oops comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 systemd[1]: Reached target Bluetooth. >Jun 26 23:15:57 systemd[1]: Starting Wait for chrony to synchronize system clock... >Jun 26 23:15:57 systemd[1]: Reached target NFS client services. >Jun 26 23:15:57 kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 >Jun 26 23:15:57 kernel: Bluetooth: BNEP filters: protocol multicast >Jun 26 23:15:57 kernel: Bluetooth: BNEP socket layer initialized >Jun 26 23:15:57 bluetoothd[1212]: Bluetooth management interface 1.14 initialized >Jun 26 23:15:57 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=0 pid=1212 comm="/usr/libexec/bluetooth/bluetoothd " label="system_u:system_r:bluetooth_t:s0") >Jun 26 23:15:57 audit[1223]: USER_AVC pid=1223 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=2) > exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >Jun 26 23:15:57 setsebool[1260]: The allow_ypbind policy boolean was changed to 1 by root >Jun 26 23:15:57 systemd[1]: Starting Hostname Service... >Jun 26 23:15:57 dbus-daemon[1223]: [system] Reloaded configuration >Jun 26 23:15:57 systemd[1]: Started Modem Manager. >Jun 26 23:15:57 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=ModemManager comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:57 ypbind[1272]: Binding NIS service >Jun 26 23:15:58 dbus-daemon[1223]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jun 26 23:15:58 systemd[1]: Started Hostname Service. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 audit[1228]: AVC avc: denied { read } for pid=1228 comm="firewalld" name="core_pattern" dev="proc" ino=18488 scontext=system_u:system_r:firewalld_t:s0 tcontext=system_u:object_r:usermodehelper_t:s0 tclass=file permissive=0 >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=firewalld comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 systemd[1]: Started firewalld - dynamic firewall daemon. >Jun 26 23:15:58 systemd[1]: Reached target Network (Pre). >Jun 26 23:15:58 systemd[1]: Starting Network Manager... >Jun 26 23:15:58 audit: NETFILTER_CFG table=filter family=10 entries=0 >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4077] NetworkManager (version 1.10.10-1.fc28) is starting... (for the first time) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4080] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf, 20-connectivity-fedora.conf) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4164] manager[0x5598be1fe0e0]: monitoring kernel firmware directory '/lib/firmware'. >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4199] hostname: hostname: using hostnamed >Jun 26 23:15:58 audit: NETFILTER_CFG table=security family=2 entries=0 >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4199] hostname: hostname changed from (none) to "myhost.example.com" >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4201] dns-mgr[0x5598be218130]: init: dns=default, rc-manager=symlink >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4207] manager[0x5598be1fe0e0]: rfkill: WiFi hardware radio set enabled >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4207] manager[0x5598be1fe0e0]: rfkill: WWAN hardware radio set enabled >Jun 26 23:15:58 audit: NETFILTER_CFG table=raw family=2 entries=0 >Jun 26 23:15:58 systemd[1]: Started Network Manager. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 systemd[1]: Reached target Network. >Jun 26 23:15:58 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.8' (uid=0 pid=1278 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0") >Jun 26 23:15:58 systemd[1]: Starting Xinetd A Powerful Replacement For Inetd... >Jun 26 23:15:58 systemd[1]: Started Logout off all iSCSI sessions on shutdown. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=iscsi-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 systemd[1]: Starting IPMI Driver... >Jun 26 23:15:58 audit: NETFILTER_CFG table=mangle family=2 entries=0 >Jun 26 23:15:58 systemd[1]: Starting Sendmail Mail Transport Agent... >Jun 26 23:15:58 systemd[1]: Reached target Remote File Systems (Pre). >Jun 26 23:15:58 systemd[1]: Reached target Remote File Systems. >Jun 26 23:15:58 systemd[1]: Starting Virtualization daemon... >Jun 26 23:15:58 systemd[1]: Starting Fail2Ban Service... >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/chargen-dgram [file=/etc/xinetd.conf] [line=49] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/chargen-stream [file=/etc/xinetd.d/chargen-stream] [line=67] >Jun 26 23:15:58 systemd[1]: Starting OpenSSH server daemon... >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/daytime-dgram [file=/etc/xinetd.d/daytime-dgram] [line=67] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/daytime-stream [file=/etc/xinetd.d/daytime-stream] [line=67] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/discard-dgram [file=/etc/xinetd.d/discard-dgram] [line=67] >Jun 26 23:15:58 systemd[1]: Starting Network Manager Wait Online... >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=xinetd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/discard-stream [file=/etc/xinetd.d/discard-stream] [line=67] >Jun 26 23:15:58 systemd[1]: Started Xinetd A Powerful Replacement For Inetd. >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/echo-dgram [file=/etc/xinetd.d/echo-dgram] [line=67] >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=fail2ban comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/echo-stream [file=/etc/xinetd.d/echo-stream] [line=67] >Jun 26 23:15:58 systemd[1]: Started Fail2Ban Service. >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/imap [file=/etc/xinetd.d/imap] [line=67] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/imaps [file=/etc/xinetd.d/imaps] [line=14] >Jun 26 23:15:58 audit[1321]: AVC avc: denied { module_load } for pid=1321 comm="modprobe" scontext=system_u:system_r:ipmievd_t:s0 tcontext=system_u:system_r:ipmievd_t:s0 tclass=system permissive=0 >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/ipop2 [file=/etc/xinetd.d/ipop2] [line=14] >Jun 26 23:15:58 systemd[1]: Starting Network Manager Script Dispatcher Service... >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/ipop3 [file=/etc/xinetd.d/ipop3] [line=15] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/pop3s [file=/etc/xinetd.d/pop3s] [line=14] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/tcpmux-server [file=/etc/xinetd.d/tcpmux-server] [line=13] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/time-dgram [file=/etc/xinetd.d/time-dgram] [line=68] >Jun 26 23:15:58 xinetd[1316]: Reading included configuration file: /etc/xinetd.d/time-stream [file=/etc/xinetd.d/time-stream] [line=67] >Jun 26 23:15:58 xinetd[1316]: removing chargen >Jun 26 23:15:58 xinetd[1316]: removing chargen >Jun 26 23:15:58 xinetd[1316]: removing daytime >Jun 26 23:15:58 xinetd[1316]: removing daytime >Jun 26 23:15:58 xinetd[1316]: removing discard >Jun 26 23:15:58 xinetd[1316]: removing discard >Jun 26 23:15:58 xinetd[1316]: removing echo >Jun 26 23:15:58 xinetd[1316]: removing echo >Jun 26 23:15:58 xinetd[1316]: removing imap >Jun 26 23:15:58 xinetd[1316]: removing imaps >Jun 26 23:15:58 xinetd[1316]: removing pop2 >Jun 26 23:15:58 xinetd[1316]: removing pop3 >Jun 26 23:15:58 xinetd[1316]: removing pop3s >Jun 26 23:15:58 xinetd[1316]: removing tcpmux >Jun 26 23:15:58 xinetd[1316]: removing time >Jun 26 23:15:58 xinetd[1316]: removing time >Jun 26 23:15:58 xinetd[1316]: xinetd Version 2.3.15 started with loadavg labeled-networking options compiled in. >Jun 26 23:15:58 xinetd[1316]: Started working: 0 available services >Jun 26 23:15:58 dbus-daemon[1223]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 systemd[1]: Started Network Manager Script Dispatcher Service. >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4655] settings: loaded plugin ifcfg-rh: (c) 2007 - 2015 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. (/usr/lib64/NetworkManager/libnm-settings-plugin-ifcfg-rh.so) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4671] settings: loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. (/usr/lib64/NetworkManager/libnm-settings-plugin-ibft.so) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4672] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Jun 26 23:15:58 sshd[1319]: Server listening on 0.0.0.0 port 22. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sshd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 audit: NETFILTER_CFG table=nat family=2 entries=0 >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=ipmi comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' >Jun 26 23:15:58 openipmi-helper[1306]: Startup failed. >Jun 26 23:15:58 sshd[1319]: Server listening on :: port 22. >Jun 26 23:15:58 systemd[1]: Started OpenSSH server daemon. >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4686] ifcfg-rh: new connection /etc/sysconfig/network-scripts/ifcfg-eno1 (33df63ad-4b5e-45fa-8aae-cc60f7d3c41e,"eno1") >Jun 26 23:15:58 systemd[1]: ipmi.service: Main process exited, code=exited, status=1/FAILURE >Jun 26 23:15:58 systemd[1]: ipmi.service: Failed with result 'exit-code'. >Jun 26 23:15:58 systemd[1]: Failed to start IPMI Driver. >Jun 26 23:15:58 audit: NETFILTER_CFG table=security family=10 entries=0 >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4823] manager: rfkill: WiFi enabled by radio killswitch; enabled by state file >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4824] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4824] manager: Networking is enabled by state file >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4826] dhcp-init: Using DHCP client 'dhclient' >Jun 26 23:15:58 audit: NETFILTER_CFG table=raw family=10 entries=0 >Jun 26 23:15:58 nm-dispatcher[1328]: req:1 'hostname': new request (11 scripts) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4837] Loaded device plugin: NMBondDeviceFactory (internal) >Jun 26 23:15:58 nm-dispatcher[1328]: req:1 'hostname': start running ordered scripts... >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4837] Loaded device plugin: NMBridgeDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4837] Loaded device plugin: NMDummyDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4837] Loaded device plugin: NMEthernetDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMInfinibandDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMIPTunnelDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMMacsecDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMMacvlanDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMPppDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMTunDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMVethDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4838] Loaded device plugin: NMVlanDeviceFactory (internal) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4839] Loaded device plugin: NMVxlanDeviceFactory (internal) >Jun 26 23:15:58 audit: NETFILTER_CFG table=mangle family=10 entries=0 >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4880] Loaded device plugin: NMAtmManager (/usr/lib64/NetworkManager/libnm-device-plugin-adsl.so) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.4986] Loaded device plugin: NMBluezManager (/usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5000] Loaded device plugin: NMWwanFactory (/usr/lib64/NetworkManager/libnm-device-plugin-wwan.so) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5069] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/libnm-device-plugin-team.so) >Jun 26 23:15:58 audit: NETFILTER_CFG table=nat family=10 entries=0 >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5093] Loaded device plugin: NMWifiFactory (/usr/lib64/NetworkManager/libnm-device-plugin-wifi.so) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5116] device (lo): carrier: link connected >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5123] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5138] manager: (eno1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.5147] device (eno1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') >Jun 26 23:15:58 kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready >Jun 26 23:15:58 sendmail[1395]: starting daemon (8.15.2): SMTP+queueing@01:00:00 >Jun 26 23:15:58 sendmail[1395]: STARTTLS=server: file /etc/pki/mail/certs/mail.pem unsafe: No such file or directory >Jun 26 23:15:58 systemd[1]: Started Sendmail Mail Transport Agent. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 systemd[1]: Starting Sendmail Mail Transport Client... >Jun 26 23:15:58 audit[1]: USER_AVC pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) > exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >Jun 26 23:15:58 audit[1324]: AVC avc: denied { read } for pid=1324 comm="fail2ban-server" name="core_pattern" dev="proc" ino=18488 scontext=system_u:system_r:fail2ban_t:s0 tcontext=system_u:object_r:usermodehelper_t:s0 tclass=file permissive=0 >Jun 26 23:15:58 systemd[1]: Started Virtualization daemon. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.login1' unit='dbus-org.freedesktop.login1.service' requested by ':1.12' (uid=0 pid=1311 comm="/usr/sbin/libvirtd " label="system_u:system_r:virtd_t:s0-s0:c0.c1023") >Jun 26 23:15:58 kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready >Jun 26 23:15:58 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. >Jun 26 23:15:58 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.8' (uid=0 pid=1278 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0") >Jun 26 23:15:58 systemd[1]: Starting Authorization Manager... >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7749] device (eno1): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7758] policy: auto-activating connection 'eno1' >Jun 26 23:15:58 kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7789] bluez: use BlueZ version 5 >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7791] modem-manager: ModemManager available >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7798] device (eno1): Activation: starting connection 'eno1' (33df63ad-4b5e-45fa-8aae-cc60f7d3c41e) >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7800] device (eno1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7802] manager: NetworkManager state is now CONNECTING >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7806] device (eno1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:58 NetworkManager[1278]: <info> [1530047758.7817] bluez5: NAP: added interface 00:26:83:39:C6:8E >Jun 26 23:15:58 polkitd[1438]: Started polkitd version 0.114 >Jun 26 23:15:58 sm-msp-queue[1457]: starting daemon (8.15.2): queueing@01:00:00 >Jun 26 23:15:58 systemd[1]: Started Sendmail Mail Transport Client. >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 polkitd[1438]: Loading rules from directory /etc/polkit-1/rules.d >Jun 26 23:15:58 polkitd[1438]: Loading rules from directory /usr/share/polkit-1/rules.d >Jun 26 23:15:58 polkitd[1438]: Finished loading, compiling and executing 13 rules >Jun 26 23:15:58 dbus-daemon[1223]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Jun 26 23:15:58 systemd[1]: Started Authorization Manager. >Jun 26 23:15:58 polkitd[1438]: Acquired the name org.freedesktop.PolicyKit1 on the system bus >Jun 26 23:15:58 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:58 fail2ban-server[1324]: Server ready >Jun 26 23:15:59 audit[1505]: AVC avc: denied { read } for pid=1505 comm="firewall-cmd" name="core_pattern" dev="proc" ino=18488 scontext=system_u:system_r:fail2ban_t:s0 tcontext=system_u:object_r:usermodehelper_t:s0 tclass=file permissive=0 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=2 entries=5 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=2 entries=6 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=2 entries=3 >Jun 26 23:15:59 audit: NETFILTER_CFG table=security family=2 entries=4 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=2 entries=4 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=10 entries=5 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=10 entries=6 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=10 entries=3 >Jun 26 23:15:59 audit: NETFILTER_CFG table=security family=10 entries=4 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=10 entries=4 >Jun 26 23:15:59 audit: NETFILTER_CFG table=broute family=7 entries=1 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=7 entries=3 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=7 entries=3 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=10 entries=15 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=2 entries=15 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=2 entries=39 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=2 entries=26 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=2 entries=27 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=10 entries=17 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=10 entries=39 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=10 entries=26 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=10 entries=27 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=2 entries=39 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=2 entries=27 >Jun 26 23:15:59 audit: NETFILTER_CFG table=security family=2 entries=13 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=2 entries=79 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=10 entries=39 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=10 entries=29 >Jun 26 23:15:59 audit: NETFILTER_CFG table=security family=10 entries=13 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=10 entries=80 >Jun 26 23:15:59 audit: NETFILTER_CFG table=broute family=7 entries=1 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=7 entries=3 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=7 entries=3 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=2 entries=27 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=2 entries=79 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=2 entries=50 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=2 entries=39 >Jun 26 23:15:59 audit: NETFILTER_CFG table=raw family=10 entries=29 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=10 entries=80 >Jun 26 23:15:59 audit: NETFILTER_CFG table=nat family=10 entries=50 >Jun 26 23:15:59 audit: NETFILTER_CFG table=mangle family=10 entries=39 >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2314] device (eno1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:59 kernel: IPv6: ADDRCONF(NETDEV_UP): eno1: link is not ready >Jun 26 23:15:59 avahi-daemon[1207]: Joining mDNS multicast group on interface eno1.IPv4 with address 192.0.2.44. >Jun 26 23:15:59 avahi-daemon[1207]: New relevant interface eno1.IPv4 for mDNS. >Jun 26 23:15:59 avahi-daemon[1207]: Registering new address record for 192.0.2.44 on eno1.IPv4. >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2354] device (eno1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:59 nm-dispatcher[1328]: req:2 'pre-up' [eno1]: new request (1 scripts) >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2445] device (eno1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2447] device (eno1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2448] manager: NetworkManager state is now CONNECTED_LOCAL >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2470] manager: NetworkManager state is now CONNECTED_SITE >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2470] policy: set 'eno1' (eno1) as default for IPv4 routing and DNS >Jun 26 23:15:59 NetworkManager[1278]: <info> [1530047759.2493] device (eno1): Activation: successful, device activated. >Jun 26 23:15:59 nm-dispatcher[1328]: req:3 'up' [eno1]: new request (11 scripts) >Jun 26 23:15:59 nm-dispatcher[1328]: req:3 'up' [eno1]: start running ordered scripts... >Jun 26 23:15:59 systemd[1]: iscsi.service: Unit cannot be reloaded because it is inactive. >Jun 26 23:15:59 systemd[1]: Stopping Sendmail Mail Transport Client... >Jun 26 23:15:59 systemd[1]: Stopped Sendmail Mail Transport Client. >Jun 26 23:15:59 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:59 systemd[1]: Stopping Sendmail Mail Transport Agent... >Jun 26 23:15:59 systemd[1]: Stopped Sendmail Mail Transport Agent. >Jun 26 23:15:59 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:15:59 systemd[1]: Starting Sendmail Mail Transport Agent... >Jun 26 23:15:59 libvirtd[1311]: 2018-06-26 21:15:59.286+0000: 1424: info : libvirt version: 4.1.0, package: 3.fc28 (Fedora Project, 2018-06-18-18:09:28, buildhw-04.phx2.fedoraproject.org) >Jun 26 23:15:59 libvirtd[1311]: 2018-06-26 21:15:59.286+0000: 1424: info : hostname: myhost.example.com >Jun 26 23:15:59 libvirtd[1311]: 2018-06-26 21:15:59.286+0000: 1424: error : virNodeSuspendSupportsTarget:336 : internal error: Cannot probe for supported suspend types >Jun 26 23:15:59 libvirtd[1311]: 2018-06-26 21:15:59.286+0000: 1424: warning : virQEMUCapsInit:1222 : Failed to get host power management capabilities >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=2 entries=126 >Jun 26 23:15:59 systemd[1]: Received SIGRTMIN+20 from PID 611 (plymouthd). >Jun 26 23:15:59 audit[1631]: AVC avc: denied { read } for pid=1631 comm="firewall-cmd" name="core_pattern" dev="proc" ino=18488 scontext=system_u:system_r:fail2ban_t:s0 tcontext=system_u:object_r:usermodehelper_t:s0 tclass=file permissive=0 >Jun 26 23:15:59 audit: NETFILTER_CFG table=filter family=2 entries=127 >Jun 26 23:15:59 audit[1634]: AVC avc: denied { read } for pid=1634 comm="firewall-cmd" name="core_pattern" dev="proc" ino=18488 scontext=system_u:system_r:fail2ban_t:s0 tcontext=system_u:object_r:usermodehelper_t:s0 tclass=file permissive=0 >Jun 26 23:16:00 audit: NETFILTER_CFG table=filter family=2 entries=128 >Jun 26 23:16:00 dbus-daemon[1223]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.17' (uid=0 pid=1179 comm="/usr/sbin/sedispatch " label="system_u:system_r:audisp_t:s0") (using servicehelper) >Jun 26 23:16:00 ModemManager[1204]: <info> Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:19.0': not supported by any plugin >Jun 26 23:16:01 nm-dispatcher[1328]: Redirecting to /bin/systemctl reload inadyn.service >Jun 26 23:16:01 nm-dispatcher[1328]: Failed to reload inadyn.service: Job type reload is not applicable for unit inadyn.service. >Jun 26 23:16:01 kernel: e1000e: eno1 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: Rx/Tx >Jun 26 23:16:01 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eno1: link becomes ready >Jun 26 23:16:01 NetworkManager[1278]: <info> [1530047761.6053] device (eno1): carrier: link connected >Jun 26 23:16:01 NetworkManager[1278]: <info> [1530047761.6060] manager: startup complete >Jun 26 23:16:01 systemd[1]: Started Network Manager Wait Online. >Jun 26 23:16:01 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:01 systemd[1]: Reached target Network is Online. >Jun 26 23:16:01 systemd[1]: Starting NFS status monitor for NFSv2/3 locking.... >Jun 26 23:16:01 systemd[1]: Starting Notify NFS peers of a restart... >Jun 26 23:16:01 sm-notify[1685]: Version 2.3.2 starting >Jun 26 23:16:01 rpc.statd[1686]: Version 2.3.2 starting >Jun 26 23:16:01 rpc.statd[1686]: Flags: TI-RPC >Jun 26 23:16:01 systemd[1]: Started Notify NFS peers of a restart. >Jun 26 23:16:01 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=rpc-statd-notify comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:01 systemd[1]: Started NFS status monitor for NFSv2/3 locking.. >Jun 26 23:16:01 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=rpc-statd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:02 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-rfkill comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:02 avahi-daemon[1207]: Joining mDNS multicast group on interface eno1.IPv6 with address fe80::5604:a6ff:fec5:a5c1. >Jun 26 23:16:02 avahi-daemon[1207]: New relevant interface eno1.IPv6 for mDNS. >Jun 26 23:16:02 avahi-daemon[1207]: Registering new address record for fe80::5604:a6ff:fec5:a5c1 on eno1.*. >Jun 26 23:16:12 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:23 dbus-daemon[1223]: [system] Failed to activate service 'org.freedesktop.login1': timed out (service_start_timeout=25000ms) >Jun 26 23:16:25 dbus-daemon[1223]: [system] Failed to activate service 'org.fedoraproject.Setroubleshootd': timed out (service_start_timeout=25000ms) >Jun 26 23:16:25 dbus-daemon[1223]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.17' (uid=0 pid=1179 comm="/usr/sbin/sedispatch " label="system_u:system_r:audisp_t:s0") (using servicehelper) >Jun 26 23:16:28 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:29 NetworkManager[1278]: <info> [1530047789.1353] connectivity: (eno1) timed out >Jun 26 23:16:29 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.8' (uid=0 pid=1278 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0") >Jun 26 23:16:29 systemd[1]: Starting Network Manager Script Dispatcher Service... >Jun 26 23:16:29 dbus-daemon[1223]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Jun 26 23:16:29 systemd[1]: Started Network Manager Script Dispatcher Service. >Jun 26 23:16:29 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:29 nm-dispatcher[1699]: req:1 'connectivity-change': new request (11 scripts) >Jun 26 23:16:29 nm-dispatcher[1699]: req:1 'connectivity-change': start running ordered scripts... >Jun 26 23:16:31 kernel: random: crng init done >Jun 26 23:16:33 sendmail[1730]: starting daemon (8.15.2): SMTP+queueing@01:00:00 >Jun 26 23:16:33 sendmail[1730]: STARTTLS=server: file /etc/pki/mail/certs/mail.pem unsafe: No such file or directory >Jun 26 23:16:33 systemd[1]: sendmail.service: Can't open PID file /run/sendmail.pid (yet?) after start: No such file or directory >Jun 26 23:16:33 systemd[1]: Started Sendmail Mail Transport Agent. >Jun 26 23:16:33 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:33 systemd[1]: Starting Sendmail Mail Transport Client... >Jun 26 23:16:33 sm-msp-queue[1740]: starting daemon (8.15.2): queueing@01:00:00 >Jun 26 23:16:33 systemd[1]: Started Sendmail Mail Transport Client. >Jun 26 23:16:33 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:33 audit[1695]: AVC avc: denied { read } for pid=1695 comm="setroubleshootd" name="core_pattern" dev="proc" ino=18488 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usermodehelper_t:s0 tclass=file permissive=0 >Jun 26 23:16:34 ypbind[1779]: Binding took 37 seconds >Jun 26 23:16:34 ypbind[1785]: NIS domain: mynisdomain, NIS server: mynisserver >Jun 26 23:16:34 systemd[1]: Started NIS/YP (Network Information Service) Clients to NIS Domain Binder. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=ypbind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Reached target User and Group Name Lookups. >Jun 26 23:16:34 systemd[1]: Starting Login Service... >Jun 26 23:16:34 systemd[1]: Starting Permit User Sessions... >Jun 26 23:16:34 systemd[1]: Starting CUPS Scheduler... >Jun 26 23:16:34 systemd[1]: Starting Automounts filesystems on demand... >Jun 26 23:16:34 systemd[1]: Started Permit User Sessions. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Started Job spooling tools. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=atd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Starting Hold until boot process finishes up... >Jun 26 23:16:34 systemd[1]: Starting Terminate Plymouth Boot Screen... >Jun 26 23:16:34 systemd-logind[1787]: Watching system buttons on /dev/input/event1 (Power Button) >Jun 26 23:16:34 systemd-logind[1787]: Watching system buttons on /dev/input/event0 (Power Button) >Jun 26 23:16:34 systemd[1]: Received SIGRTMIN+21 from PID 611 (plymouthd). >Jun 26 23:16:34 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' requested by ':1.19' (uid=0 pid=1790 comm="/usr/sbin/cupsd -l " label="system_u:system_r:cupsd_t:s0-s0:c0.c1023") >Jun 26 23:16:34 systemd[1]: Started Terminate Plymouth Boot Screen. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-quit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-quit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Started Hold until boot process finishes up. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Starting Manage, Install and Generate Color Profiles... >Jun 26 23:16:34 systemd[1]: Started Getty on tty1. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Reached target Login Prompts. >Jun 26 23:16:34 dbus-daemon[1223]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Jun 26 23:16:34 systemd[1]: Started Manage, Install and Generate Color Profiles. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=colord comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd-logind[1787]: Watching system buttons on /dev/input/event2 (Kb KVM -COMPOSITE) >Jun 26 23:16:34 systemd-logind[1787]: Watching system buttons on /dev/input/event3 (Kb KVM -COMPOSITE) >Jun 26 23:16:34 systemd-logind[1787]: New seat seat0. >Jun 26 23:16:34 systemd[1]: Started Login Service. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.4767] manager: (virbr0): new Bridge device (/org/freedesktop/NetworkManager/Devices/3) >Jun 26 23:16:34 systemd-udevd[1847]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. >Jun 26 23:16:34 systemd-udevd[1847]: Could not generate persistent MAC address for virbr0: No such file or directory >Jun 26 23:16:34 kernel: tun: Universal TUN/TAP device driver, 1.6 >Jun 26 23:16:34 audit: ANOM_PROMISCUOUS dev=virbr0-nic prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 >Jun 26 23:16:34 kernel: virbr0: port 1(virbr0-nic) entered blocking state >Jun 26 23:16:34 kernel: virbr0: port 1(virbr0-nic) entered disabled state >Jun 26 23:16:34 kernel: device virbr0-nic entered promiscuous mode >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.4845] manager: (virbr0-nic): new Tun device (/org/freedesktop/NetworkManager/Devices/4) >Jun 26 23:16:34 systemd-udevd[1854]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable. >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=129 >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.4924] device (virbr0-nic): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.4931] device (virbr0-nic): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=130 >Jun 26 23:16:34 systemd[1]: Started Automounts filesystems on demand. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=autofs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=131 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=132 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=133 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=134 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=135 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=136 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=137 >Jun 26 23:16:34 audit: NETFILTER_CFG table=filter family=2 entries=138 >Jun 26 23:16:34 audit: NETFILTER_CFG table=nat family=2 entries=74 >Jun 26 23:16:34 audit: NETFILTER_CFG table=nat family=2 entries=75 >Jun 26 23:16:34 audit: NETFILTER_CFG table=nat family=2 entries=76 >Jun 26 23:16:34 audit: NETFILTER_CFG table=nat family=2 entries=77 >Jun 26 23:16:34 audit: NETFILTER_CFG table=nat family=2 entries=78 >Jun 26 23:16:34 audit: NETFILTER_CFG table=mangle family=2 entries=51 >Jun 26 23:16:34 avahi-daemon[1207]: Joining mDNS multicast group on interface virbr0.IPv4 with address 192.168.122.1. >Jun 26 23:16:34 avahi-daemon[1207]: New relevant interface virbr0.IPv4 for mDNS. >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5607] device (virbr0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') >Jun 26 23:16:34 kernel: virbr0: port 1(virbr0-nic) entered blocking state >Jun 26 23:16:34 kernel: virbr0: port 1(virbr0-nic) entered listening state >Jun 26 23:16:34 avahi-daemon[1207]: Registering new address record for 192.168.122.1 on virbr0.IPv4. >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5624] ifcfg-rh: add connection in-memory (943de86c-2d97-421c-b14e-10d5299471c1,"virbr0") >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5629] device (virbr0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5635] device (virbr0): Activation: starting connection 'virbr0' (943de86c-2d97-421c-b14e-10d5299471c1) >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5639] device (virbr0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5642] device (virbr0): state change: prepare -> config (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5652] keyfile: add connection in-memory (fdc1ad0d-cd88-46e8-b3e9-29fe1ffed325,"virbr0-nic") >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5659] device (virbr0-nic): Activation: starting connection 'virbr0-nic' (fdc1ad0d-cd88-46e8-b3e9-29fe1ffed325) >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5660] device (virbr0): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5661] device (virbr0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5668] device (virbr0-nic): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 nm-dispatcher[1699]: req:2 'pre-up' [virbr0]: new request (1 scripts) >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5672] device (virbr0-nic): state change: prepare -> config (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5674] device (virbr0-nic): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5674] device (virbr0): bridge port virbr0-nic was attached >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5675] device (virbr0-nic): Activation: connection 'virbr0-nic' enslaved, continuing activation >Jun 26 23:16:34 nm-dispatcher[1699]: req:3 'pre-up' [virbr0-nic]: new request (1 scripts) >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5675] device (virbr0-nic): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5715] device (virbr0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5717] device (virbr0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5728] device (virbr0): Activation: successful, device activated. >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5731] device (virbr0-nic): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 nm-dispatcher[1699]: req:4 'up' [virbr0]: new request (11 scripts) >Jun 26 23:16:34 nm-dispatcher[1699]: req:4 'up' [virbr0]: start running ordered scripts... >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5736] device (virbr0-nic): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5745] device (virbr0-nic): Activation: successful, device activated. >Jun 26 23:16:34 nm-dispatcher[1699]: req:5 'up' [virbr0-nic]: new request (11 scripts) >Jun 26 23:16:34 dnsmasq[1895]: started, version 2.79 cachesize 150 >Jun 26 23:16:34 dnsmasq[1895]: compile time options: IPv6 GNU-getopt DBus no-i18n IDN2 DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth DNSSEC loop-detect inotify >Jun 26 23:16:34 dnsmasq-dhcp[1895]: DHCP, IP range 192.168.122.2 -- 192.168.122.254, lease time 1h >Jun 26 23:16:34 dnsmasq-dhcp[1895]: DHCP, sockets bound exclusively to interface virbr0 >Jun 26 23:16:34 dnsmasq[1895]: reading /etc/resolv.conf >Jun 26 23:16:34 dnsmasq[1895]: using nameserver 192.0.2.100#53 >Jun 26 23:16:34 dnsmasq[1895]: using nameserver 129.69.252.252#53 >Jun 26 23:16:34 dnsmasq[1895]: using nameserver 129.69.252.202#53 >Jun 26 23:16:34 dnsmasq[1895]: read /etc/hosts - 11 addresses >Jun 26 23:16:34 dnsmasq[1895]: read /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses >Jun 26 23:16:34 dnsmasq-dhcp[1895]: read /var/lib/libvirt/dnsmasq/default.hostsfile >Jun 26 23:16:34 kernel: virbr0: port 1(virbr0-nic) entered disabled state >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5936] device (virbr0-nic): state change: activated -> unmanaged (reason 'connection-assumed', sys-iface-state: 'external') >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5938] device (virbr0): bridge port virbr0-nic was detached >Jun 26 23:16:34 NetworkManager[1278]: <info> [1530047794.5938] device (virbr0-nic): released from master device virbr0 >Jun 26 23:16:34 nm-dispatcher[1699]: req:6 'down' [virbr0-nic]: new request (11 scripts) >Jun 26 23:16:34 systemd[1]: iscsi.service: Unit cannot be reloaded because it is inactive. >Jun 26 23:16:34 systemd[1]: Stopping Sendmail Mail Transport Client... >Jun 26 23:16:34 systemd[1]: Stopped Sendmail Mail Transport Client. >Jun 26 23:16:34 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Stopping Sendmail Mail Transport Agent... >Jun 26 23:16:34 systemd[1]: Stopped Sendmail Mail Transport Agent. >Jun 26 23:16:34 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Starting Sendmail Mail Transport Agent... >Jun 26 23:16:34 sendmail[1917]: starting daemon (8.15.2): SMTP+queueing@01:00:00 >Jun 26 23:16:34 sendmail[1917]: STARTTLS=server: file /etc/pki/mail/certs/mail.pem unsafe: No such file or directory >Jun 26 23:16:34 systemd[1]: sendmail.service: Can't open PID file /run/sendmail.pid (yet?) after start: No such file or directory >Jun 26 23:16:34 systemd[1]: Started Sendmail Mail Transport Agent. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Starting Sendmail Mail Transport Client... >Jun 26 23:16:34 sm-msp-queue[1924]: starting daemon (8.15.2): queueing@01:00:00 >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Started Sendmail Mail Transport Client. >Jun 26 23:16:34 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:34 systemd[1]: Started CUPS Scheduler. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=cups comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 systemd[1]: Started Make remote CUPS printers available locally. >Jun 26 23:16:34 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=cups-browsed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:34 cupsd[1790]: REQUEST localhost - - "POST / HTTP/1.1" 200 349 Create-Printer-Subscriptions successful-ok >Jun 26 23:16:34 cupsd[1790]: REQUEST localhost - - "POST / HTTP/1.1" 200 176 Create-Printer-Subscriptions successful-ok >Jun 26 23:16:35 dbus-daemon[1223]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.776:122): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.776:123): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:124): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:125): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:126): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:127): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:128): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:129): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:130): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:131): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:132): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:133): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:134): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:135): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:136): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:137): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:138): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:139): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:140): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:141): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:142): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:143): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:144): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:145): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:146): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:147): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:148): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:149): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:150): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.777:151): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:152): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:153): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:154): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:155): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:156): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:157): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:158): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:159): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:160): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:161): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:162): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:163): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:164): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:165): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:166): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:167): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:168): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:169): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:170): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:171): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:172): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:173): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.778:174): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:175): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:176): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:177): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:178): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:179): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:180): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:181): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:182): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:183): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:184): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:185): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:186): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:187): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:188): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:189): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:190): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:191): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:192): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:193): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:194): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:195): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:196): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:197): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:198): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:199): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.779:200): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:201): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:202): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:203): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:204): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:205): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:206): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:207): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:208): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:209): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:210): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:211): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:212): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:213): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:214): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:215): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:216): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:217): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:218): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:219): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:220): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:221): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:222): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:223): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:224): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:225): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.780:226): avc: denied { search } for pid=1210 comm="chronyd" name="yp" dev="dm-2" ino=1966082 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:227): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:228): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:229): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:230): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:231): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:232): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:233): avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:234): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:235): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:236): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:237): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:238): avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:239): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:240): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:241): avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:242): avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:243): avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:244): avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:245): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:246): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:247): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:248): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:249): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:250): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:251): avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:252): avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:253): avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:254): avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:255): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:256): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:257): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:258): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:259): avc: denied { name_bind } for pid=1207 comm="avahi-daemon" src=959 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:260): avc: denied { name_connect } for pid=1207 comm="avahi-daemon" dest=111 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:261): avc: denied { name_bind } for pid=1210 comm="chronyd" src=962 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.781:262): avc: denied { name_connect } for pid=1210 comm="chronyd" dest=111 scontext=system_u:system_r:chronyd_t:s0 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:263): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:264): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:265): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:266): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:267): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:268): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:269): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:270): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:271): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.783:272): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.784:273): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.784:274): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:275): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:276): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:277): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:278): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:279): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:280): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:281): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:282): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:283): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:284): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:285): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.826:286): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:287): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:288): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:289): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:290): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:291): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:292): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:293): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:294): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:295): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:296): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:297): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.833:298): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.836:299): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.836:300): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.836:301): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:302): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:303): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:304): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:305): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:306): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:307): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:308): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:309): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.837:310): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:311): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:312): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:313): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:314): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:315): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:316): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:317): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.849:318): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.850:319): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.850:320): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.850:321): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.850:322): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:323): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:324): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:325): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:326): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:327): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:328): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:329): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:330): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:331): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.851:332): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.852:333): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.852:334): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:335): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:336): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:337): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:338): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 109295 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:339): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:340): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:341): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:342): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:343): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 109295 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:35 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 182 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:35 cupsd[1790]: [Client 8] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/raffaello) from localhost >Jun 26 23:16:35 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 182 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:344): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:345): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:35 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.856:346): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:347): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:348): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:349): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:350): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:351): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:352): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.861:353): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.862:354): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.862:355): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.862:356): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.862:357): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.862:358): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:359): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:360): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:361): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:362): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:363): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:364): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:365): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:366): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:367): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:368): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:369): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.864:370): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:371): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:372): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:373): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:374): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:375): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:376): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:377): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:378): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:379): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:380): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:381): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.870:382): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.872:383): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.872:384): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.872:385): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.872:386): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:387): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:388): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:389): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:390): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:391): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:392): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:393): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.873:394): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:395): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:396): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:397): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:398): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:399): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:400): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.875:401): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.876:402): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.876:403): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.876:404): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.876:405): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.876:406): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.877:407): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.877:408): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.877:409): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.877:410): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:411): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:412): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:413): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:414): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:415): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:416): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:417): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.878:418): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.912:419): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.912:420): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.912:421): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.912:422): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.912:423): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.912:424): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.913:425): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.913:426): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 183 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: [Client 14] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/caravaggio) from localhost >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 183 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.913:427): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.913:428): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.913:429): avc: denied { name_bind } for pid=1223 comm="dbus-daemon" src=975 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC dontaudited in current policy. 'semodule -B' will turn on dontaudit rules. *** >Jun 26 23:16:36 setroubleshoot[1695]: Unable to add audit event: node=myhost.example.com type=AVC msg=audit(1530047757.913:430): avc: denied { name_connect } for pid=1223 comm="dbus-daemon" dest=111 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket permissive=0 > > **** Invalid AVC allowed in current policy *** >Jun 26 23:16:36 setroubleshoot[1695]: SELinux is preventing firewalld from read access on the file core_pattern. For complete SELinux messages run: sealert -l 4d561867-c57c-4937-b98b-1a2c8f9711e6 >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 164547 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 python3[1695]: SELinux is preventing firewalld from read access on the file core_pattern. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that firewalld should be allowed read access on the core_pattern file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'firewalld' --raw | audit2allow -M my-firewalld > # semodule -X 300 -i my-firewalld.pp > >Jun 26 23:16:36 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:36 setroubleshoot[1695]: SELinux is preventing modprobe from module_load access on the system Unknown. For complete SELinux messages run: sealert -l 81d86ded-b442-49a2-8746-95e443839afc >Jun 26 23:16:36 python3[1695]: SELinux is preventing modprobe from module_load access on the system Unknown. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that modprobe should be allowed module_load access on the Unknown system by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'modprobe' --raw | audit2allow -M my-modprobe > # semodule -X 300 -i my-modprobe.pp > >Jun 26 23:16:36 setroubleshoot[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. For complete SELinux messages run: sealert -l ef2a7ec3-6416-4cd3-8705-1ce2bddf11f3 >Jun 26 23:16:36 python3[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that fail2ban-server should be allowed read access on the core_pattern file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'fail2ban-server' --raw | audit2allow -M my-fail2banserver > # semodule -X 300 -i my-fail2banserver.pp > >Jun 26 23:16:36 setroubleshoot[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. For complete SELinux messages run: sealert -l ef2a7ec3-6416-4cd3-8705-1ce2bddf11f3 >Jun 26 23:16:36 python3[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that fail2ban-server should be allowed read access on the core_pattern file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'fail2ban-server' --raw | audit2allow -M my-fail2banserver > # semodule -X 300 -i my-fail2banserver.pp > >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 164547 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 177 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: [Client 20] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/miro) from localhost >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 177 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:36 setroubleshoot[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. For complete SELinux messages run: sealert -l ef2a7ec3-6416-4cd3-8705-1ce2bddf11f3 >Jun 26 23:16:36 python3[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that fail2ban-server should be allowed read access on the core_pattern file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'fail2ban-server' --raw | audit2allow -M my-fail2banserver > # semodule -X 300 -i my-fail2banserver.pp > >Jun 26 23:16:36 setroubleshoot[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. For complete SELinux messages run: sealert -l ef2a7ec3-6416-4cd3-8705-1ce2bddf11f3 >Jun 26 23:16:36 python3[1695]: SELinux is preventing fail2ban-server from read access on the file core_pattern. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that fail2ban-server should be allowed read access on the core_pattern file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'fail2ban-server' --raw | audit2allow -M my-fail2banserver > # semodule -X 300 -i my-fail2banserver.pp > >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 189324 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 189324 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 179 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: [Client 26] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/vasari) from localhost >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 179 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:36 nm-dispatcher[1699]: Redirecting to /bin/systemctl reload inadyn.service >Jun 26 23:16:36 nm-dispatcher[1699]: Failed to reload inadyn.service: Job type reload is not applicable for unit inadyn.service. >Jun 26 23:16:36 nm-dispatcher[1699]: req:5 'up' [virbr0-nic]: start running ordered scripts... >Jun 26 23:16:36 systemd[1]: iscsi.service: Unit cannot be reloaded because it is inactive. >Jun 26 23:16:36 systemd[1]: Stopping Sendmail Mail Transport Client... >Jun 26 23:16:36 systemd[1]: Stopped Sendmail Mail Transport Client. >Jun 26 23:16:36 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:36 systemd[1]: Stopping Sendmail Mail Transport Agent... >Jun 26 23:16:36 sedispatch[1179]: AVC Message for setroubleshoot, dropping message >Jun 26 23:16:36 systemd[1]: Stopped Sendmail Mail Transport Agent. >Jun 26 23:16:36 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:36 systemd[1]: Starting Sendmail Mail Transport Agent... >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 206783 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:36 sendmail[2010]: starting daemon (8.15.2): SMTP+queueing@01:00:00 >Jun 26 23:16:36 sendmail[2010]: STARTTLS=server: file /etc/pki/mail/certs/mail.pem unsafe: No such file or directory >Jun 26 23:16:36 systemd[1]: sendmail.service: Can't open PID file /run/sendmail.pid (yet?) after start: No such file or directory >Jun 26 23:16:36 systemd[1]: Started Sendmail Mail Transport Agent. >Jun 26 23:16:36 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:36 systemd[1]: Starting Sendmail Mail Transport Client... >Jun 26 23:16:36 sm-msp-queue[2017]: starting daemon (8.15.2): queueing@01:00:00 >Jun 26 23:16:36 systemd[1]: Started Sendmail Mail Transport Client. >Jun 26 23:16:36 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 206783 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 183 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 cupsd[1790]: [Client 32] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/giacometti) from localhost >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 183 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 159 CUPS-Set-Default successful-ok >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 159 CUPS-Set-Default successful-ok >Jun 26 23:16:36 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 189319 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:36 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 189319 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 178 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: [Client 41] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/munch) from localhost >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 178 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 196995 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 196995 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 181 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: [Client 47] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/leonardo) from localhost >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 181 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 183 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: [Client 53] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/botticelli) from localhost >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 183 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 69399 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 69399 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 180 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:16:37 cupsd[1790]: [Client 59] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/tiziano) from localhost >Jun 26 23:16:37 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 180 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:16:38 chronyd[1210]: Selected source 192.0.2.89 >Jun 26 23:16:38 nm-dispatcher[1699]: Redirecting to /bin/systemctl reload inadyn.service >Jun 26 23:16:38 nm-dispatcher[1699]: Failed to reload inadyn.service: Job type reload is not applicable for unit inadyn.service. >Jun 26 23:16:38 nm-dispatcher[1699]: req:6 'down' [virbr0-nic]: start running ordered scripts... >Jun 26 23:16:38 systemd[1]: Stopping Sendmail Mail Transport Client... >Jun 26 23:16:38 systemd[1]: Stopped Sendmail Mail Transport Client. >Jun 26 23:16:38 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:38 systemd[1]: Stopping Sendmail Mail Transport Agent... >Jun 26 23:16:38 systemd[1]: Stopped Sendmail Mail Transport Agent. >Jun 26 23:16:38 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:38 systemd[1]: Starting Sendmail Mail Transport Agent... >Jun 26 23:16:38 nm-dispatcher[1699]: Redirecting to /bin/systemctl reload inadyn.service >Jun 26 23:16:38 nm-dispatcher[1699]: Failed to reload inadyn.service: Job type reload is not applicable for unit inadyn.service. >Jun 26 23:16:38 sendmail[2080]: starting daemon (8.15.2): SMTP+queueing@01:00:00 >Jun 26 23:16:38 sendmail[2080]: STARTTLS=server: file /etc/pki/mail/certs/mail.pem unsafe: No such file or directory >Jun 26 23:16:38 systemd[1]: sendmail.service: Can't open PID file /run/sendmail.pid (yet?) after start: No such file or directory >Jun 26 23:16:38 systemd[1]: Started Sendmail Mail Transport Agent. >Jun 26 23:16:38 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sendmail comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:38 systemd[1]: Starting Sendmail Mail Transport Client... >Jun 26 23:16:38 sm-msp-queue[2093]: starting daemon (8.15.2): queueing@01:00:00 >Jun 26 23:16:38 systemd[1]: Started Sendmail Mail Transport Client. >Jun 26 23:16:38 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sm-client comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:41 systemd[1]: Started Wait for chrony to synchronize system clock. >Jun 26 23:16:41 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=chrony-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:41 systemd[1]: Reached target System Time Synchronized. >Jun 26 23:16:41 systemd[1]: Started Command Scheduler. >Jun 26 23:16:41 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:41 systemd[1]: Started Run system activity accounting tool every 10 minutes. >Jun 26 23:16:41 systemd[1]: Started daily update of the root trust anchor for DNSSEC. >Jun 26 23:16:41 systemd[1]: Started Generate summary of yesterday's process accounting. >Jun 26 23:16:41 systemd[1]: Started dnf-automatic-install timer. >Jun 26 23:16:41 systemd[1]: Reached target Timers. >Jun 26 23:16:41 systemd[1]: Reached target Multi-User System. >Jun 26 23:16:41 systemd[1]: Starting Update UTMP about System Runlevel Changes... >Jun 26 23:16:41 crond[2095]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 12% if used.) >Jun 26 23:16:41 audit[2096]: SYSTEM_RUNLEVEL pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='old-level=N new-level=3 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:41 systemd[1]: Started Update UTMP about System Runlevel Changes. >Jun 26 23:16:41 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:41 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:16:41 systemd[1]: Startup finished in 1.613s (kernel) + 2.050s (initrd) + 45.303s (userspace) = 48.967s. >Jun 26 23:16:41 crond[2095]: (CRON) INFO (running with inotify support) >Jun 26 23:16:49 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 109295 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'raffaello-Gray..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 109295 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 182 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: [Client 65] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/raffaello) from localhost >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 182 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'caravaggio-Gray..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 183 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: [Client 71] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/caravaggio) from localhost >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 183 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 164547 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'miro-Gray..' already exists >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'miro-CMYK..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 164547 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 177 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: [Client 77] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/miro) from localhost >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 177 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 189324 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'vasari-Gray..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 189324 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 179 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: [Client 83] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/vasari) from localhost >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 179 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 206783 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'giacometti-Gray..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 206783 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 183 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: [Client 89] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/giacometti) from localhost >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 183 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 189319 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'munch-Gray..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 189319 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 178 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: [Client 95] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/munch) from localhost >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 178 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:03 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 196995 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:03 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'leonardo-Gray..' already exists >Jun 26 23:17:03 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 196995 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 181 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: [Client 101] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/leonardo) from localhost >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 181 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'botticelli-Gray..' already exists >Jun 26 23:17:04 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 206767 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 183 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: [Client 107] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/botticelli) from localhost >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 183 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 69399 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: CreateProfile failed: org.freedesktop.ColorManager.AlreadyExists:profile id 'tiziano-Gray..' already exists >Jun 26 23:17:04 colord[1805]: failed to get session [pid 1790]: Keine Daten verfügbar >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 69399 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - - "POST /admin/ HTTP/1.1" 401 180 CUPS-Add-Modify-Printer successful-ok >Jun 26 23:17:04 cupsd[1790]: [Client 113] Returning IPP client-error-bad-request for CUPS-Add-Modify-Printer (ipp://localhost:631/printers/tiziano) from localhost >Jun 26 23:17:04 cupsd[1790]: REQUEST localhost - root "POST /admin/ HTTP/1.1" 200 180 CUPS-Add-Modify-Printer client-error-bad-request >Jun 26 23:17:58 audit[2100]: CRYPTO_KEY_USER pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2100 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:17:58 audit[2100]: CRYPTO_KEY_USER pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2100 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:17:58 audit[2100]: CRYPTO_KEY_USER pid=2100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2100 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:17:58 audit[2099]: CRYPTO_SESSION pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-server cipher=aes128-ctr ksize=128 mac=hmac-sha2-256 pfs=diffie-hellman-group-exchange-sha256 spid=2100 suid=74 rport=60781 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=175.117.145.239 terminal=? res=success' >Jun 26 23:17:58 audit[2099]: CRYPTO_SESSION pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-client cipher=aes128-ctr ksize=128 mac=hmac-sha2-256 pfs=diffie-hellman-group-exchange-sha256 spid=2100 suid=74 rport=60781 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=175.117.145.239 terminal=? res=success' >Jun 26 23:18:00 unix_chkpwd[2101]: password check failed for user (root) >Jun 26 23:18:00 sshd[2099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.117.145.239 user=root >Jun 26 23:18:00 audit[2099]: USER_AUTH pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=175.117.145.239 addr=175.117.145.239 terminal=ssh res=failed' >Jun 26 23:18:00 sshd[2099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" >Jun 26 23:18:02 sshd[2099]: Failed password for root from 175.117.145.239 port 60781 ssh2 >Jun 26 23:18:02 sshd[2099]: Received disconnect from 175.117.145.239 port 60781:11: Normal Shutdown, Thank you for playing [preauth] >Jun 26 23:18:02 audit[2099]: CRYPTO_KEY_USER pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=session fp=? direction=both spid=2100 suid=74 rport=60781 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=175.117.145.239 terminal=? res=success' >Jun 26 23:18:02 audit[2099]: CRYPTO_KEY_USER pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2100 suid=74 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:18:02 sshd[2099]: Disconnected from authenticating user root 175.117.145.239 port 60781 [preauth] >Jun 26 23:18:02 audit[2099]: CRYPTO_KEY_USER pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2099 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:18:02 audit[2099]: CRYPTO_KEY_USER pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2099 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:18:02 audit[2099]: CRYPTO_KEY_USER pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2099 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:18:02 audit[2099]: USER_LOGIN pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=login acct="root" exe="/usr/sbin/sshd" hostname=? addr=175.117.145.239 terminal=ssh res=failed' >Jun 26 23:18:49 chronyd[1210]: Can't synchronise: no majority >Jun 26 23:18:50 chronyd[1210]: Selected source 192.0.2.161 >Jun 26 23:19:26 audit[2107]: CRYPTO_KEY_USER pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2107 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:26 audit[2107]: CRYPTO_KEY_USER pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2107 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:26 audit[2107]: CRYPTO_KEY_USER pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2107 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:27 audit[2106]: CRYPTO_SESSION pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-server cipher=aes128-ctr ksize=128 mac=hmac-sha2-256 pfs=diffie-hellman-group-exchange-sha256 spid=2107 suid=74 rport=53450 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=221.132.85.112 terminal=? res=success' >Jun 26 23:19:27 audit[2106]: CRYPTO_SESSION pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-client cipher=aes128-ctr ksize=128 mac=hmac-sha2-256 pfs=diffie-hellman-group-exchange-sha256 spid=2107 suid=74 rport=53450 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=221.132.85.112 terminal=? res=success' >Jun 26 23:19:29 audit[1223]: USER_AVC pid=1223 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.systemd1.Manager member=LookupDynamicUserByName dest=org.freedesktop.systemd1 spid=2106 tpid=1 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=dbus permissive=0 > exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >Jun 26 23:19:29 sshd[2106]: Invalid user chase from 221.132.85.112 port 53450 >Jun 26 23:19:29 audit[1223]: USER_AVC pid=1223 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.systemd1.Manager member=LookupDynamicUserByName dest=org.freedesktop.systemd1 spid=2106 tpid=1 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=dbus permissive=0 > exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >Jun 26 23:19:29 sshd[2106]: pam_unix(sshd:auth): check pass; user unknown >Jun 26 23:19:29 sshd[2106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.85.112 >Jun 26 23:19:29 audit[1223]: USER_AVC pid=1223 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.systemd1.Manager member=LookupDynamicUserByName dest=org.freedesktop.systemd1 spid=2106 tpid=1 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=dbus permissive=0 > exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >Jun 26 23:19:29 audit[1223]: USER_AVC pid=1223 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.systemd1.Manager member=LookupDynamicUserByName dest=org.freedesktop.systemd1 spid=2106 tpid=1 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=dbus permissive=0 > exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >Jun 26 23:19:29 sshd[2106]: pam_ecryptfs: Error getting passwd info for user; rc = [13] >Jun 26 23:19:29 audit[2106]: USER_AUTH pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=PAM:authentication grantors=? acct="?" exe="/usr/sbin/sshd" hostname=221.132.85.112 addr=221.132.85.112 terminal=ssh res=failed' >Jun 26 23:19:30 sshd[2106]: Failed password for invalid user chase from 221.132.85.112 port 53450 ssh2 >Jun 26 23:19:31 sshd[2106]: Received disconnect from 221.132.85.112 port 53450:11: Normal Shutdown, Thank you for playing [preauth] >Jun 26 23:19:31 audit[2106]: CRYPTO_KEY_USER pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=session fp=? direction=both spid=2107 suid=74 rport=53450 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=221.132.85.112 terminal=? res=success' >Jun 26 23:19:31 sshd[2106]: Disconnected from invalid user chase 221.132.85.112 port 53450 [preauth] >Jun 26 23:19:31 audit[2106]: CRYPTO_KEY_USER pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2107 suid=74 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:31 audit[2106]: CRYPTO_KEY_USER pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2106 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:31 audit[2106]: CRYPTO_KEY_USER pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2106 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:31 audit[2106]: CRYPTO_KEY_USER pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2106 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:19:31 audit[2106]: USER_LOGIN pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=login acct="(unknown)" exe="/usr/sbin/sshd" hostname=? addr=221.132.85.112 terminal=ssh res=failed' >Jun 26 23:20:01 CROND[2113]: (root) CMD (test -f /var/lock/subsys/ods-enforcerd && kill -s SIGHUP `cat /var/run/opendnssec/enforcerd.pid` > /dev/null 2> /dev/null) >Jun 26 23:20:08 systemd[1]: Starting system activity accounting tool... >Jun 26 23:20:08 systemd[1]: Started system activity accounting tool. >Jun 26 23:20:08 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sysstat-collect comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:20:08 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=sysstat-collect comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:20:59 NetworkManager[1278]: <info> [1530048059.2604] manager: NetworkManager state is now CONNECTED_GLOBAL >Jun 26 23:20:59 dbus-daemon[1223]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.8' (uid=0 pid=1278 comm="/usr/sbin/NetworkManager --no-daemon " label="system_u:system_r:NetworkManager_t:s0") >Jun 26 23:20:59 systemd[1]: Starting Clean amavisd quarantine folder... >Jun 26 23:20:59 systemd[1]: Starting Clean amavisd tmp folder... >Jun 26 23:20:59 systemd[1]: Starting Network Manager Script Dispatcher Service... >Jun 26 23:20:59 dbus-daemon[1223]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Jun 26 23:20:59 systemd[1]: Started Network Manager Script Dispatcher Service. >Jun 26 23:20:59 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:20:59 nm-dispatcher[2122]: req:1 'connectivity-change': new request (11 scripts) >Jun 26 23:20:59 nm-dispatcher[2122]: req:1 'connectivity-change': start running ordered scripts... >Jun 26 23:20:59 systemd[1]: Started Clean amavisd quarantine folder. >Jun 26 23:20:59 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=amavisd-clean-quarantine comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:20:59 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=amavisd-clean-quarantine comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:20:59 systemd[1]: Started Clean amavisd tmp folder. >Jun 26 23:20:59 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=amavisd-clean-tmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:20:59 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=amavisd-clean-tmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:21:09 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=NetworkManager-dispatcher comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:04 audit[2154]: CRYPTO_KEY_USER pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2154 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:04 audit[2154]: CRYPTO_KEY_USER pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2154 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:04 audit[2154]: CRYPTO_KEY_USER pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2154 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:04 audit[2153]: CRYPTO_SESSION pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-server cipher=aes256-gcm@openssh.com ksize=256 mac=<implicit> pfs=curve25519-sha256@libssh.org spid=2154 suid=74 rport=48280 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=? res=success' >Jun 26 23:22:04 audit[2153]: CRYPTO_SESSION pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=start direction=from-client cipher=aes256-gcm@openssh.com ksize=256 mac=<implicit> pfs=curve25519-sha256@libssh.org spid=2154 suid=74 rport=48280 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=? res=success' >Jun 26 23:22:04 audit[2153]: USER_AUTH pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=pubkey acct="root" exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=ssh res=failed' >Jun 26 23:22:04 audit[2153]: USER_AUTH pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=pubkey_auth grantors=auth-key acct="root" exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=? res=success' >Jun 26 23:22:04 audit[2153]: CRYPTO_KEY_USER pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=negotiate kind=auth-key fp=SHA256:41:5f:41:8b:b3:cb:a4:f6:3c:ff:a4:15:1c:5b:6a:73:9f:ce:d7:e7:60:65:c8:b4:6a:04:7c:aa:1f:3b:52:94 exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=? res=success' >Jun 26 23:22:04 audit[2153]: USER_ACCT pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="root" exe="/usr/sbin/sshd" hostname=198.51.100.147 addr=198.51.100.147 terminal=ssh res=success' >Jun 26 23:22:04 sshd[2153]: Accepted publickey for root from 198.51.100.147 port 48280 ssh2: RSA SHA256:QV9Bi7PLpPY8/6QVHFtqc5/O1+dgZci0agR8qh87UpQ >Jun 26 23:22:04 audit[2153]: CRYPTO_KEY_USER pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=session fp=? direction=both spid=2154 suid=74 rport=48280 laddr=192.0.2.44 lport=22 exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=? res=success' >Jun 26 23:22:04 audit[2153]: CRED_ACQ pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix,pam_ecryptfs acct="root" exe="/usr/sbin/sshd" hostname=198.51.100.147 addr=198.51.100.147 terminal=ssh res=success' >Jun 26 23:22:04 audit[2153]: USER_ROLE_CHANGE pid=2153 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='pam: default-context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 selected-context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 exe="/usr/sbin/sshd" hostname=198.51.100.147 addr=198.51.100.147 terminal=ssh res=success' >Jun 26 23:22:04 audit[1223]: USER_AVC pid=1223 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.systemd1.Manager member=LookupDynamicUserByName dest=org.freedesktop.systemd1 spid=2153 tpid=1 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=dbus permissive=0 > exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' >Jun 26 23:22:04 sshd[2153]: Unable to get ecryptfs pam data : No module specific data is present >Jun 26 23:22:04 systemd[1]: Created slice User Slice of root. >Jun 26 23:22:04 systemd[1]: Starting User Manager for UID 0... >Jun 26 23:22:04 systemd-logind[1787]: New session 1 of user root. >Jun 26 23:22:04 systemd[1]: Started Session 1 of user root. >Jun 26 23:22:05 audit[2156]: USER_ACCT pid=2156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 audit[2156]: USER_ROLE_CHANGE pid=2156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='pam: default-context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 selected-context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 systemd[2156]: Unable to get ecryptfs pam data : No module specific data is present >Jun 26 23:22:05 audit[2156]: USER_START pid=2156 uid=0 auid=0 ses=2 subj=system_u:system_r:init_t:s0 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_keyinit,pam_limits,pam_ecryptfs,pam_systemd,pam_unix acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 systemd[2156]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Jun 26 23:22:05 systemd[2156]: Reached target Timers. >Jun 26 23:22:05 systemd[2156]: Starting D-Bus User Message Bus Socket. >Jun 26 23:22:05 systemd[2156]: Reached target Paths. >Jun 26 23:22:05 systemd[2156]: Listening on Sound System. >Jun 26 23:22:05 systemd[2156]: Listening on D-Bus User Message Bus Socket. >Jun 26 23:22:05 systemd[2156]: Reached target Sockets. >Jun 26 23:22:05 systemd[2156]: Reached target Basic System. >Jun 26 23:22:05 systemd[1]: Started User Manager for UID 0. >Jun 26 23:22:05 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=user@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 systemd[2156]: Starting Sound Service... >Jun 26 23:22:05 sshd[2153]: pam_unix(sshd:session): session opened for user root by (uid=0) >Jun 26 23:22:05 sshd[2153]: Unable to get ecryptfs pam data : No module specific data is present >Jun 26 23:22:05 audit[2153]: USER_START pid=2153 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_ecryptfs,pam_systemd,pam_unix,pam_ecryptfs,pam_umask,pam_lastlog acct="root" exe="/usr/sbin/sshd" hostname=198.51.100.147 addr=198.51.100.147 terminal=ssh res=success' >Jun 26 23:22:05 audit[2165]: CRYPTO_KEY_USER pid=2165 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2165 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 audit[2165]: CRYPTO_KEY_USER pid=2165 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2165 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 audit[2165]: CRYPTO_KEY_USER pid=2165 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2165 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:05 audit[2165]: CRED_ACQ pid=2165 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix,pam_ecryptfs acct="root" exe="/usr/sbin/sshd" hostname=198.51.100.147 addr=198.51.100.147 terminal=ssh res=success' >Jun 26 23:22:05 pulseaudio[2164]: W: [pulseaudio] main.c: Dieses Programm sollte ohne die Option --system nicht als Administrator ausgeführt werden. >Jun 26 23:22:05 systemd[2156]: Started D-Bus User Message Bus. >Jun 26 23:22:05 audit[2153]: USER_LOGIN pid=2153 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=login id=0 exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=/dev/pts/0 res=success' >Jun 26 23:22:05 audit[2153]: USER_START pid=2153 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=login id=0 exe="/usr/sbin/sshd" hostname=? addr=198.51.100.147 terminal=/dev/pts/0 res=success' >Jun 26 23:22:05 audit[2153]: CRYPTO_KEY_USER pid=2153 uid=0 auid=0 ses=1 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2167 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:07 dbus-daemon[2166]: [session uid=0 pid=2166] Activating service name='org.gnome.GConf' requested by ':1.3' (uid=0 pid=2239 comm="/usr/libexec/pulse/gconf-helper " label="unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023") >Jun 26 23:22:07 dbus-daemon[2166]: [session uid=0 pid=2166] Successfully activated service 'org.gnome.GConf' >Jun 26 23:22:07 systemd[2156]: Started Sound Service. >Jun 26 23:22:07 systemd[2156]: Reached target Default. >Jun 26 23:22:07 systemd[2156]: Startup finished in 2.090s. >Jun 26 23:22:07 bluetoothd[1212]: Endpoint registered: sender=:1.44 path=/MediaEndpoint/A2DPSource >Jun 26 23:22:07 bluetoothd[1212]: Endpoint registered: sender=:1.44 path=/MediaEndpoint/A2DPSink >Jun 26 23:22:07 pulseaudio[2164]: E: [pulseaudio] backend-ofono.c: Failed to register as a handsfree audio agent with ofono: org.freedesktop.DBus.Error.ServiceUnknown: The name org.ofono was not provided by any .service files >Jun 26 23:22:07 kernel: Bluetooth: RFCOMM TTY layer initialized >Jun 26 23:22:07 kernel: Bluetooth: RFCOMM socket layer initialized >Jun 26 23:22:07 kernel: Bluetooth: RFCOMM ver 1.11 >Jun 26 23:22:58 audit[2250]: CRYPTO_KEY_USER pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2250 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 audit[2250]: CRYPTO_KEY_USER pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2250 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 audit[2250]: CRYPTO_KEY_USER pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2250 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 sshd[2248]: Connection closed by 192.0.2.240 port 35020 [preauth] >Jun 26 23:22:58 audit[2248]: CRYPTO_KEY_USER pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2250 suid=74 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 audit[2248]: CRYPTO_KEY_USER pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:2d:80:66:fb:a5:60:34:4b:91:c4:dc:be:7a:96:16:b8:22:5a:9e:4e:4a:47:f8:ff:ae:95:36:34:77:43:73:58 direction=? spid=2248 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 audit[2248]: CRYPTO_KEY_USER pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:a6:c9:8a:95:5e:f4:6a:d2:34:7e:4f:da:af:f8:26:09:fc:24:95:23:24:fa:c6:19:d1:58:ae:03:c0:74:86:81 direction=? spid=2248 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 audit[2248]: CRYPTO_KEY_USER pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=destroy kind=server fp=SHA256:33:da:8c:5f:09:71:12:d8:1d:3a:df:d5:65:4c:23:5f:45:bb:20:4b:74:9a:2c:95:a0:e9:bf:ce:1f:28:8d:a0 direction=? spid=2248 suid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' >Jun 26 23:22:58 audit[2248]: USER_LOGIN pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 msg='op=login acct="(unknown)" exe="/usr/sbin/sshd" hostname=? addr=192.0.2.240 terminal=ssh res=failed'
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1595041
:
1454522
|
1454698
|
1454706
|
1454793
|
1454794
|
1454810
| 1454811 |
1454827